FreeBSD : php -- multiple vulnerabilities (f5e52bf5-fc77-11db-8163-000e0c2e438a)

This script is Copyright (C) 2007-2014 Tenable Network Security, Inc.

Synopsis :

The remote FreeBSD host is missing one or more security-related

Description :

The PHP development team reports :

Security Enhancements and Fixes in PHP 5.2.2 and PHP 4.4.7 :

- Fixed CVE-2007-1001, GD wbmp used with invalid image size

- Fixed asciiz byte truncation inside mail()

- Fixed a bug in mb_parse_str() that can be used to activate

- Fixed unallocated memory access/double free in in

- Fixed a double free inside session_regenerate_id()

- Added missing open_basedir & safe_mode checks to zip:// and bzip://

- Limit nesting level of input variables with max_input_nesting_level
as fix for.

- Fixed CRLF injection inside ftp_putcmd().

- Fixed a possible super-global overwrite inside

- Fixed a remotely trigger-able buffer overflow inside bundled
libxmlrpc library.

Security Enhancements and Fixes in PHP 5.2.2 only :

- Fixed a header injection via Subject and To parameters to the mail()

- Fixed wrong length calculation in unserialize S type.

- Fixed substr_compare and substr_count information leak.

- Fixed a remotely trigger-able buffer overflow inside

- Fixed a buffer overflow inside user_filter_factory_create().

Security Enhancements and Fixes in PHP 4.4.7 only :

- XSS in phpinfo()

See also :

Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 6.8

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 25207 (freebsd_pkg_f5e52bf5fc7711db8163000e0c2e438a.nasl)

Bugtraq ID:

CVE ID: CVE-2007-1001

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now