Mandriva Linux Security Advisory : php (MDVSA-2008:128)

This script is Copyright (C) 2009-2016 Tenable Network Security, Inc.

Synopsis :

The remote Mandriva Linux host is missing one or more security

Description :

A number of vulnerabilities have been found and corrected in PHP :

php-cgi in PHP prior to 5.2.6 does not properly calculate the length
of PATH_TRANSLATED, which has unknown impact and attack vectors

The escapeshellcmd() API function in PHP prior to 5.2.6 has unknown
impact and context-dependent attack vectors related to incomplete
multibyte characters (CVE-2008-2051).

Weaknesses in the GENERATE_SEED macro in PHP prior to 4.4.8 and 5.2.5
were discovered that could produce a zero seed in rare circumstances
on 32bit systems and generations a portion of zero bits during
conversion due to insufficient precision on 64bit systems
(CVE-2008-2107, CVE-2008-2108).

The IMAP module in PHP uses obsolete API calls that allow
context-dependent attackers to cause a denial of service (crash) via a
long IMAP request (CVE-2008-2829).

In addition, the updated packages provide a number of bug fixes.

The updated packages have been patched to correct these issues.

Solution :

Update the affected packages.

Risk factor :

Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 8.7
Public Exploit Available : false

Family: Mandriva Local Security Checks

Nessus Plugin ID: 36486 (mandriva_MDVSA-2008-128.nasl)

Bugtraq ID: 29829

CVE ID: CVE-2008-0599

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now