This script is Copyright (C) 2007-2015 Tenable Network Security, Inc.
The remote Fedora Core host is missing a security update.
This update includes the latest release of PHP 5, version 5.1.4. This
release includes fixes for several security issues and many bug fixes.
The phpinfo() PHP function did not properly sanitize long strings. An
attacker could use this to perform cross-site scripting attacks
against sites that have publicly-available PHP scripts that call
The html_entity_decode() PHP function was found to not be binary safe.
An attacker could use this flaw to disclose a certain part of the
memory. In order for this issue to be exploitable the target site
would need to have a PHP script which called the
'html_entity_decode()' function with untrusted input from the user and
displayed the result. (CVE-2006-1490)
Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.
See also :
Update the affected packages.
Risk factor :
Family: Fedora Local Security Checks
Nessus Plugin ID: 24083 (fedora_2006-289.nasl)
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now