Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.892708
Category:Debian Local Security Checks
Title:Debian: Security Advisory (DLA-2708-1)
Summary:The remote host is missing an update for the Debian 'php7.0' package(s) announced via the DLA-2708-1 advisory.
Description:Summary:
The remote host is missing an update for the Debian 'php7.0' package(s) announced via the DLA-2708-1 advisory.

Vulnerability Insight:
Several vulnerabilities were discovered in php5, a server-side, HTML-embedded scripting language. An attacker could cause denial of service (DoS), memory corruption and potentially execution of arbitrary code, and server-side request forgery (SSRF) bypass.

CVE-2019-18218

fileinfo: cdf_read_property_info in cdf.c does not restrict the number of CDF_VECTOR elements, which allows a heap-based buffer overflow (4-byte out-of-bounds write).

CVE-2020-7071

When validating URL with functions like filter_var($url, FILTER_VALIDATE_URL), PHP will accept an URL with invalid password as valid URL. This may lead to functions that rely on URL being valid to mis-parse the URL and produce wrong data as components of the URL.

CVE-2021-21702

When using SOAP extension to connect to a SOAP server, a malicious SOAP server could return malformed XML data as a response that would cause PHP to access a null pointer and thus cause a crash.

CVE-2021-21704

Multiple firebird issues.

CVE-2021-21705

SSRF bypass in FILTER_VALIDATE_URL.

For Debian 9 stretch, these problems have been fixed in version 7.0.33-0+deb9u11.

We recommend that you upgrade your php7.0 packages.

For the detailed security status of php7.0 please refer to its security tracker page at: [link moved to references]

Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: [link moved to references]

Affected Software/OS:
'php7.0' package(s) on Debian 9.

Solution:
Please install the updated package(s).

CVSS Score:
6.8

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2019-18218
Debian Security Information: DSA-4550 (Google Search)
https://www.debian.org/security/2019/dsa-4550
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D6BJVGXSCC6NMIAWX36FPWHEIFON3OSE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VBK6XOJR6OVWT2FUEBO7V7KCOSSLAP52/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CV6PFCEYHYALMTT45QE2U5C5TEJZQPXJ/
https://security.gentoo.org/glsa/202003-24
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16780
https://github.com/file/file/commit/46a8443f76cec4b41ec736eca396984c74664f84
https://lists.debian.org/debian-lts-announce/2019/10/msg00032.html
https://lists.debian.org/debian-lts-announce/2021/07/msg00008.html
SuSE Security Announcement: openSUSE-SU-2020:0677 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00044.html
https://usn.ubuntu.com/4172-1/
https://usn.ubuntu.com/4172-2/
Common Vulnerability Exposure (CVE) ID: CVE-2020-7071
https://security.netapp.com/advisory/ntap-20210312-0005/
https://www.tenable.com/security/tns-2021-14
Debian Security Information: DSA-4856 (Google Search)
https://www.debian.org/security/2021/dsa-4856
https://security.gentoo.org/glsa/202105-23
https://bugs.php.net/bug.php?id=77423
https://www.oracle.com/security-alerts/cpuoct2021.html
Common Vulnerability Exposure (CVE) ID: CVE-2021-21702
https://bugs.php.net/bug.php?id=80672
Common Vulnerability Exposure (CVE) ID: CVE-2021-21704
https://security.gentoo.org/glsa/202209-20
https://bugs.php.net/bug.php?id=76448
https://bugs.php.net/bug.php?id=76449
https://bugs.php.net/bug.php?id=76450
https://bugs.php.net/bug.php?id=76452
Common Vulnerability Exposure (CVE) ID: CVE-2021-21705
https://security.netapp.com/advisory/ntap-20211029-0006/
https://bugs.php.net/bug.php?id=81122
https://www.oracle.com/security-alerts/cpujan2022.html
CopyrightCopyright (C) 2021 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.