Mandriva Linux Security Advisory : php (MDVSA-2014:075)

This script is Copyright (C) 2014 Tenable Network Security, Inc.


Synopsis :

The remote Mandriva Linux host is missing one or more security
updates.

Description :

A vulnerability has been discovered and corrected in php :

The BEGIN regular expression in the awk script detector in
magic/Magdir/commands in file before 5.15 uses multiple wildcards with
unlimited repetitions, which allows context-dependent attackers to
cause a denial of service (CPU consumption) via a crafted ASCII file
that triggers a large amount of backtracking, as demonstrated via a
file with many newline characters (CVE-2013-7345).

The updated php packages have been upgraded to the 5.5.11 version
which is not vulnerable to this issue.

Also, the timezonedb PHP PECL module has been updated to the latest
2014.2 version.

Additionally, the PECL packages which requires so has been rebuilt for
php-5.5.11.

See also :

http://www.nessus.org/u?14fdab57
http://www.php.net/ChangeLog-5.php#5.5.11
https://bugs.php.net/bug.php?id=66946

Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)
CVSS Temporal Score : 4.3
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: Mandriva Local Security Checks

Nessus Plugin ID: 73466 ()

Bugtraq ID: 66406

CVE ID: CVE-2013-7345

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now