|
Family: Ubuntu Local Security Checks --> Category: infos
USN99-1 : php4 vulnerabilities Vulnerability Scan
Vulnerability Scan Summary php4 vulnerabilities
Detailed Explanation for this Vulnerability Test
Synopsis :
These remote packages are missing security patches :
- libapache2-mod-php4
- php4
- php4-cgi
- php4-curl
- php4-dev
- php4-domxml
- php4-gd
- php4-ldap
- php4-mcal
- php4-mhash
- php4-mysql
- php4-odbc
- php4-pear
- php4-recode
- php4-snmp
- php4-sybase
- php4-xslt
Description :
Stefano Di Paola discovered integer overflows in PHP's pack() and
unpack() functions. A malicious PHP script could exploit these to
break out of safe mode and execute arbitrary code with the rights
of the PHP interpreter. (CVE-2004-1018)
Note: The second part of CVE-2004-1018 (buffer overflow in the
shmop_write() function) was already fixed in USN-66-1.
Stefan Esser discovered two safe mode bypasses which allowed malicious
PHP scripts to circumvent path restrictions. This was possible by
either using virtual_popen() with a current directory containing shell
metacharacters (CVE-2004-1063) or creating a specially crafted
directory whose length exceeded the capacity of the realpath()
function (CVE-2004-1064).
Solution :
Upgrade to :
- libapache2-mod-php4-4.3.8-3ubuntu7.5 (Ubuntu 4.10)
- php4-4.3.8-3ubuntu7.5 (Ubuntu 4.10)
- php4-cgi-4.3.8-3ubuntu7.5 (Ubuntu 4.10)
- php4-curl-4.3.8-3ubuntu7.5 (Ubuntu 4.10)
- php4-dev-4.3.8-3ubuntu7.5 (Ubuntu 4.10)
- php4-domxml-4.3.8-3ubuntu7.5 (Ubuntu 4.10)
- php4-gd-4.3.8-3ubuntu7.5 (Ubuntu 4.10)
- php4-ldap-4.3.8-3ubuntu7.5 (Ubuntu 4.10)
- php4-mcal-4.3.8-3ubuntu7.5 (Ubuntu 4.10)
- php4-mhash-4.3.8-3ubuntu7.5 (Ubuntu 4.10)
- php4-mysql-4.3.8-3ubuntu7.5 (Ubuntu 4.10)
- php4-odbc-4.3.8-3
[...]
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.
|