This script is Copyright (C) 2004-2013 Tenable Network Security, Inc.
The remote Debian host is missing a security-related update.
Two vulnerabilities were discovered in php4 :
The memory_limit functionality in PHP 4.x up to 4.3.7,
and 5.x up to 5.0.0RC3, under certain conditions such as
when register_globals is enabled, allows remote
attackers to execute arbitrary code by triggering a
memory_limit abort during execution of the
zend_hash_init function and overwriting a HashTable
destructor pointer before the initialization of key data
structures is complete.
The strip_tags function in PHP 4.x up to 4.3.7, and 5.x
up to 5.0.0RC3, does not filter null (\0) characters
within tag names when restricting input to allowed tags,
which allows dangerous tags to be processed by web
browsers such as Internet Explorer and Safari, which
ignore null characters and facilitate the exploitation
of cross-site scripting (XSS) vulnerabilities.
See also :
For the current stable distribution (woody), these problems have been
fixed in version 4.1.2-7.
We recommend that you update your php4 package.
Risk factor :
Medium / CVSS Base Score : 6.8
Public Exploit Available : true