Zend Session Clustering Daemon PHP Session Identifier Remote Overflow

This script is Copyright (C) 2006-2016 Tenable Network Security, Inc.

Synopsis :

The remote server is affected by a buffer overflow vulnerability.

Description :

The version of Zend's Session Clustering daemon on the remote host
contains a buffer overflow that can be exploited by an attacker using
a specially crafted session id to crash the affected service and even
execute arbitrary code subject to the permissions of the user id
running it.

See also :


Solution :

Upgrade to Zend Platform version 2.2.1a or later.

Risk factor :

High / CVSS Base Score : 7.5
CVSS Temporal Score : 6.4
Public Exploit Available : false

Family: Gain a shell remotely

Nessus Plugin ID: 22273 ()

Bugtraq ID: 19692

CVE ID: CVE-2006-4431

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now