Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:
Category:Red Hat Local Security Checks
Title:RedHat Update for php53 and php RHSA-2014:1326-01
Summary:The remote host is missing an update for the 'php53 and php'; package(s) announced via the referenced advisory.
The remote host is missing an update for the 'php53 and php'
package(s) announced via the referenced advisory.

Vulnerability Insight:
PHP is an HTML-embedded scripting language commonly used with the Apache
HTTP Server. PHP's fileinfo module provides functions used to identify a
particular file according to the type of data contained by the file.

It was found that the fix for CVE-2012-1571 was incomplete the File
Information (fileinfo) extension did not correctly parse certain Composite
Document Format (CDF) files. A remote attacker could use this flaw to crash
a PHP application using fileinfo via a specially crafted CDF file.

A NULL pointer dereference flaw was found in the gdImageCreateFromXpm()
function of PHP's gd extension. A remote attacker could use this flaw to
crash a PHP application using gd via a specially crafted X PixMap (XPM)
file. (CVE-2014-2497)

Multiple buffer over-read flaws were found in the php_parserr() function of
PHP. A malicious DNS server or a man-in-the-middle attacker could possibly
use this flaw to execute arbitrary code as the PHP interpreter if a PHP
application used the dns_get_record() function to perform a DNS query.

Two use-after-free flaws were found in the way PHP handled certain Standard
PHP Library (SPL) Iterators and ArrayIterators. A malicious script author
could possibly use either of these flaws to disclose certain portions of
server memory. (CVE-2014-4670, CVE-2014-4698)

The CVE-2014-3597 issue was discovered by David Kutalek of the Red Hat
BaseOS QE.

All php53 and php users are advised to upgrade to these updated packages,
which contain backported patches to correct these issues. After installing
the updated packages, the httpd daemon must be restarted for the update to
take effect.

Affected Software/OS:
php53 and php on Red Hat Enterprise Linux (v. 5 server),
Red Hat Enterprise Linux Server (v. 6),
Red Hat Enterprise Linux Workstation (v. 6)

Please Install the Updated Packages.

CVSS Score:

CVSS Vector:

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2014-2497
BugTraq ID: 66233
Debian Security Information: DSA-3215 (Google Search)
RedHat Security Advisories: RHSA-2014:1326
RedHat Security Advisories: RHSA-2014:1327
RedHat Security Advisories: RHSA-2014:1765
RedHat Security Advisories: RHSA-2014:1766
SuSE Security Announcement: SUSE-SU-2014:0868 (Google Search)
SuSE Security Announcement: SUSE-SU-2014:0869 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2014-3587
BugTraq ID: 69325
Debian Security Information: DSA-3008 (Google Search)
Debian Security Information: DSA-3021 (Google Search)
RedHat Security Advisories: RHSA-2016:0760
Common Vulnerability Exposure (CVE) ID: CVE-2014-3597
BugTraq ID: 69322
SuSE Security Announcement: openSUSE-SU-2014:1133 (Google Search)
SuSE Security Announcement: openSUSE-SU-2014:1245 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2014-4670
SuSE Security Announcement: openSUSE-SU-2014:0945 (Google Search)
SuSE Security Announcement: openSUSE-SU-2014:1236 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2014-4698
Common Vulnerability Exposure (CVE) ID: CVE-2012-1571
Debian Security Information: DSA-2422 (Google Search)
CopyrightCopyright (C) 2014 Greenbone Networks GmbH

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

© 1998-2021 E-Soft Inc. All rights reserved.