![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.1.4.2014.0938.1 |
Category: | SuSE Local Security Checks |
Title: | SUSE: Security Advisory (SUSE-SU-2014:0938-1) |
Summary: | The remote host is missing an update for the 'PHP 5.3' package(s) announced via the SUSE-SU-2014:0938-1 advisory. |
Description: | Summary: The remote host is missing an update for the 'PHP 5.3' package(s) announced via the SUSE-SU-2014:0938-1 advisory. Vulnerability Insight: PHP 5.3 has been updated to fix several security problems: * CVE-2014-3515: The SPL component in PHP incorrectly anticipated that certain data structures will have the array data type after unserialization, which allowed remote attackers to execute arbitrary code via a crafted string that triggers use of a Hashtable destructor, related to 'type confusion' issues in (1) ArrayObject and (2) SPLObjectStorage. * CVE-2014-0207: The cdf_read_short_sector function in cdf.c in file before 5.19, as used in the Fileinfo component in PHP allowed remote attackers to cause a denial of service (assertion failure and application exit) via a crafted CDF file. * CVE-2014-3478: Buffer overflow in the mconvert function in softmagic.c in file before 5.19, as used in the Fileinfo component in PHP allowed remote attackers to cause a denial of service (application crash) via a crafted Pascal string in a FILE_PSTRING conversion. * CVE-2014-3479: The cdf_check_stream_offset function in cdf.c in file before 5.19, as used in the Fileinfo component in PHP relied on incorrect sector-size data, which allowed remote attackers to cause a denial of service (application crash) via a crafted stream offset in a CDF file. * CVE-2014-3480: The cdf_count_chain function in cdf.c in file before 5.19, as used in the Fileinfo component in PHP did not properly validate sector-count data, which allowed remote attackers to cause a denial of service (application crash) via a crafted CDF file. * CVE-2014-3487: The cdf_read_property_info function in file before 5.19, as used in the Fileinfo component in PHP did not properly validate a stream offset, which allowed remote attackers to cause a denial of service (application crash) via a crafted CDF file. * CVE-2014-4670: Use-after-free vulnerability in ext/spl/spl_dllist.c in the SPL component in PHP allowed context-dependent attackers to cause a denial of service or possibly have unspecified other impact via crafted iterator usage within applications in certain web-hosting environments. * CVE-2014-4698: Use-after-free vulnerability in ext/spl/spl_array.c in the SPL component in PHP allowed context-dependent attackers to cause a denial of service or possibly have unspecified other impact via crafted ArrayIterator usage within applications in certain web-hosting environments. * CVE-2014-4721: The phpinfo implementation in ext/standard/info.c in PHP did not ensure use of the string data type for the PHP_AUTH_PW, PHP_AUTH_TYPE, PHP_AUTH_USER, and PHP_SELF variables, which might allow context-dependent attackers to obtain sensitive information from process memory by using the integer data type with crafted values, related to a 'type confusion' vulnerability, as demonstrated by reading a private SSL key in an Apache HTTP Server web-hosting environment with mod_ssl and a PHP 5.3.x mod_php. Security Issues: * CVE-2014-0207 * CVE-2014-3478 ... [Please see the references for more information on the vulnerabilities] Affected Software/OS: 'PHP 5.3' package(s) on SUSE Linux Enterprise Server 11-SP3, SUSE Linux Enterprise Software Development Kit 11-SP3. Solution: Please install the updated package(s). CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2014-0207 59794 http://secunia.com/advisories/59794 59831 http://secunia.com/advisories/59831 68243 http://www.securityfocus.com/bid/68243 APPLE-SA-2015-04-08-2 http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html DSA-2974 http://www.debian.org/security/2014/dsa-2974 DSA-3021 http://www.debian.org/security/2014/dsa-3021 HPSBUX03102 http://marc.info/?l=bugtraq&m=141017844705317&w=2 RHSA-2014:1765 http://rhn.redhat.com/errata/RHSA-2014-1765.html RHSA-2014:1766 http://rhn.redhat.com/errata/RHSA-2014-1766.html SSRT101681 [file] 20140612 file-5.19 is now available http://mx.gw.com/pipermail/file/2014/001553.html http://support.apple.com/kb/HT6443 http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html http://www.php.net/ChangeLog-5.php https://bugs.php.net/bug.php?id=67326 https://bugzilla.redhat.com/show_bug.cgi?id=1091842 https://github.com/file/file/commit/6d209c1c489457397a5763bca4b28e43aac90391 https://support.apple.com/HT204659 openSUSE-SU-2014:1236 http://lists.opensuse.org/opensuse-updates/2014-09/msg00046.html Common Vulnerability Exposure (CVE) ID: CVE-2014-3478 68239 http://www.securityfocus.com/bid/68239 RHSA-2014:1327 http://rhn.redhat.com/errata/RHSA-2014-1327.html https://bugs.php.net/bug.php?id=67410 https://github.com/file/file/commit/27a14bc7ba285a0a5ebfdb55e54001aa11932b08 Common Vulnerability Exposure (CVE) ID: CVE-2014-3479 68241 http://www.securityfocus.com/bid/68241 https://bugs.php.net/bug.php?id=67411 https://github.com/file/file/commit/36fadd29849b8087af9f4586f89dbf74ea45be67 Common Vulnerability Exposure (CVE) ID: CVE-2014-3480 68238 http://www.securityfocus.com/bid/68238 https://bugs.php.net/bug.php?id=67412 https://github.com/file/file/commit/40bade80cbe2af1d0b2cd0420cebd5d5905a2382 Common Vulnerability Exposure (CVE) ID: CVE-2014-3487 68120 http://www.securityfocus.com/bid/68120 https://bugs.php.net/bug.php?id=67413 https://github.com/file/file/commit/93e063ee374b6a75729df9e7201fb511e47e259d Common Vulnerability Exposure (CVE) ID: CVE-2014-3515 BugTraq ID: 68237 http://www.securityfocus.com/bid/68237 Debian Security Information: DSA-2974 (Google Search) HPdes Security Advisory: HPSBUX03102 HPdes Security Advisory: SSRT101681 RedHat Security Advisories: RHSA-2014:1765 RedHat Security Advisories: RHSA-2014:1766 http://secunia.com/advisories/60998 SuSE Security Announcement: openSUSE-SU-2014:1236 (Google Search) Common Vulnerability Exposure (CVE) ID: CVE-2014-4670 Debian Security Information: DSA-3008 (Google Search) http://www.debian.org/security/2014/dsa-3008 RedHat Security Advisories: RHSA-2014:1326 http://rhn.redhat.com/errata/RHSA-2014-1326.html RedHat Security Advisories: RHSA-2014:1327 http://secunia.com/advisories/54553 http://secunia.com/advisories/60696 SuSE Security Announcement: openSUSE-SU-2014:0945 (Google Search) http://lists.opensuse.org/opensuse-updates/2014-07/msg00035.html Common Vulnerability Exposure (CVE) ID: CVE-2014-4698 Common Vulnerability Exposure (CVE) ID: CVE-2014-4721 http://twitter.com/mikispag/statuses/485713462258302976 https://www.sektioneins.de/en/blog/14-07-04-phpinfo-infoleak.html |
Copyright | Copyright (C) 2021 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |