Summary
The remote host is missing an update to the system as announced in the referenced advisory.
Solution
Update your system with the appropriate patches or software upgrades.
http://security.e-matters.de/advisories/112004.html http://marc.theaimsgroup.com/?l=bugtraq&m=108981780109154 http://www.vuxml.org/freebsd/dd7aa4f1-102f-11d9-8a8a-000c41e2cdad.html
Insight
The following packages are affected:
mod_php4-twig
php4
php4-cgi
php4-cli
php4-dtc
php4-horde
php4-nms
mod_php4
php5
php5-cgi
php5-cli
mod_php5
CVE-2004-0594
The memory_limit functionality in PHP 4.x up to 4.3.7, and 5.x up to 5.0.0RC3, under certain conditions such as when register_globals is enabled, allows remote attackers to execute arbitrary code by triggering a memory_limit abort during execution of the zend_hash_init function and overwriting a HashTable destructor pointer before the initialization of key data structures is complete.
Severity
Classification
-
CVE CVE-2004-0594 -
CVSS Base Score: 5.1
AV:N/AC:H/Au:N/C:P/I:P/A:P
Related Vulnerabilities