Summary
The remote host is missing an update to php5
announced via advisory DSA 1572-1.
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201572-1
Insight
Several vulnerabilities have been discovered in PHP, a server-side, HTML-embedded scripting language. The Common Vulnerabilities and Exposures project identifies the following problems:
CVE-2007-3806
The glob function allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via an invalid value of the flags parameter.
CVE-2008-1384
Integer overflow allows context-dependent attackers to cause a denial of service and possibly have other impact via a printf format parameter with a large width specifier.
CVE-2008-2050
Stack-based buffer overflow in the FastCGI SAPI.
CVE-2008-2051
The escapeshellcmd API function could be attacked via incomplete multibyte chars.
This update als includes a fix which was pending for the next Debian 4.0 `etch' stable update, for crashes in php5-recode (Debian bug 459020).
For the stable distribution (etch), these problems have been fixed in version 5.2.0-8+etch11.
For the unstable distribution (sid), these problems have been fixed in version 5.2.6-1.
We recommend that you upgrade your php5 package.
Severity
Classification
-
CVE CVE-2007-3806, CVE-2008-1384, CVE-2008-2050, CVE-2008-2051 -
CVSS Base Score: 10.0
AV:N/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities