Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.704081
Category:Debian Local Security Checks
Title:Debian: Security Advisory (DSA-4081-1)
Summary:The remote host is missing an update for the Debian 'php5' package(s) announced via the DSA-4081-1 advisory.
Description:Summary:
The remote host is missing an update for the Debian 'php5' package(s) announced via the DSA-4081-1 advisory.

Vulnerability Insight:
Several vulnerabilities were found in PHP, a widely-used open source general purpose scripting language:

CVE-2017-11142

Denial of service via overly long form variables

CVE-2017-11143

Invalid free() in wddx_deserialize()

CVE-2017-11144

Denial of service in openssl extension due to incorrect return value check of OpenSSL sealing function.

CVE-2017-11145

Out-of-bounds read in wddx_deserialize()

CVE-2017-11628

Buffer overflow in PHP INI parsing API

CVE-2017-12933

Buffer overread in finish_nested_data()

CVE-2017-16642

Out-of-bounds read in timelib_meridian()

For the oldstable distribution (jessie), these problems have been fixed in version 5.6.33+dfsg-0+deb8u1.

We recommend that you upgrade your php5 packages.

For the detailed security status of php5 please refer to its security tracker page at: [link moved to references]

Affected Software/OS:
'php5' package(s) on Debian 8.

Solution:
Please install the updated package(s).

CVSS Score:
7.8

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2017-11142
BugTraq ID: 99601
http://www.securityfocus.com/bid/99601
Debian Security Information: DSA-4081 (Google Search)
https://www.debian.org/security/2018/dsa-4081
Common Vulnerability Exposure (CVE) ID: CVE-2017-11143
BugTraq ID: 99553
http://www.securityfocus.com/bid/99553
RedHat Security Advisories: RHSA-2018:1296
https://access.redhat.com/errata/RHSA-2018:1296
Common Vulnerability Exposure (CVE) ID: CVE-2017-11144
Debian Security Information: DSA-4080 (Google Search)
https://www.debian.org/security/2018/dsa-4080
Common Vulnerability Exposure (CVE) ID: CVE-2017-11145
BugTraq ID: 99550
http://www.securityfocus.com/bid/99550
https://gist.github.com/anonymous/bd77ac90d3bdf31ce2a5251ad92e9e75
Common Vulnerability Exposure (CVE) ID: CVE-2017-11628
BugTraq ID: 99489
http://www.securityfocus.com/bid/99489
https://security.gentoo.org/glsa/201709-21
http://git.php.net/?p=php-src.git;a=commit;h=05255749139b3686c8a6a58ee01131ac0047465e
http://git.php.net/?p=php-src.git;a=commit;h=5f8380d33e648964d2d5140f329cf2d4c443033c
https://bugs.php.net/bug.php?id=74603
Common Vulnerability Exposure (CVE) ID: CVE-2017-12933
BugTraq ID: 99490
http://www.securityfocus.com/bid/99490
https://usn.ubuntu.com/3566-1/
https://usn.ubuntu.com/3566-2/
Common Vulnerability Exposure (CVE) ID: CVE-2017-16642
BugTraq ID: 101745
http://www.securityfocus.com/bid/101745
https://www.exploit-db.com/exploits/43133/
RedHat Security Advisories: RHSA-2019:2519
https://access.redhat.com/errata/RHSA-2019:2519
Common Vulnerability Exposure (CVE) ID: CVE-2018-5711
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3CZ2QADQTKRHTGB2AHD7J4QQNDLBEMM6/
https://security.gentoo.org/glsa/201903-18
https://www.oracle.com/security-alerts/cpuapr2020.html
https://lists.debian.org/debian-lts-announce/2018/01/msg00022.html
https://lists.debian.org/debian-lts-announce/2019/01/msg00028.html
https://usn.ubuntu.com/3755-1/
Common Vulnerability Exposure (CVE) ID: CVE-2018-5712
BugTraq ID: 102742
http://www.securityfocus.com/bid/102742
BugTraq ID: 104020
http://www.securityfocus.com/bid/104020
https://lists.debian.org/debian-lts-announce/2018/01/msg00025.html
http://www.securitytracker.com/id/1040363
https://usn.ubuntu.com/3600-1/
https://usn.ubuntu.com/3600-2/
CopyrightCopyright (C) 2018 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.