Summary
The remote host is missing an update to php4
announced via advisory DSA 531-1.
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20531-1
Insight
Two vulnerabilities were discovered in php4:
- CVE-2004-0594 - The memory_limit functionality in PHP 4.x up to 4.3.7, and 5.x up to 5.0.0RC3, under certain conditions such as when register_globals is enabled, allows remote attackers to execute arbitrary code by triggering a memory_limit abort during execution of the zend_hash_init function and overwriting a HashTable destructor pointer before the initialization of key data structures is complete.
- CVE-2004-0595 - The strip_tags function in PHP 4.x up to 4.3.7, and 5.x up to 5.0.0RC3, does not filter null (\0) characters within tag names when restricting input to allowed tags, which allows dangerous tags to be processed by web browsers such as Internet Explorer and Safari, which ignore null characters and facilitate the exploitation of cross-site scripting (XSS) vulnerabilities.
For the current stable distribution (woody), these problems have been fixed in version 4.1.2-7.
For the unstable distribution (sid), these problems have been fixed in version 4:4.3.8-1.
We recommend that you update your php4 package.
Severity
Classification
-
CVE CVE-2004-0594, CVE-2004-0595 -
CVSS Base Score: 6.8
AV:N/AC:M/Au:N/C:P/I:P/A:P
Related Vulnerabilities