Ubuntu Security Notice (C) 2005-2013 Canonical, Inc. / NASL script (C) 2006-2013 Tenable Network Security, Inc.
The remote Ubuntu host is missing one or more security-related patches.
Ubuntu Security Notice USN-66-1 described a circumvention of the
'open_basedir' restriction by using the cURL module. Adam Conrad
discovered that the fix from USN-66-1 still allowed to bypass this
restriction with certain variants of path specifications.
In addition this update fixes the crash of the PHP interpreter if
curl_init() was called without parameters.
For reference, this is the relevant part of the original advisory :
FraMe from kernelpanik.org reported that the cURL module does not
respect open_basedir restrictions. As a result, scripts which used
cURL to open files with an user-specified path could read arbitrary
local files outside of the open_basedir directory.
Update the affected packages.
Risk factor :
Family: Ubuntu Local Security Checks
Nessus Plugin ID: 20686 ()
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.