FreeBSD : php -- multiple vulnerabilities (59b68b1e-9c78-11e1-b5e0-000c299b62e1)

high Nessus Plugin ID 59084

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

The PHP Development Team reports :

The release of PHP 5.4.13 and 5.4.3 complete a fix for the vulnerability in CGI-based setups as originally described in CVE-2012-1823. (CVE-2012-2311)

Note: mod_php and php-fpm are not vulnerable to this attack.

PHP 5.4.3 fixes a buffer overflow vulnerability in the apache_request_headers() (CVE-2012-2329).

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?5e50f899

Plugin Details

Severity: High

ID: 59084

File Name: freebsd_pkg_59b68b1e9c7811e1b5e0000c299b62e1.nasl

Version: 1.15

Type: local

Published: 5/14/2012

Updated: 3/28/2022

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 8.9

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:php5, p-cpe:/a:freebsd:freebsd:php52, p-cpe:/a:freebsd:freebsd:php53, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 5/12/2012

Vulnerability Publication Date: 5/8/2012

CISA Known Exploited Vulnerability Due Dates: 4/15/2022

Exploitable With

CANVAS (CANVAS)

Core Impact

Metasploit (PHP apache_request_headers Function Buffer Overflow)

Reference Information

CVE: CVE-2012-1823, CVE-2012-2311, CVE-2012-2329