Summary
This host is installed with PHP and is
prone to use-after-free vulnerability.
Impact
Successful exploitation will allow remote
attackers to execute arbitrary code via a crafted unserialize call.
Impact Level: Application
Solution
Upgrade to PHP version 5.4.36
or 5.5.20 or 5.6.4 or later
Insight
The flaw is due to Use-after-free
vulnerability in the process_nested_data function in ext/standard/var _unserializer.re in PHP.
Affected
PHP versions 5.4.x before 5.4.36,
5.5.x before 5.5.20 and 5.6.x before 5.6.4
Detection
Get the installed version with the
help of detect NVT and check the version is vulnerable or not.
References
Severity
Classification
-
CVE CVE-2014-8142 -
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities
- AV Arcade 'ava_code' Cookie Parameter SQL Injection Vulnerability
- AlienVault OSSIM 'date_from' Parameter Multiple SQL Injection Vulnerabilities
- Allegro RomPager `Misfortune Cookie` Vulnerability
- Andy's PHP Knowledgebase 's' Parameter SQL Injection Vulnerability
- Apple Safari RSS Feed Information Disclosure Vulnerability