SuSE 11.1 Security Update : PHP5 (SAT Patch Number 5964)

This script is Copyright (C) 2012-2015 Tenable Network Security, Inc.


Synopsis :

The remote SuSE 11 host is missing one or more security updates.

Description :

This update of php5 fixes multiple security flaws :

- A php5 upload filename injection was fixed.
(CVE-2011-2202)

- A integer overflow in the EXIF extension was fixed that
could be used by attackers to crash the interpreter or
potentially read memory. (CVE-2011-4566)

- Multiple NULL pointer dereferences were fixed that could
lead to crashes. (CVE-2011-3182)

- An integer overflow in the PHP calendar extension was
fixed that could have led to crashes. (CVE-2011-1466)

- A symlink vulnerability in the PEAR installer could be
exploited by local attackers to inject code.
(CVE-2011-1072)

- missing checks of return values could allow remote
attackers to cause a denial of service (NULL pointer
dereference). (CVE-2011-4153)

- denial of service via hash collisions. (CVE-2011-4885)

- specially crafted XSLT stylesheets could allow remote
attackers to create arbitrary files with arbitrary
content. (CVE-2012-0057)

- remote attackers can cause a denial of service via
specially crafted input to an application that attempts
to perform Tidy::diagnose operations. (CVE-2012-0781)

- applications that use a PDO driver were prone to denial
of service flaws which could be exploited remotely.
(CVE-2012-0788)

- memory leak in the timezone functionality could allow
remote attackers to cause a denial of service (memory
consumption). (CVE-2012-0789)

- a stack-based buffer overflow in the php5 Suhosin
extension could allow remote attackers to execute
arbitrary code via a long string that is used in a
Set-Cookie HTTP header. (CVE-2012-0807)

- this fixes an incorrect fix for CVE-2011-4885 which
could allow remote attackers to execute arbitrary code
via a request containing a large number of variables.
(CVE-2012-0830)

- temporary changes to the magic_quotes_gpc directive
during the importing of environment variables is not
properly performed which makes it easier for remote
attackers to conduct SQL injections. (CVE-2012-0831)

Also the following bugs have been fixed :

- allow uploading files bigger than 2GB for 64bit systems
[bnc#709549]

- amend README.SUSE to discourage using apache module with
apache2-worker [bnc#728671]

See also :

https://bugzilla.novell.com/show_bug.cgi?id=699711
https://bugzilla.novell.com/show_bug.cgi?id=709549
https://bugzilla.novell.com/show_bug.cgi?id=713652
https://bugzilla.novell.com/show_bug.cgi?id=728671
https://bugzilla.novell.com/show_bug.cgi?id=733590
https://bugzilla.novell.com/show_bug.cgi?id=735613
https://bugzilla.novell.com/show_bug.cgi?id=736169
https://bugzilla.novell.com/show_bug.cgi?id=738221
https://bugzilla.novell.com/show_bug.cgi?id=741520
https://bugzilla.novell.com/show_bug.cgi?id=741859
https://bugzilla.novell.com/show_bug.cgi?id=742273
https://bugzilla.novell.com/show_bug.cgi?id=742806
https://bugzilla.novell.com/show_bug.cgi?id=743308
https://bugzilla.novell.com/show_bug.cgi?id=744966
https://bugzilla.novell.com/show_bug.cgi?id=746661
https://bugzilla.novell.com/show_bug.cgi?id=749111
http://support.novell.com/security/cve/CVE-2011-1072.html
http://support.novell.com/security/cve/CVE-2011-1466.html
http://support.novell.com/security/cve/CVE-2011-2202.html
http://support.novell.com/security/cve/CVE-2011-3182.html
http://support.novell.com/security/cve/CVE-2011-4153.html
http://support.novell.com/security/cve/CVE-2011-4566.html
http://support.novell.com/security/cve/CVE-2011-4885.html
http://support.novell.com/security/cve/CVE-2012-0057.html
http://support.novell.com/security/cve/CVE-2012-0781.html
http://support.novell.com/security/cve/CVE-2012-0788.html
http://support.novell.com/security/cve/CVE-2012-0789.html
http://support.novell.com/security/cve/CVE-2012-0807.html
http://support.novell.com/security/cve/CVE-2012-0830.html
http://support.novell.com/security/cve/CVE-2012-0831.html

Solution :

Apply SAT patch number 5964.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
Public Exploit Available : true

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now