Vulnerability Scanning Solutions, LLC.
Home
Our Process
Residential
Corporate
What We Scan For
Sample Report
Client List
Terms
Contact Us
What We Scan For
Family: Fedora Local Security Checks --> Category: infos

Fedora Core 5 2006-1024: php Vulnerability Scan


Vulnerability Scan Summary
Check for the version of the php package

Detailed Explanation for this Vulnerability Test

The remote host is missing the patch for the advisory FEDORA-2006-1024 (php).

PHP is an HTML-embedded scripting language. PHP attempts to make it
easy for developers to write dynamically generated webpages. PHP also
offers built-in database integration for several commercial and
non-commercial database management systems, so writing a
database-enabled webpage with PHP is fairly simple. The most common
use of PHP coding is probably as a replacement for CGI scripts. The
mod_php module enables the Apache Web server to understand and process
the embedded PHP language in Web pages.

Update Information:

This update includes the latest upstream release of PHP 5.1,
version 5.1.6, fixing a number of security vulnerabilities,
and other bugs.

An integer overflow was discovered in the PHP memory
handling routines. If a script can cause memory allocation
based on untrusted user data, a remote attacker sending a
carefully crafted request could execute arbitrary code
as the 'apache' user. (CVE-2006-4812)

A buffer overflow was discovered in the PHP sscanf()
function. If a script used the sscanf() function with
positional arguments in the format string, a remote attacker
sending a carefully crafted request could execute arbitrary
code as the 'apache' user. (CVE-2006-4020)

An integer overflow was discovered in the PHP wordwrap() and
str_repeat() functions. If a script running on a 64-bit
server used either of these functions on untrusted user
data, a remote attacker sending a carefully crafted request
might be able to cause a heap overflow. (CVE-2006-4482)

A buffer overflow was discovered in the PHP gd extension. If
a script was set up to process GIF images from untrusted
sources using the gd extension, a remote attacker could
cause a heap overflow. (CVE-2006-4484)

A buffer overread was discovered in the PHP stripos()
function. If a script used the stripos() function with
untrusted user data, PHP may read past the end of a buffer,
which could allow a denial of service attack by a remote
user. (CVE-2006-4485)

An integer overflow was discovered in the PHP memory
allocation handling. On 64-bit platforms, the 'memory_limit'
setting was not enforced correctly, which could allow a
denial of service attack by a remote user. (CVE-2006-4486)


Solution : Get the newest Fedora Updates
Threat Level: High

Click HERE for more information and discussions on this network vulnerability scan.

VSS, LLC.

P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.