|Category:||Red Hat Local Security Checks|
|Title:||RedHat Update for php53 and php RHSA-2014:1326-01|
|Summary:||The remote host is missing an update for the 'php53 and php'; package(s) announced via the referenced advisory.|
The remote host is missing an update for the 'php53 and php'
package(s) announced via the referenced advisory.
PHP is an HTML-embedded scripting language commonly used with the Apache
HTTP Server. PHP's fileinfo module provides functions used to identify a
particular file according to the type of data contained by the file.
It was found that the fix for CVE-2012-1571 was incomplete the File
Information (fileinfo) extension did not correctly parse certain Composite
Document Format (CDF) files. A remote attacker could use this flaw to crash
a PHP application using fileinfo via a specially crafted CDF file.
A NULL pointer dereference flaw was found in the gdImageCreateFromXpm()
function of PHP's gd extension. A remote attacker could use this flaw to
crash a PHP application using gd via a specially crafted X PixMap (XPM)
Multiple buffer over-read flaws were found in the php_parserr() function of
PHP. A malicious DNS server or a man-in-the-middle attacker could possibly
use this flaw to execute arbitrary code as the PHP interpreter if a PHP
application used the dns_get_record() function to perform a DNS query.
Two use-after-free flaws were found in the way PHP handled certain Standard
PHP Library (SPL) Iterators and ArrayIterators. A malicious script author
could possibly use either of these flaws to disclose certain portions of
server memory. (CVE-2014-4670, CVE-2014-4698)
The CVE-2014-3597 issue was discovered by David Kutalek of the Red Hat
All php53 and php users are advised to upgrade to these updated packages,
which contain backported patches to correct these issues. After installing
the updated packages, the httpd daemon must be restarted for the update to
php53 and php on Red Hat Enterprise Linux (v. 5 server),
Red Hat Enterprise Linux Server (v. 6),
Red Hat Enterprise Linux Workstation (v. 6)
Please Install the Updated Packages.
Common Vulnerability Exposure (CVE) ID: CVE-2014-2497|
BugTraq ID: 66233
Debian Security Information: DSA-3215 (Google Search)
RedHat Security Advisories: RHSA-2014:1326
RedHat Security Advisories: RHSA-2014:1327
RedHat Security Advisories: RHSA-2014:1765
RedHat Security Advisories: RHSA-2014:1766
SuSE Security Announcement: SUSE-SU-2014:0868 (Google Search)
SuSE Security Announcement: SUSE-SU-2014:0869 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2014-3587
BugTraq ID: 69325
Debian Security Information: DSA-3008 (Google Search)
Debian Security Information: DSA-3021 (Google Search)
RedHat Security Advisories: RHSA-2016:0760
Common Vulnerability Exposure (CVE) ID: CVE-2014-3597
BugTraq ID: 69322
SuSE Security Announcement: openSUSE-SU-2014:1133 (Google Search)
SuSE Security Announcement: openSUSE-SU-2014:1245 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2014-4670
SuSE Security Announcement: openSUSE-SU-2014:0945 (Google Search)
SuSE Security Announcement: openSUSE-SU-2014:1236 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2014-4698
Common Vulnerability Exposure (CVE) ID: CVE-2012-1571
Debian Security Information: DSA-2422 (Google Search)
|Copyright||Copyright (C) 2014 Greenbone Networks GmbH|
|This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.