|
Family: Ubuntu Local Security Checks --> Category: infos
USN207-1 : php4 vulnerability Vulnerability Scan
Vulnerability Scan Summary php4 vulnerability
Detailed Explanation for this Vulnerability Test
Synopsis :
These remote packages are missing security patches :
- libapache-mod-php4
- libapache2-mod-php4
- php4
- php4-cgi
- php4-cli
- php4-common
- php4-curl
- php4-dev
- php4-domxml
- php4-gd
- php4-imap
- php4-ldap
- php4-mcal
- php4-mhash
- php4-mysql
- php4-odbc
- php4-pear
- php4-recode
- php4-snmp
- php4-sybase
- php4-universe-common
- php4-xslt
Description :
A bug has been found in the handling of the open_basedir directive
handling. Contrary to the specification, the value of open_basedir
was handled as a prefix instead of a proper directory name even if it
was terminated by a slash ('/'). For example, this allowed PHP scripts
to access the directory /home/user10 when open_basedir was configured
to '/home/user1/'.
Solution :
Upgrade to :
- libapache-mod-php4-4.3.10-10ubuntu3.5 (Ubuntu 5.04)
- libapache2-mod-php4-4.3.10-10ubuntu4.2 (Ubuntu 5.04)
- php4-4.3.10-10ubuntu4.2 (Ubuntu 5.04)
- php4-cgi-4.3.10-10ubuntu4.2 (Ubuntu 5.04)
- php4-cli-4.3.10-10ubuntu4.2 (Ubuntu 5.04)
- php4-common-4.3.10-10ubuntu4.2 (Ubuntu 5.04)
- php4-curl-4.3.10-10ubuntu3.5 (Ubuntu 5.04)
- php4-dev-4.3.10-10ubuntu4.2 (Ubuntu 5.04)
- php4-domxml-4.3.10-10ubuntu3.5 (Ubuntu 5.04)
- php4-gd-4.3.10-10ubuntu3.5 (Ubuntu 5.04)
- php4-imap-4.3.10-10ubuntu3.5 (Ub
[...]
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.
|