|Category:||Debian Local Security Checks|
|Title:||Debian LTS: Security Advisory for php5 (DLA-2261-1)|
|Summary:||The remote host is missing an update for the 'php5'; package(s) announced via the DLA-2261-1 advisory.|
The remote host is missing an update for the 'php5'
package(s) announced via the DLA-2261-1 advisory.
It has been discovered, that a vulnerability in php5, a server-side,
HTML-embedded scripting language, could lead to exhausted disk space on
the server. When using overly long filenames or field names, a memory
limit could be hit which results in stopping the upload but not cleaning
Further the embedded version of 'file' is vulnerable to CVE-2019-18218.
As it can not be exploited the same in php5 as in file, this issue is not
handled as an own CVE but just as a bug, that has been fixed here
(restrict the number of CDF_VECTOR elements to prevent a heap-based
buffer overflow (4-byte out-of-bounds write)).
'php5' package(s) on Debian Linux.
For Debian 8 'Jessie', this problem has been fixed in version
We recommend that you upgrade your php5 packages.
Common Vulnerability Exposure (CVE) ID: CVE-2019-11048|
Common Vulnerability Exposure (CVE) ID: CVE-2019-18218
|Copyright||Copyright (C) 2020 Greenbone Networks GmbH|
|This is only one of 85075 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.