Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.12.2023.5905.1
Category:Ubuntu Local Security Checks
Title:Ubuntu: Security Advisory (USN-5905-1)
Summary:The remote host is missing an update for the 'php7.0' package(s) announced via the USN-5905-1 advisory.
Description:Summary:
The remote host is missing an update for the 'php7.0' package(s) announced via the USN-5905-1 advisory.

Vulnerability Insight:
It was discovered that PHP incorrectly handled certain gzip files.
An attacker could possibly use this issue to cause a denial of service.
(CVE-2022-31628)

It was discovered that PHP incorrectly handled certain cookies.
An attacker could possibly use this issue to compromise data integrity.
(CVE-2022-31629)

It was discovered that PHP incorrectly handled certain inputs.
An attacker could possibly use this issue to cause a crash or
execute arbitrary code. (CVE-2022-31631)

It was discovered that PHP incorrectly handled resolving long paths. A
remote attacker could possibly use this issue to obtain or modify sensitive
information. (CVE-2023-0568)

It was discovered that PHP incorrectly handled a large number of field and file
parts in HTTP form uploads. A remote attacker could possibly use this issue to
cause PHP to consume resources, leading to a denial of service. (CVE-2023-0662)

Affected Software/OS:
'php7.0' package(s) on Ubuntu 16.04.

Solution:
Please install the updated package(s).

CVSS Score:
7.6

CVSS Vector:
AV:N/AC:H/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2022-31628
Debian Security Information: DSA-5277 (Google Search)
https://www.debian.org/security/2022/dsa-5277
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XNIEABBH5XCXLFWWZYIDE457SPEDZTXV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VI3E6A3ZTH2RP7OMLJHSVFIEQBIFM6RF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2L5SUVYGAKSWODUQPZFBUB3AL6E6CSEV/
https://security.gentoo.org/glsa/202211-03
https://bugs.php.net/bug.php?id=81726
https://lists.debian.org/debian-lts-announce/2022/12/msg00030.html
Common Vulnerability Exposure (CVE) ID: CVE-2022-31629
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LSJVPJTX7T3J5V7XHR4MFNHZGP44R5XE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJZK3X6B7FBE32FETDSMRLJXTFTHKWSY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZGWIK3HMBACERGB4TSBB2JUOMPYY2VKY/
https://bugs.php.net/bug.php?id=81727
http://www.openwall.com/lists/oss-security/2024/04/12/11
Common Vulnerability Exposure (CVE) ID: CVE-2022-31631
Common Vulnerability Exposure (CVE) ID: CVE-2023-0568
https://bugs.php.net/bug.php?id=81746
Common Vulnerability Exposure (CVE) ID: CVE-2023-0662
https://github.com/php/php-src/security/advisories/GHSA-54hq-v5wp-fqgv
CopyrightCopyright (C) 2023 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.