Ubuntu 10.04 LTS / 12.04 LTS / 13.10 / 14.04 LTS : php5 vulnerabilities (USN-2276-1)

Ubuntu Security Notice (C) 2014-2016 Canonical, Inc. / NASL script (C) 2014-2016 Tenable Network Security, Inc.


Synopsis :

The remote Ubuntu host is missing one or more security-related
patches.

Description :

Francisco Alonso discovered that the PHP Fileinfo component
incorrectly handled certain CDF documents. A remote attacker could use
this issue to cause PHP to hang or crash, resulting in a denial of
service. (CVE-2014-0207, CVE-2014-3478, CVE-2014-3479, CVE-2014-3480,
CVE-2014-3487)

Stefan Esser discovered that PHP incorrectly handled unserializing SPL
extension objects. An attacker could use this issue to execute
arbitrary code. (CVE-2014-3515)

It was discovered that PHP incorrectly handled certain SPL Iterators.
An attacker could use this issue to cause PHP to crash, resulting in a
denial of service. (CVE-2014-4670)

It was discovered that PHP incorrectly handled certain ArrayIterators.
An attacker could use this issue to cause PHP to crash, resulting in a
denial of service. (CVE-2014-4698)

Stefan Esser discovered that PHP incorrectly handled variable types
when calling phpinfo(). An attacker could use this issue to possibly
gain access to arbitrary memory, possibly containing sensitive
information. (CVE-2014-4721).

Note that Tenable Network Security has extracted the preceding
description block directly from the Ubuntu security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.

Solution :

Update the affected packages.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 6.5
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : false

Ready to Scan Unlimited IPs & Run Compliance Checks?

Upgrade to Nessus Professional today!

Buy Now

Combine the Power of Nessus with the Ease of Cloud

Start your free Nessus Cloud trial now!

Begin Free Trial