Summary
This host is installed with PHP and is prone to remote code execution vulnerability.
Impact
Successful exploitation will allow remote attackers to allow a remote attacker to cause a heap-based buffer overflow, resulting in a denial of service.
Impact Level: Application
Solution
Upgrade to PHP version 5.5.8 or later.
For updates refer to http://www.php.net
Insight
The flaw is due to error in 'scan function' in
'ext/date/lib/parse_iso_intervals.c' which does not validate user-supplied input when handling 'DateInterval' objects.
Affected
PHP versions 5.5.6 and prior.
Detection
Get the installed version of PHP with the help of detect NVT and check the version is vulnerable or not.
References
Severity
Classification
-
CVE CVE-2013-6712 -
CVSS Base Score: 5.0
AV:N/AC:L/Au:N/C:N/I:N/A:P
Related Vulnerabilities
- Apache Struts CookBook/Examples Multiple Cross-Site Scripting Vulnerabilities
- Admidio get_file.php Remote File Disclosure Vulnerability
- Apache Tomcat DOS Device Name XSS
- Adobe JRun Management Console Multiple Vulnerabilities
- Apache Web Server Configuration File Environment Variable Local Buffer Overflow Vulnerability