Summary
The remote host is missing an update to php4
announced via advisory DSA 1578-1.
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201578-1
Insight
Several vulnerabilities have been discovered in PHP version 4, a server-side, HTML-embedded scripting language. The Common Vulnerabilities and Exposures project identifies the following problems:
CVE-2007-3799
The session_start function allows remote attackers to insert arbitrary attributes into the session cookie via special characters in a cookie that is obtained from various parameters.
CVE-2007-3806
A denial of service was possible through a malicious script abusing the glob() function.
CVE-2007-3998
Certain maliciously constructed input to the wordwrap() function could lead to a denial of service attack.
CVE-2007-4657
Large len values of the stspn() or strcspn() functions could allow an attacker to trigger integer overflows to expose memory or cause denial of service.
CVE-2008-2051
The escapeshellcmd API function could be attacked via incomplete multibyte chars.
For the stable distribution (etch), these problems have been fixed in version 6:4.4.4-8+etch6.
The php4 are no longer present the unstable distribution (sid).
We recommend that you upgrade your php4 package.
Severity
Classification
-
CVE CVE-2007-3799, CVE-2007-3806, CVE-2007-3998, CVE-2007-4657, CVE-2008-2051 -
CVSS Base Score: 10.0
AV:N/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities