Summary
This host is installed with PHP and is
prone to multiple vulnerabilities.
Impact
Successful exploitation will allow remote
attackers to cause a denial of service or possibly execute arbitrary code via different crafted dimensions.
Impact Level: Application
Solution
Upgrade to PHP version 5.4.34 or 5.5.18
or 5.6.2 or later
Insight
Multiple flaws are due to,
- The exif_ifd_make_value function in exif.c in the EXIF extension in PHP operates on floating-point arrays incorrectly.
- Integer overflow in the object_custom function in ext/standard/var _unserializer.c in PHP.
- Buffer overflow in the date_from_ISO8601 function in the mkgmtime implementation in libxmlrpc/xmlrpc.c in the XMLRPC extension in PHP.
Affected
PHP versions 5.4.x before 5.4.34, 5.5.x
before 5.5.18, and 5.6.x before 5.6.2
Detection
Get the installed version with the
help of detect NVT and check the version is vulnerable or not.
Severity
Classification
-
CVE CVE-2014-3668, CVE-2014-3669, CVE-2014-3670 -
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities
- Apache Struts2 'URL' & 'Anchor' tags Arbitrary Java Method Execution Vulnerabilities
- AlienVault OSSIM 'date_from' Parameter Multiple SQL Injection Vulnerabilities
- AlefMentor Multiple SQL Injection Vulnerabilities
- Arkeia Appliance Path Traversal Vulnerability
- Atmail Multiple Unspecified Security Vulnerabilities.