![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.1.1.1.2010.2089 |
Category: | Debian Local Security Checks |
Title: | Debian: Security Advisory (DSA-2089-1) |
Summary: | The remote host is missing an update for the Debian 'php5' package(s) announced via the DSA-2089-1 advisory. |
Description: | Summary: The remote host is missing an update for the Debian 'php5' package(s) announced via the DSA-2089-1 advisory. Vulnerability Insight: Several remote vulnerabilities have been discovered in PHP 5, an hypertext preprocessor. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2010-1917 The fnmatch function can be abused to conduct denial of service attacks (by crashing the interpreter) by the means of a stack overflow. CVE-2010-2225 The SplObjectStorage unserializer allows attackers to execute arbitrary code via serialized data by the means of a use-after-free vulnerability. CVE-2010-3065 The default sessions serializer does not correctly handle a special marker, which allows an attacker to inject arbitrary variables into the session and possibly exploit vulnerabilities in the unserializer. CVE-2010-1128 For this vulnerability (predictable entropy for the Linear Congruential Generator used to generate session ids) we do not consider upstream's solution to be sufficient. It is recommended to uncomment the session.entropy_file and session.entropy_length settings in the php.ini files. Further improvements can be achieved by setting session.hash_function to 1 (one) and incrementing the value of session.entropy_length. For the stable distribution (lenny), these problems have been fixed in version 5.2.6.dfsg.1-1+lenny9. For the testing distribution (squeeze) and the unstable distribution (sid), these problems will be fixed soon. We recommend that you upgrade your php5 packages. Affected Software/OS: 'php5' package(s) on Debian 5. Solution: Please install the updated package(s). CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2010-1917 Debian Security Information: DSA-2089 (Google Search) http://www.debian.org/security/2010/dsa-2089 HPdes Security Advisory: HPSBMA02662 http://marc.info/?l=bugtraq&m=130331363227777&w=2 HPdes Security Advisory: SSRT100409 http://www.php-security.org/2010/05/11/mops-2010-021-php-fnmatch-stack-exhaustion-vulnerability/index.html http://www.redhat.com/support/errata/RHSA-2010-0919.html http://secunia.com/advisories/40860 http://secunia.com/advisories/42410 SuSE Security Announcement: SUSE-SR:2010:017 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html SuSE Security Announcement: SUSE-SR:2010:018 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00000.html http://www.vupen.com/english/advisories/2010/3081 XForce ISS Database: php-fnmatchfunction-dos(58585) https://exchange.xforce.ibmcloud.com/vulnerabilities/58585 Common Vulnerability Exposure (CVE) ID: CVE-2010-2225 40860 40948 http://www.securityfocus.com/bid/40948 APPLE-SA-2010-08-24-1 http://lists.apple.com/archives/security-announce/2010//Aug/msg00003.html DSA-2089 HPSBOV02763 http://marc.info/?l=bugtraq&m=133469208622507&w=2 SSRT100826 SUSE-SR:2010:017 SUSE-SR:2010:018 http://pastebin.com/mXGidCsd http://support.apple.com/kb/HT4312 http://twitter.com/i0n1c/statuses/16373156076 http://twitter.com/i0n1c/statuses/16447867829 https://bugzilla.redhat.com/show_bug.cgi?id=605641 php-splobjectstorage-code-execution(59610) https://exchange.xforce.ibmcloud.com/vulnerabilities/59610 Common Vulnerability Exposure (CVE) ID: CVE-2010-3065 http://php-security.org/2010/05/31/mops-2010-060-php-session-serializer-session-data-injection-vulnerability/index.html |
Copyright | Copyright (C) 2023 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |