Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.4.2014.0938.1
Category:SuSE Local Security Checks
Title:SUSE: Security Advisory (SUSE-SU-2014:0938-1)
Summary:The remote host is missing an update for the 'PHP 5.3' package(s) announced via the SUSE-SU-2014:0938-1 advisory.
Description:Summary:
The remote host is missing an update for the 'PHP 5.3' package(s) announced via the SUSE-SU-2014:0938-1 advisory.

Vulnerability Insight:
PHP 5.3 has been updated to fix several security problems:

*

CVE-2014-3515: The SPL component in PHP incorrectly anticipated that certain data structures will have the array data type after unserialization, which allowed remote attackers to execute arbitrary code via a crafted string that triggers use of a Hashtable destructor, related to 'type confusion' issues in (1) ArrayObject and (2) SPLObjectStorage.

*

CVE-2014-0207: The cdf_read_short_sector function in cdf.c in file before 5.19, as used in the Fileinfo component in PHP allowed remote attackers to cause a denial of service (assertion failure and application exit) via a crafted CDF file.

*

CVE-2014-3478: Buffer overflow in the mconvert function in softmagic.c in file before 5.19, as used in the Fileinfo component in PHP allowed remote attackers to cause a denial of service (application crash)
via a crafted Pascal string in a FILE_PSTRING conversion.

*

CVE-2014-3479: The cdf_check_stream_offset function in cdf.c in file before 5.19, as used in the Fileinfo component in PHP relied on incorrect sector-size data, which allowed remote attackers to cause a denial of service (application crash) via a crafted stream offset in a CDF file.

*

CVE-2014-3480: The cdf_count_chain function in cdf.c in file before 5.19, as used in the Fileinfo component in PHP did not properly validate sector-count data, which allowed remote attackers to cause a denial of service (application crash) via a crafted CDF file.

*

CVE-2014-3487: The cdf_read_property_info function in file before 5.19, as used in the Fileinfo component in PHP did not properly validate a stream offset, which allowed remote attackers to cause a denial of service
(application crash) via a crafted CDF file.

*

CVE-2014-4670: Use-after-free vulnerability in ext/spl/spl_dllist.c in the SPL component in PHP allowed context-dependent attackers to cause a denial of service or possibly have unspecified other impact via crafted iterator usage within applications in certain web-hosting environments.

*

CVE-2014-4698: Use-after-free vulnerability in ext/spl/spl_array.c in the SPL component in PHP allowed context-dependent attackers to cause a denial of service or possibly have unspecified other impact via crafted ArrayIterator usage within applications in certain web-hosting environments.

*

CVE-2014-4721: The phpinfo implementation in ext/standard/info.c in PHP did not ensure use of the string data type for the PHP_AUTH_PW,
PHP_AUTH_TYPE, PHP_AUTH_USER, and PHP_SELF variables, which might allow context-dependent attackers to obtain sensitive information from process memory by using the integer data type with crafted values, related to a
'type confusion' vulnerability, as demonstrated by reading a private SSL key in an Apache HTTP Server web-hosting environment with mod_ssl and a PHP 5.3.x mod_php.

Security Issues:

* CVE-2014-0207
* CVE-2014-3478
... [Please see the references for more information on the vulnerabilities]

Affected Software/OS:
'PHP 5.3' package(s) on SUSE Linux Enterprise Server 11-SP3, SUSE Linux Enterprise Software Development Kit 11-SP3.

Solution:
Please install the updated package(s).

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2014-0207
59794
http://secunia.com/advisories/59794
59831
http://secunia.com/advisories/59831
68243
http://www.securityfocus.com/bid/68243
APPLE-SA-2015-04-08-2
http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html
DSA-2974
http://www.debian.org/security/2014/dsa-2974
DSA-3021
http://www.debian.org/security/2014/dsa-3021
HPSBUX03102
http://marc.info/?l=bugtraq&m=141017844705317&w=2
RHSA-2014:1765
http://rhn.redhat.com/errata/RHSA-2014-1765.html
RHSA-2014:1766
http://rhn.redhat.com/errata/RHSA-2014-1766.html
SSRT101681
[file] 20140612 file-5.19 is now available
http://mx.gw.com/pipermail/file/2014/001553.html
http://support.apple.com/kb/HT6443
http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.php.net/ChangeLog-5.php
https://bugs.php.net/bug.php?id=67326
https://bugzilla.redhat.com/show_bug.cgi?id=1091842
https://github.com/file/file/commit/6d209c1c489457397a5763bca4b28e43aac90391
https://support.apple.com/HT204659
openSUSE-SU-2014:1236
http://lists.opensuse.org/opensuse-updates/2014-09/msg00046.html
Common Vulnerability Exposure (CVE) ID: CVE-2014-3478
68239
http://www.securityfocus.com/bid/68239
RHSA-2014:1327
http://rhn.redhat.com/errata/RHSA-2014-1327.html
https://bugs.php.net/bug.php?id=67410
https://github.com/file/file/commit/27a14bc7ba285a0a5ebfdb55e54001aa11932b08
Common Vulnerability Exposure (CVE) ID: CVE-2014-3479
68241
http://www.securityfocus.com/bid/68241
https://bugs.php.net/bug.php?id=67411
https://github.com/file/file/commit/36fadd29849b8087af9f4586f89dbf74ea45be67
Common Vulnerability Exposure (CVE) ID: CVE-2014-3480
68238
http://www.securityfocus.com/bid/68238
https://bugs.php.net/bug.php?id=67412
https://github.com/file/file/commit/40bade80cbe2af1d0b2cd0420cebd5d5905a2382
Common Vulnerability Exposure (CVE) ID: CVE-2014-3487
68120
http://www.securityfocus.com/bid/68120
https://bugs.php.net/bug.php?id=67413
https://github.com/file/file/commit/93e063ee374b6a75729df9e7201fb511e47e259d
Common Vulnerability Exposure (CVE) ID: CVE-2014-3515
BugTraq ID: 68237
http://www.securityfocus.com/bid/68237
Debian Security Information: DSA-2974 (Google Search)
HPdes Security Advisory: HPSBUX03102
HPdes Security Advisory: SSRT101681
RedHat Security Advisories: RHSA-2014:1765
RedHat Security Advisories: RHSA-2014:1766
http://secunia.com/advisories/60998
SuSE Security Announcement: openSUSE-SU-2014:1236 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2014-4670
Debian Security Information: DSA-3008 (Google Search)
http://www.debian.org/security/2014/dsa-3008
RedHat Security Advisories: RHSA-2014:1326
http://rhn.redhat.com/errata/RHSA-2014-1326.html
RedHat Security Advisories: RHSA-2014:1327
http://secunia.com/advisories/54553
http://secunia.com/advisories/60696
SuSE Security Announcement: openSUSE-SU-2014:0945 (Google Search)
http://lists.opensuse.org/opensuse-updates/2014-07/msg00035.html
Common Vulnerability Exposure (CVE) ID: CVE-2014-4698
Common Vulnerability Exposure (CVE) ID: CVE-2014-4721
http://twitter.com/mikispag/statuses/485713462258302976
https://www.sektioneins.de/en/blog/14-07-04-phpinfo-infoleak.html
CopyrightCopyright (C) 2021 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.