Summary
This host is installed with PHP and is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow remote attackers to conduct denial of service attacks or potentially execute arbitrary code.
Impact Level: Application
Solution
Upgrade to PHP version 5.4.30 or 5.5.14 or later,
For updates refer to http://php.net
Insight
The flaws exist due to,
- A buffer overflow in the 'mconvert' function in softmagic.c script.
- Two type confusion errors when deserializing ArrayObject and SPLObjectStorage objects.
- An unspecified boundary check issue in the 'cdf_read_short_sector' function related to Fileinfo.
- Some boundary checking issues in the 'cdf_read_property_info', 'cdf_count_chain' and 'cdf_check_stream_offset' functions in cdf.c related to Fileinfo.
Affected
PHP version 5.4.x before 5.4.30 and 5.5.x before 5.5.14
Detection
Get the installed version of PHP with the help of detect NVT and check the version is vulnerable or not.
References
Severity
Classification
-
CVE CVE-2014-0207, CVE-2014-3478, CVE-2014-3479, CVE-2014-3480, CVE-2014-3487, CVE-2014-3515 -
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities