|Category:||FreeBSD Local Security Checks|
|Title:||FreeBSD Ports: php5|
|Summary:||The remote host is missing an update to the system; as announced in the referenced advisory.|
The remote host is missing an update to the system
as announced in the referenced advisory.
The following packages are affected:
The sapi_header_op function in main/SAPI.c in PHP before 5.3.11 does
not properly handle %0D sequences (aka carriage return characters),
which allows remote attackers to bypass an HTTP response-splitting
protection mechanism via a crafted URL, related to improper
interaction between the PHP header function and certain browsers, as
demonstrated by Internet Explorer and Google Chrome.
Update your system with the appropriate patches or
Common Vulnerability Exposure (CVE) ID: CVE-2011-1398|
RedHat Security Advisories: RHSA-2013:1307
SuSE Security Announcement: SUSE-SU-2013:1315 (Google Search)
|Copyright||Copyright (c) 2012 E-Soft Inc. http://www.securityspace.com|
|This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.