![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.703008 |
Category: | Debian Local Security Checks |
Title: | Debian: Security Advisory (DSA-3008-1) |
Summary: | The remote host is missing an update for the Debian 'php5' package(s) announced via the DSA-3008-1 advisory. |
Description: | Summary: The remote host is missing an update for the Debian 'php5' package(s) announced via the DSA-3008-1 advisory. Vulnerability Insight: Several vulnerabilities were found in PHP, a general-purpose scripting language commonly used for web application development. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2014-3538 It was discovered that the original fix for CVE-2013-7345 did not sufficiently address the problem. A remote attacker could still cause a denial of service (CPU consumption) via a specially-crafted input file that triggers backtracking during processing of an awk regular expression rule. CVE-2014-3587 It was discovered that the CDF parser of the fileinfo module does not properly process malformed files in the Composite Document File (CDF) format, leading to crashes. CVE-2014-3597 It was discovered that the original fix for CVE-2014-4049 did not completely address the issue. A malicious server or man-in-the-middle attacker could cause a denial of service (crash) and possibly execute arbitrary code via a crafted DNS TXT record. CVE-2014-4670 It was discovered that PHP incorrectly handled certain SPL Iterators. A local attacker could use this flaw to cause PHP to crash, resulting in a denial of service. For the stable distribution (wheezy), these problems have been fixed in version 5.4.4-14+deb7u13. In addition, this update contains several bugfixes originally targeted for the upcoming Wheezy point release. For the unstable distribution (sid), these problems will be fixed soon. We recommend that you upgrade your php5 packages. Affected Software/OS: 'php5' package(s) on Debian 7. Solution: Please install the updated package(s). CVSS Score: 6.8 CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2014-3538 http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html BugTraq ID: 68348 http://www.securityfocus.com/bid/68348 Debian Security Information: DSA-3008 (Google Search) http://www.debian.org/security/2014/dsa-3008 Debian Security Information: DSA-3021 (Google Search) http://www.debian.org/security/2014/dsa-3021 http://mx.gw.com/pipermail/file/2014/001553.html http://openwall.com/lists/oss-security/2014/06/30/7 RedHat Security Advisories: RHSA-2014:1327 http://rhn.redhat.com/errata/RHSA-2014-1327.html RedHat Security Advisories: RHSA-2014:1765 http://rhn.redhat.com/errata/RHSA-2014-1765.html RedHat Security Advisories: RHSA-2014:1766 http://rhn.redhat.com/errata/RHSA-2014-1766.html RedHat Security Advisories: RHSA-2016:0760 http://rhn.redhat.com/errata/RHSA-2016-0760.html http://secunia.com/advisories/60696 Common Vulnerability Exposure (CVE) ID: CVE-2014-3587 BugTraq ID: 69325 http://www.securityfocus.com/bid/69325 RedHat Security Advisories: RHSA-2014:1326 http://rhn.redhat.com/errata/RHSA-2014-1326.html http://secunia.com/advisories/60609 http://www.ubuntu.com/usn/USN-2344-1 http://www.ubuntu.com/usn/USN-2369-1 Common Vulnerability Exposure (CVE) ID: CVE-2014-3597 BugTraq ID: 69322 http://www.securityfocus.com/bid/69322 SuSE Security Announcement: openSUSE-SU-2014:1133 (Google Search) http://lists.opensuse.org/opensuse-updates/2014-09/msg00024.html SuSE Security Announcement: openSUSE-SU-2014:1245 (Google Search) http://lists.opensuse.org/opensuse-updates/2014-09/msg00055.html Common Vulnerability Exposure (CVE) ID: CVE-2014-4670 http://secunia.com/advisories/54553 http://secunia.com/advisories/59831 SuSE Security Announcement: openSUSE-SU-2014:0945 (Google Search) http://lists.opensuse.org/opensuse-updates/2014-07/msg00035.html SuSE Security Announcement: openSUSE-SU-2014:1236 (Google Search) http://lists.opensuse.org/opensuse-updates/2014-09/msg00046.html |
Copyright | Copyright (C) 2014 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |