Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.69310
Category:Fedora Local Security Checks
Title:Fedora Core 15 FEDORA-2011-3614 (php)
Summary:NOSUMMARY
Description:Description:
The remote host is missing an update to php
announced via advisory FEDORA-2011-3614.

Update Information:

Security Enhancements and Fixes in PHP 5.3.6:
* Enforce security in the fastcgi protocol parsing with fpm SAPI.
* Fixed bug #54247 (format-string vulnerability on Phar). (CVE-2011-1153)
* Fixed bug #54193 (Integer overflow in shmop_read()). (CVE-2011-1092)
* Fixed bug #54055 (buffer overrun with high values for precision ini setting).
* Fixed bug #54002 (crash on crafted tag in exif). (CVE-2011-0708)
* Fixed bug #53885 (ZipArchive segfault with FL_UNCHANGED on empty archive). (CVE-2011-0421)

Full upstream changelog :
http://php.net/ChangeLog-5.php#5.3.6

References:

[ 1 ] Bug #688378 - CVE-2011-1153 php: several format string vulnerabilities in PHP's Phar extension
https://bugzilla.redhat.com/show_bug.cgi?id=688378
[ 2 ] Bug #680972 - CVE-2011-0708 php: buffer over-read in Exif extension
https://bugzilla.redhat.com/show_bug.cgi?id=680972
[ 3 ] Bug #688735 - CVE-2011-0421 php/libzip: segfault with FL_UNCHANGED on empty archive in zip_name_locate()
https://bugzilla.redhat.com/show_bug.cgi?id=688735

Solution: Apply the appropriate updates.

This update can be installed with the yum update program. Use
su -c 'yum update php' at the command line.
For more information, refer to Managing Software with yum,
available at http://docs.fedoraproject.org/yum/.

http://www.securityspace.com/smysecure/catid.html?in=FEDORA-2011-3614

Risk factor : High

CVSS Score:
7.5

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2011-1153
43744
http://secunia.com/advisories/43744
46854
http://www.securityfocus.com/bid/46854
ADV-2011-0744
http://www.vupen.com/english/advisories/2011/0744
ADV-2011-0764
http://www.vupen.com/english/advisories/2011/0764
ADV-2011-0890
http://www.vupen.com/english/advisories/2011/0890
APPLE-SA-2011-10-12-3
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html
DSA-2266
http://www.debian.org/security/2011/dsa-2266
FEDORA-2011-3614
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056642.html
FEDORA-2011-3636
http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057709.html
FEDORA-2011-3666
http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057710.html
MDVSA-2011:052
http://www.mandriva.com/security/advisories?name=MDVSA-2011:052
MDVSA-2011:053
http://www.mandriva.com/security/advisories?name=MDVSA-2011:053
[oss-security] 20110314 CVE request: format-string vulnerability in PHP Phar extension
http://openwall.com/lists/oss-security/2011/03/14/13
[oss-security] 20110314 Re: CVE request: format-string vulnerability in PHP Phar extension
http://openwall.com/lists/oss-security/2011/03/14/14
http://openwall.com/lists/oss-security/2011/03/14/24
http://bugs.php.net/bug.php?id=54247
http://support.apple.com/kb/HT5002
http://svn.php.net/viewvc?view=revision&revision=309221
http://www.php.net/ChangeLog-5.php
http://www.php.net/archive/2011.php
http://www.php.net/releases/5_3_6.php
https://bugzilla.redhat.com/show_bug.cgi?id=688378
php-pharobject-format-string(66079)
https://exchange.xforce.ibmcloud.com/vulnerabilities/66079
Common Vulnerability Exposure (CVE) ID: CVE-2011-1092
16966
http://www.exploit-db.com/exploits/16966
46786
http://www.securityfocus.com/bid/46786
8130
http://securityreason.com/securityalert/8130
HPSBOV02763
http://marc.info/?l=bugtraq&m=133469208622507&w=2
SSRT100826
[oss-security] 20110308 CVE request, php's shm
http://www.openwall.com/lists/oss-security/2011/03/08/9
[oss-security] 20110308 Re: CVE request, php's shm
http://www.openwall.com/lists/oss-security/2011/03/08/11
http://bugs.php.net/bug.php?id=54193
http://svn.php.net/viewvc/php/php-src/branches/PHP_5_3/ext/shmop/shmop.c?r1=306939&r2=309018&pathrev=309018
https://bugzilla.redhat.com/show_bug.cgi?id=683183
php-shmopread-overflow(65988)
https://exchange.xforce.ibmcloud.com/vulnerabilities/65988
Common Vulnerability Exposure (CVE) ID: CVE-2011-0708
16261
http://www.exploit-db.com/exploits/16261/
46365
http://www.securityfocus.com/bid/46365
8114
http://securityreason.com/securityalert/8114
RHSA-2011:1423
http://www.redhat.com/support/errata/RHSA-2011-1423.html
RHSA-2012:0071
http://rhn.redhat.com/errata/RHSA-2012-0071.html
[oss-security] 20110214 PHP Exif 64bit Casting Vulnerability, CVE request
http://openwall.com/lists/oss-security/2011/02/14/1
[oss-security] 20110216 Re: Re: PHP Exif 64bit Casting Vulnerability, CVE request
http://openwall.com/lists/oss-security/2011/02/16/7
http://bugs.php.net/bug.php?id=54002
http://svn.php.net/viewvc?view=revision&revision=308316
https://bugzilla.redhat.com/show_bug.cgi?id=680972
Common Vulnerability Exposure (CVE) ID: CVE-2011-0421
BugTraq ID: 46354
http://www.securityfocus.com/bid/46354
Bugtraq: 20110318 libzip 0.9.3 _zip_name_locate NULL Pointer Dereference (incl PHP 5.3.5) (Google Search)
http://www.securityfocus.com/archive/1/517065/100/0/threaded
Debian Security Information: DSA-2266 (Google Search)
http://www.exploit-db.com/exploits/17004
HPdes Security Advisory: HPSBOV02763
HPdes Security Advisory: SSRT100826
http://www.mandriva.com/security/advisories?name=MDVSA-2011:099
http://secunia.com/advisories/43621
http://securityreason.com/securityalert/8146
http://securityreason.com/achievement_securityalert/96
SuSE Security Announcement: SUSE-SR:2011:009 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html
XForce ISS Database: libzip-zipnamelocate-dos(66173)
https://exchange.xforce.ibmcloud.com/vulnerabilities/66173
CopyrightCopyright (c) 2011 E-Soft Inc. http://www.securityspace.com

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.