CentOS 3 / 4 : php (CESA-2006:0730)

high Nessus Plugin ID 37281

Synopsis

The remote CentOS host is missing one or more security updates.

Description

Updated PHP packages that fix a security issue are now available.

This update has been rated as having important security impact by the Red Hat Security Response Team.

PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Web server.

The Hardened-PHP Project discovered an overflow in the PHP htmlentities() and htmlspecialchars() routines. If a PHP script used the vulnerable functions to parse UTF-8 data, a remote attacker sending a carefully crafted request could trigger the overflow and potentially execute arbitrary code as the 'apache' user.
(CVE-2006-5465)

Users of PHP should upgrade to these updated packages which contain a backported patch to correct this issue.

Solution

Update the affected php packages.

See Also

http://www.nessus.org/u?992951c1

http://www.nessus.org/u?3e16d410

http://www.nessus.org/u?fea975bb

http://www.nessus.org/u?42467017

http://www.nessus.org/u?5f38cb90

http://www.nessus.org/u?9cf3ca71

Plugin Details

Severity: High

ID: 37281

File Name: centos_RHSA-2006-0730.nasl

Version: 1.13

Type: local

Agent: unix

Published: 4/23/2009

Updated: 1/4/2021

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.5

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:centos:centos:php, p-cpe:/a:centos:centos:php-devel, p-cpe:/a:centos:centos:php-domxml, p-cpe:/a:centos:centos:php-gd, p-cpe:/a:centos:centos:php-imap, p-cpe:/a:centos:centos:php-ldap, p-cpe:/a:centos:centos:php-mbstring, p-cpe:/a:centos:centos:php-mysql, p-cpe:/a:centos:centos:php-ncurses, p-cpe:/a:centos:centos:php-odbc, p-cpe:/a:centos:centos:php-pear, p-cpe:/a:centos:centos:php-pgsql, p-cpe:/a:centos:centos:php-snmp, p-cpe:/a:centos:centos:php-xmlrpc, cpe:/o:centos:centos:3, cpe:/o:centos:centos:4

Required KB Items: Host/local_checks_enabled, Host/CentOS/release, Host/CentOS/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 11/7/2006

Vulnerability Publication Date: 11/3/2006

Reference Information

CVE: CVE-2006-5465

BID: 20879

RHSA: 2006:0730