Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.844997
Category:Ubuntu Local Security Checks
Title:Ubuntu: Security Advisory (USN-5006-1)
Summary:The remote host is missing an update for the 'php7.2, php7.4' package(s) announced via the USN-5006-1 advisory.
Description:Summary:
The remote host is missing an update for the 'php7.2, php7.4' package(s) announced via the USN-5006-1 advisory.

Vulnerability Insight:
It was discovered that PHP incorrectly handled certain PHAR files. A remote
attacker could possibly use this issue to cause PHP to crash, resulting in
a denial of service, or possibly obtain sensitive information. This issue
only affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2020-7068)

It was discovered that PHP incorrectly handled parsing URLs with passwords.
A remote attacker could possibly use this issue to cause PHP to mis-parse
the URL and produce wrong data. This issue only affected Ubuntu 18.04 LTS,
Ubuntu 20.04 LTS, and Ubuntu 20.10. (CVE-2020-7071)

It was discovered that PHP incorrectly handled certain malformed XML data
when being parsed by the SOAP extension. A remote attacker could possibly
use this issue to cause PHP to crash, resulting in a denial of service.
This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu
20.10. (CVE-2021-21702)

It was discovered that PHP incorrectly handled the pdo_firebase module. A
remote attacker could possibly use this issue to cause PHP to crash,
resulting in a denial of service. (CVE-2021-21704)

It was discovered that PHP incorrectly handled the FILTER_VALIDATE_URL
check. A remote attacker could possibly use this issue to perform a server-
side request forgery attack. (CVE-2021-21705)

Affected Software/OS:
'php7.2, php7.4' package(s) on Ubuntu 18.04, Ubuntu 20.04, Ubuntu 20.10, Ubuntu 21.04.

Solution:
Please install the updated package(s).

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:P/A:N

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2020-7068
https://security.netapp.com/advisory/ntap-20200918-0005/
Debian Security Information: DSA-4856 (Google Search)
https://www.debian.org/security/2021/dsa-4856
https://security.gentoo.org/glsa/202009-10
https://bugs.php.net/bug.php?id=79797
Common Vulnerability Exposure (CVE) ID: CVE-2020-7071
https://security.netapp.com/advisory/ntap-20210312-0005/
https://www.tenable.com/security/tns-2021-14
https://security.gentoo.org/glsa/202105-23
https://bugs.php.net/bug.php?id=77423
https://www.oracle.com/security-alerts/cpuoct2021.html
https://lists.debian.org/debian-lts-announce/2021/07/msg00008.html
Common Vulnerability Exposure (CVE) ID: CVE-2021-21702
https://bugs.php.net/bug.php?id=80672
Common Vulnerability Exposure (CVE) ID: CVE-2021-21704
https://security.gentoo.org/glsa/202209-20
https://bugs.php.net/bug.php?id=76448
https://bugs.php.net/bug.php?id=76449
https://bugs.php.net/bug.php?id=76450
https://bugs.php.net/bug.php?id=76452
Common Vulnerability Exposure (CVE) ID: CVE-2021-21705
https://security.netapp.com/advisory/ntap-20211029-0006/
https://bugs.php.net/bug.php?id=81122
https://www.oracle.com/security-alerts/cpujan2022.html
CopyrightCopyright (C) 2021 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.