Ubuntu Security Notice (C) 2007-2016 Canonical, Inc. / NASL script (C) 2007-2016 Tenable Network Security, Inc.
The remote Ubuntu host is missing one or more security-related
USN-549-1 fixed vulnerabilities in PHP. However, some upstream changes
were incomplete, which caused crashes in certain situations with
Ubuntu 7.10. This update fixes the problem.
We apologize for the inconvenience.
It was discovered that the wordwrap function did not correctly check
lengths. Remote attackers could exploit this to cause a crash or
monopolize CPU resources, resulting in a denial of service.
Integer overflows were discovered in the strspn and strcspn
functions. Attackers could exploit this to read arbitrary
areas of memory, possibly gaining access to sensitive
Stanislav Malyshev discovered that money_format function did
not correctly handle certain tokens. If a PHP application
were tricked into processing a bad format string, a remote
attacker could execute arbitrary code with application
It was discovered that the php_openssl_make_REQ function did
not correctly check buffer lengths. A remote attacker could
send a specially crafted message and execute arbitrary code
with application privileges. (CVE-2007-4662)
It was discovered that certain characters in session cookies
were not handled correctly. A remote attacker could
injection values which could lead to altered application
behavior, potentially gaining additional privileges.
Gerhard Wagner discovered that the chunk_split function did
not correctly handle long strings. A remote attacker could
exploit this to execute arbitrary code with application
privileges. (CVE-2007-2872, CVE-2007-4660, CVE-2007-4661)
Stefan Esser discovered that deeply nested arrays could be
made to fill stack space. A remote attacker could exploit
this to cause a crash or monopolize CPU resources, resulting
in a denial of service. (CVE-2007-1285, CVE-2007-4670)
Rasmus Lerdorf discovered that the htmlentities and
htmlspecialchars functions did not correctly stop when
handling partial multibyte sequences. A remote attacker
could exploit this to read certain areas of memory, possibly
gaining access to sensitive information. (CVE-2007-5898)
It was discovered that the output_add_rewrite_var fucntion
would sometimes leak session id information to forms
targeting remote URLs. Malicious remote sites could use this
information to gain access to a PHP application user's login
Note that Tenable Network Security has extracted the preceding
description block directly from the Ubuntu security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.
Update the affected packages.
Risk factor :
High / CVSS Base Score : 7.5
CVSS Temporal Score : 6.5
Public Exploit Available : true
Family: Ubuntu Local Security Checks
Nessus Plugin ID: 29213 ()
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now