Fedora 13 : maniadrive-1.2-22.fc13 / php-5.3.3-1.fc13 / php-eaccelerator-0.9.6.1-2.fc13 (2010-11481)

This script is Copyright (C) 2010-2016 Tenable Network Security, Inc.


Synopsis :

The remote Fedora host is missing one or more security updates.

Description :

Update to PHP 5.3.3 Security Enhancements and Fixes in PHP 5.3.3: *
Rewrote var_export() to use smart_str rather than output buffering,
prevents data disclosure if a fatal error occurs (CVE-2010-2531). *
Fixed a possible resource destruction issues in shm_put_var(). * Fixed
a possible information leak because of interruption of XOR operator. *
Fixed a possible memory corruption because of unexpected call-time
pass by refernce and following memory clobbering through callbacks. *
Fixed a possible memory corruption in ArrayObject::uasort(). * Fixed a
possible memory corruption in parse_str(). * Fixed a possible memory
corruption in pack(). * Fixed a possible memory corruption in
substr_replace(). * Fixed a possible memory corruption in
addcslashes(). * Fixed a possible stack exhaustion inside fnmatch(). *
Fixed a possible dechunking filter buffer overflow. * Fixed a possible
arbitrary memory access inside sqlite extension. * Fixed string format
validation inside phar extension. * Fixed handling of session variable
serialization on certain prefix characters. * Fixed a NULL pointer
dereference when processing invalid XML-RPC requests (Fixes
CVE-2010-0397, bug #51288). * Fixed SplObjectStorage unserialization
problems (CVE-2010-2225). * Fixed possible buffer overflows in
mysqlnd_list_fields, mysqlnd_change_user. * Fixed possible buffer
overflows when handling error packets in mysqlnd. Full upstream
Changelog: http://www.php.net/ChangeLog-5.php#5.3.3

Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.

See also :

http://www.php.net/ChangeLog-5.php#5.3.3
https://bugzilla.redhat.com/show_bug.cgi?id=601897
https://bugzilla.redhat.com/show_bug.cgi?id=605641
https://bugzilla.redhat.com/show_bug.cgi?id=617180
https://bugzilla.redhat.com/show_bug.cgi?id=617211
https://bugzilla.redhat.com/show_bug.cgi?id=617232
http://www.nessus.org/u?55eac0ed
http://www.nessus.org/u?6846dc20
http://www.nessus.org/u?dc90da11

Solution :

Update the affected maniadrive, php and / or php-eaccelerator
packages.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 6.5
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: Fedora Local Security Checks

Nessus Plugin ID: 48412 (fedora_2010-11481.nasl)

Bugtraq ID: 38708
40948
41991

CVE ID: CVE-2010-1914
CVE-2010-1915
CVE-2010-1917
CVE-2010-2190
CVE-2010-2225

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now