Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Debian Security Advisory DSA 1578-1 (php4)

Information

Severity

Severity

Critical

Family

Family

Debian Local Security Checks

CVSSv2 Base

CVSSv2 Base

10.0

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:L/Au:N/C:C/I:C/A:C

Solution Type

Solution Type

Vendor Patch

Created

Created

15 years ago

Modified

Modified

6 years ago

Summary

The remote host is missing an update to php4 announced via advisory DSA 1578-1.

Insight

Insight

Several vulnerabilities have been discovered in PHP version 4, a server-side, HTML-embedded scripting language. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2007-3799 The session_start function allows remote attackers to insert arbitrary attributes into the session cookie via special characters in a cookie that is obtained from various parameters. CVE-2007-3806 A denial of service was possible through a malicious script abusing the glob() function. CVE-2007-3998 Certain maliciously constructed input to the wordwrap() function could lead to a denial of service attack. CVE-2007-4657 Large len values of the stspn() or strcspn() functions could allow an attacker to trigger integer overflows to expose memory or cause denial of service. CVE-2008-2051 The escapeshellcmd API function could be attacked via incomplete multibyte chars. For the stable distribution (etch), these problems have been fixed in version 6:4.4.4-8+etch6. The php4 are no longer present the unstable distribution (sid). We recommend that you upgrade your php4 package.

Solution

Solution

https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201578-1

Common Vulnerabilities and Exposures (CVE)