PHP 5.x < 5.1.0 Multiple Vulnerabilities

This script is Copyright (C) 2011-2013 Tenable Network Security, Inc.


Synopsis :

The remote web server uses a version of PHP that is affected by
multiple vulnerabilities.

Description :

According to its banner, the version of PHP 5.x installed on the
remote host is older than 5.1.0. Such versions may be affected by
multiple vulnerabilities :

- A cross-site scripting vulnerability exists in
phpinfo().

- Multiple safe_mode/open_basedir bypass vulnerabilities
exist in ext/curl and ext/gd.

- It is possible to overwrite $GLOBALS due to an issue in
file upload handling, extract(), and
import_request_variables().

- An issue exists when a request is terminated due to
memory_limit constraints during certain parse_str()
calls, which could lead to register globals being turned
on.

- An issue exists with trailing slashes in allowed
basedirs.

- An issue exists with calling virtual() on Apache 2, which
allows an attacker to bypass certain configuration
directives like safe_mode or open_basedir.

- A possible header injection exists in the mb_send_mail()
function.

- The apache2handler SAPI in the Apache module allows
attackers to cause a denial of service.

See also :

http://www.php.net/releases/5_1_0.php

Solution :

Upgrade to PHP version 5.1.0 or later.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)
CVSS Temporal Score : 4.3
(CVSS2#E:H/RL:OF/RC:ND)
Public Exploit Available : true

Family: CGI abuses

Nessus Plugin ID: 17711 ()

Bugtraq ID: 15177
15571

CVE ID: CVE-2005-3319
CVE-2005-3883