Summary
The remote host is missing an update to php5
announced via advisory DSA 2266-1.
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202266-1
Insight
Several vulnerabilities were discovered in PHP, which could lead to denial of service or potentially the execution of arbitrary code.
CVE-2010-2531
An information leak was found in the var_export() function.
CVE-2011-0421
The Zip module could crash.
CVE-2011-0708
An integer overflow was discovered in the Exif module.
CVE-2011-1466
An integer overflow was discovered in the Calendar module.
CVE-2011-1471
The Zip module was prone to denial of service through malformed archives.
CVE-2011-2202
Path names in form based file uploads (RFC 1867) were incorrectly validated.
This update also fixes two bugs, which are not treated as security issues, but fixed nonetheless, see README.Debian.security for details on the scope of security support for PHP (CVE-2011-0420, CVE-2011-1153).
For the oldstable distribution (lenny), this problem has been fixed in version 5.2.6.dfsg.1-1+lenny12.
For the stable distribution (squeeze), this problem has been fixed in version 5.3.3-7+squeeze3.
For the unstable distribution (sid), this problem has been fixed in version 5.3.6-12.
We recommend that you upgrade your php5 packages.
Severity
Classification
-
CVE CVE-2010-2531, CVE-2011-0420, CVE-2011-0421, CVE-2011-0708, CVE-2011-1153, CVE-2011-1466, CVE-2011-1471, CVE-2011-2202 -
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities