Family: SuSE Local Security Checks --> Category: infos
SUSE-SA:2006:059: php4,php5 Vulnerability Scan
Vulnerability Scan Summary
Check for the version of the php4,php5 package
Detailed Explanation for this Vulnerability Test
The remote host is missing the patch for the advisory SUSE-SA:2006:059 (php4,php5).
The ini_restore() method could be exploited to reset options such as
open_basedir when set via the web server config file to their default
value set in php.ini (CVE-2006-4625).
Additionally php5 on all products as well as php4 on SLES8 were
vulnerable to an integer overflow problem in the memory
allocation routine. This bug can be exploited to execute
arbitrary code with the uid of the web server (CVE-2006-4812).
Thanks to Stefan Esser for reporting the problem.
Solution : http://www.suse.de/security/http://www.novell.com/linux/security/advisories/2006_59_php.html
Threat Level: Medium
Click HERE for more information and discussions on this network vulnerability scan.