Description: | Description: The remote host is missing an update to php announced via advisory FEDORA-2011-3614.
Update Information:
Security Enhancements and Fixes in PHP 5.3.6: * Enforce security in the fastcgi protocol parsing with fpm SAPI. * Fixed bug #54247 (format-string vulnerability on Phar). (CVE-2011-1153) * Fixed bug #54193 (Integer overflow in shmop_read()). (CVE-2011-1092) * Fixed bug #54055 (buffer overrun with high values for precision ini setting). * Fixed bug #54002 (crash on crafted tag in exif). (CVE-2011-0708) * Fixed bug #53885 (ZipArchive segfault with FL_UNCHANGED on empty archive). (CVE-2011-0421)
Full upstream changelog : http://php.net/ChangeLog-5.php#5.3.6
References:
[ 1 ] Bug #688378 - CVE-2011-1153 php: several format string vulnerabilities in PHP's Phar extension https://bugzilla.redhat.com/show_bug.cgi?id=688378 [ 2 ] Bug #680972 - CVE-2011-0708 php: buffer over-read in Exif extension https://bugzilla.redhat.com/show_bug.cgi?id=680972 [ 3 ] Bug #688735 - CVE-2011-0421 php/libzip: segfault with FL_UNCHANGED on empty archive in zip_name_locate() https://bugzilla.redhat.com/show_bug.cgi?id=688735
Solution: Apply the appropriate updates.
This update can be installed with the yum update program. Use su -c 'yum update php' at the command line. For more information, refer to Managing Software with yum, available at http://docs.fedoraproject.org/yum/.
http://www.securityspace.com/smysecure/catid.html?in=FEDORA-2011-3614
Risk factor : High
CVSS Score: 7.5
|