Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.12.2021.5006.2
Category:Ubuntu Local Security Checks
Title:Ubuntu: Security Advisory (USN-5006-2)
Summary:The remote host is missing an update for the 'php5, php7.0' package(s) announced via the USN-5006-2 advisory.
Description:Summary:
The remote host is missing an update for the 'php5, php7.0' package(s) announced via the USN-5006-2 advisory.

Vulnerability Insight:
USN-5006-1 fixed several vulnerabilities in PHP. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

It was discovered that PHP incorrectly handled certain PHAR files. A remote
attacker could possibly use this issue to cause PHP to crash, resulting in
a denial of service, or possibly obtain sensitive information. (CVE-2020-7068)

It was discovered that PHP incorrectly handled parsing URLs with passwords.
A remote attacker could possibly use this issue to cause PHP to mis-parse
the URL and produce wrong data. (CVE-2020-7071)

It was discovered that PHP incorrectly handled certain malformed XML data
when being parsed by the SOAP extension. A remote attacker could possibly
use this issue to cause PHP to crash, resulting in a denial of service.
(CVE-2021-21702)

It was discovered that PHP incorrectly handled the pdo_firebase module. A
remote attacker could possibly use this issue to cause PHP to crash,
resulting in a denial of service. (CVE-2021-21704)

It was discovered that PHP incorrectly handled the FILTER_VALIDATE_URL
check. A remote attacker could possibly use this issue to perform a server-
side request forgery attack. (CVE-2021-21705)

Affected Software/OS:
'php5, php7.0' package(s) on Ubuntu 14.04, Ubuntu 16.04.

Solution:
Please install the updated package(s).

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:P/A:N

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2020-7068
https://security.netapp.com/advisory/ntap-20200918-0005/
Debian Security Information: DSA-4856 (Google Search)
https://www.debian.org/security/2021/dsa-4856
https://security.gentoo.org/glsa/202009-10
https://bugs.php.net/bug.php?id=79797
Common Vulnerability Exposure (CVE) ID: CVE-2020-7071
https://security.netapp.com/advisory/ntap-20210312-0005/
https://www.tenable.com/security/tns-2021-14
https://security.gentoo.org/glsa/202105-23
https://bugs.php.net/bug.php?id=77423
https://www.oracle.com/security-alerts/cpuoct2021.html
https://lists.debian.org/debian-lts-announce/2021/07/msg00008.html
Common Vulnerability Exposure (CVE) ID: CVE-2021-21702
https://bugs.php.net/bug.php?id=80672
Common Vulnerability Exposure (CVE) ID: CVE-2021-21704
https://security.gentoo.org/glsa/202209-20
https://bugs.php.net/bug.php?id=76448
https://bugs.php.net/bug.php?id=76449
https://bugs.php.net/bug.php?id=76450
https://bugs.php.net/bug.php?id=76452
Common Vulnerability Exposure (CVE) ID: CVE-2021-21705
https://security.netapp.com/advisory/ntap-20211029-0006/
https://bugs.php.net/bug.php?id=81122
https://www.oracle.com/security-alerts/cpujan2022.html
CopyrightCopyright (C) 2022 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.