FreeBSD : php5 -- Multiple vulnerabilities (1d23109a-9005-11e2-9602-d43d7e0c7c02)

This script is Copyright (C) 2013 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing one or more security-related
updates.

Description :

The PHP development team reports :

PHP does not validate the relationship between the soap.wsdl_cache_dir
directive and the open_basedir directive, which allows remote
attackers to bypass intended access restrictions by triggering the
creation of cached SOAP WSDL files in an arbitrary directory.

The SOAP parser in PHP allows remote attackers to read arbitrary files
via a SOAP WSDL file containing an XML external entity declaration in
conjunction with an entity reference, related to an XML External
Entity (XXE) issue in the soap_xmlParseFile and soap_xmlParseMemory
functions.

See also :

http://www.nessus.org/u?999d8b36

Solution :

Update the affected packages.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 65623 ()

Bugtraq ID:

CVE ID: CVE-2013-1635
CVE-2013-1643

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now