This script is Copyright (C) 2004-2013 Tenable Network Security, Inc.
The remote Mandrake Linux host is missing one or more security
A number of vulnerabilities in PHP versions prior to 4.3.10 were
discovered by Stefan Esser. Some of these vulnerabilities were not
deemed to be severe enough to warrant CVE names, however the packages
provided, with the exception of the Corporate Server 2.1 packages,
include fixes for all of the vulnerabilities, thanks to the efforts of
the OpenPKG team who extracted and backported the fixes.
The vulnerabilities fixed in all provided packages include a fix for a
possible information disclosure, double free, and negative reference
index array underflow in deserialization code (CVE-2004-1019). As
well, the exif_read_data() function suffers from an overflow on a long
sectionname; this vulnerability was discovered by Ilia Alshanetsky
The other fixes that appear in Mandrakelinux 9.2 and newer packages
include a fix for out of bounds memory write access in shmop_write()
and integer overflow/underflows in the pack() and unpack() functions.
The addslashes() function did not properly escape '�' correctly. A
directory bypass issue existed in safe_mode execution. There is an
issue of arbitrary file access through path truncation. Finally, the
'magic_quotes_gpc' functionality could lead to one level directory
traversal with file uploads.
See also :
Update the affected packages.
Risk factor :
Critical / CVSS Base Score : 10.0
Family: Mandriva Local Security Checks
Nessus Plugin ID: 15998 (mandrake_MDKSA-2004-151.nasl)
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now