Zend Session Clustering Daemon PHP Session Identifier Remote Overflow

This script is Copyright (C) 2006-2011 Tenable Network Security, Inc.


Synopsis :

The remote server is affected by a buffer overflow vulnerability.

Description :

The version of Zend's Session Clustering daemon on the remote host
contains a buffer overflow that can be exploited by an attacker using
a specially crafted session id to crash the affected service and even
execute arbitrary code subject to the permissions of the user id
running it.

See also :

http://www.hardened-php.net/advisory_052006.128.html
http://www.securityfocus.com/archive/1/444263/30/0/threaded

Solution :

Upgrade to Zend Platform version 2.2.1a or later.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 6.4
(CVSS2#E:U/RL:U/RC:C)
Public Exploit Available : false

Family: Gain a shell remotely

Nessus Plugin ID: 22273 ()

Bugtraq ID: 19692

CVE ID: CVE-2006-4431