Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Gentoo Security Advisory GLSA 201001-03 (php)

Information

Severity

Severity

Critical

Family

Family

Gentoo Local Security Checks

CVSSv2 Base

CVSSv2 Base

10.0

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:L/Au:N/C:C/I:C/A:C

Solution Type

Solution Type

Vendor Patch

Created

Created

14 years ago

Modified

Modified

6 years ago

Summary

The remote host is missing updates announced in advisory GLSA 201001-03.

Insight

Insight

Multiple vulnerabilities were found in PHP, the worst of which leading to the remote execution of arbitrary code.

Solution

Solution

All PHP users should upgrade to the latest version. As PHP is statically linked against a vulnerable version of the c-client library when the imap or kolab USE flag is enabled (GLSA 200911-03), users should upgrade net-libs/c-client beforehand: # emerge --sync # emerge --ask --oneshot --verbose '>=net-libs/c-client-2007e' # emerge --ask --oneshot --verbose '>=dev-lang/php-5.2.12' http://www.securityspace.com/smysecure/catid.html?in=GLSA%20201001-03 http://bugs.gentoo.org/show_bug.cgi?id=249875 http://bugs.gentoo.org/show_bug.cgi?id=255121 http://bugs.gentoo.org/show_bug.cgi?id=260576 http://bugs.gentoo.org/show_bug.cgi?id=261192 http://bugs.gentoo.org/show_bug.cgi?id=266125 http://bugs.gentoo.org/show_bug.cgi?id=274670 http://bugs.gentoo.org/show_bug.cgi?id=280602 http://bugs.gentoo.org/show_bug.cgi?id=285434 http://bugs.gentoo.org/show_bug.cgi?id=292132 http://bugs.gentoo.org/show_bug.cgi?id=293888 http://bugs.gentoo.org/show_bug.cgi?id=297369 http://bugs.gentoo.org/show_bug.cgi?id=297370 http://www.gentoo.org/security/en/glsa/glsa-200911-03.xml