Family: Debian Local Security Checks --> Category: infos
[DSA1206] DSA-1206-1 php4 Vulnerability Scan
Vulnerability Scan Summary
Detailed Explanation for this Vulnerability Test
Several remote vulnerabilities have been discovered in PHP, a
server-side, HTML-embedded scripting language, which may lead to the
execution of arbitrary code. The Common Vulnerabilities and Exposures
project identifies the following problems:
Tim Starling discovered that missing input sanitising in the EXIF
module could lead to denial of service.
Stefan Esser discovered a security-critical programming error in the
hashtable implementation of the internal Zend engine.
It was discovered that str_repeat() and wordwrap() functions perform
insufficient checks for buffer boundaries on 64 bit systems, which
might lead to the execution of arbitrary code.
Stefan Esser discovered a buffer overflow in the htmlspecialchars()
and htmlentities(), which might lead to the execution of arbitrary
For the stable distribution (sarge) these problems have been fixed in
version 4:4.3.10-18. Builds for hppa and m68k will be provided later
once they are available.
For the unstable distribution (sid) these problems have been fixed in
version 4:4.4.4-4 of php4 and version 5.1.6-6 of php5.
We recommend that you upgrade your php4 packages.
Solution : http://www.debian.org/security/2006/dsa-1206
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.