Debian Security Advisory DSA 1578-1 (php4)

Information

Severity

Severity

Critical

Family

Family

Debian Local Security Checks

CVSSv2 Base

CVSSv2 Base

10.0

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:L/Au:N/C:C/I:C/A:C

Solution Type

Solution Type

Vendor Patch

Created

Created

13 years ago

Modified

Modified

4 years ago

Summary

The remote host is missing an update to php4 announced via advisory DSA 1578-1.

Insight

Insight

Several vulnerabilities have been discovered in PHP version 4, a server-side, HTML-embedded scripting language. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2007-3799 The session_start function allows remote attackers to insert arbitrary attributes into the session cookie via special characters in a cookie that is obtained from various parameters. CVE-2007-3806 A denial of service was possible through a malicious script abusing the glob() function. CVE-2007-3998 Certain maliciously constructed input to the wordwrap() function could lead to a denial of service attack. CVE-2007-4657 Large len values of the stspn() or strcspn() functions could allow an attacker to trigger integer overflows to expose memory or cause denial of service. CVE-2008-2051 The escapeshellcmd API function could be attacked via incomplete multibyte chars. For the stable distribution (etch), these problems have been fixed in version 6:4.4.4-8+etch6. The php4 are no longer present the unstable distribution (sid). We recommend that you upgrade your php4 package.

Solution

Solution

https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201578-1

Common Vulnerabilities and Exposures (CVE)

Download Mageni to scan and fix this vulnerability. It is free and easy.

Processing. Please wait...

Free for 7-days then $4 USD monthly regardless of how many IPs, scans, users, or deployments you have. No Contracts, Cancel at Anytime and 7-days Money-Back Guarantee.