Summary
This host is installed with PHP and is prone to remote code execution vulnerability.
Impact
Successful exploitation will allow remote attackers to allow a remote attacker to cause a heap-based buffer overflow, resulting in a denial of service.
Impact Level: Application
Solution
Upgrade to PHP version 5.5.8 or later.
For updates refer to http://www.php.net
Insight
The flaw is due to error in 'scan function' in
'ext/date/lib/parse_iso_intervals.c' which does not validate user-supplied input when handling 'DateInterval' objects.
Affected
PHP versions 5.5.6 and prior.
Detection
Get the installed version of PHP with the help of detect NVT and check the version is vulnerable or not.
References
Severity
Classification
-
CVE CVE-2013-6712 -
CVSS Base Score: 5.0
AV:N/AC:L/Au:N/C:N/I:N/A:P
Related Vulnerabilities
- 2532|Gigs Directory Traversal And SQL Injection Multiple Vulnerabilities
- An Image Gallery Multiple Cross-Site Scripting Vulnerability
- 11in1 Cross Site Request Forgery and Local File Include Vulnerabilities
- Apache Tomcat HTTP BIO Connector Information Disclosure Vulnerability
- Apache mod_proxy_ajp Information Disclosure Vulnerability