Family: Debian Local Security Checks --> Category: infos
[DSA531] DSA-531-1 php4 Vulnerability Scan
Vulnerability Scan Summary
Detailed Explanation for this Vulnerability Test
Two vulnerabilities were discovered in php4:
The memory_limit functionality in PHP 4.x up to
4.3.7, and 5.x up to 5.0.0RC3, under certain conditions such as
when register_globals is enabled, allows remote attackers to
execute arbitrary code by triggering a memory_limit abort during
execution of the zend_hash_init function and overwriting a
HashTable destructor pointer before the initialization of key data
structures is complete.
The strip_tags function in PHP 4.x up to 4.3.7, and
5.x up to 5.0.0RC3, does not filter null (\0) characters within tag
names when restricting input to allowed tags, which allows
dangerous tags to be processed by web browsers such as Internet
Explorer and Safari, which ignore null characters and facilitate
the exploitation of cross-site scripting (XSS) vulnerabilities.
For the current stable distribution (woody), these problems have been
fixed in version 4.1.2-7.
For the unstable distribution (sid), these problems have been fixed in
We recommend that you update your php4 package.
Solution : http://www.debian.org/security/2004/dsa-531
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.