FreeBSD : php -- multiple vulnerabilities (27d01223-c457-11dd-a721-0030843d3802)

This script is Copyright (C) 2008-2016 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

Secunia reports :

Some vulnerabilities have been reported in PHP, where some have an
unknown impact and others can potentially be exploited by malicious
people to cause a DoS (Denial of Service) or compromise a vulnerable
system.

An input validation error exists within the 'ZipArchive::extractTo()'
function when extracting ZIP archives. This can be exploited to
extract files to arbitrary locations outside the specified directory
via directory traversal sequences in a specially crafted ZIP archive.

An error in the included PCRE library can be exploited to cause a
buffer overflow.

The problem is that the 'BG(page_uid)' and 'BG(page_gid)' variables
are not initialized. No further information is currently available.

The problem is that the 'php_value' order is incorrect for Apache
configurations. No further information is currently available.

An error in the GD library can be exploited to cause a crash via a
specially crafted font file.

See also :

http://www.php.net/ChangeLog-5.php#5.2.7
http://www.nessus.org/u?d20763d1
http://www.nessus.org/u?2ce98520

Solution :

Update the affected package.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 35051 (freebsd_pkg_27d01223c45711dda7210030843d3802.nasl)

Bugtraq ID:

CVE ID: CVE-2008-2371
CVE-2008-2829
CVE-2008-3658
CVE-2008-3659
CVE-2008-3660

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now