Debian DSA-3008-1 : php5 - security update

This script is Copyright (C) 2014-2016 Tenable Network Security, Inc.

Synopsis :

The remote Debian host is missing a security-related update.

Description :

Several vulnerabilities were found in PHP, a general-purpose scripting
language commonly used for web application development. The Common
Vulnerabilities and Exposures project identifies the following
problems :

- CVE-2014-3538
It was discovered that the original fix for
CVE-2013-7345 did not sufficiently address the problem.
A remote attacker could still cause a denial of service
(CPU consumption) via a specially crafted input file
that triggers backtracking during processing of an awk
regular expression rule.

- CVE-2014-3587
It was discovered that the CDF parser of the fileinfo
module does not properly process malformed files in the
Composite Document File (CDF) format, leading to

- CVE-2014-3597
It was discovered that the original fix for
CVE-2014-4049 did not completely address the issue. A
malicious server or man-in-the-middle attacker could
cause a denial of service (crash) and possibly execute
arbitrary code via a crafted DNS TXT record.

- CVE-2014-4670
It was discovered that PHP incorrectly handled certain
SPL Iterators. A local attacker could use this flaw to
cause PHP to crash, resulting in a denial of service.

See also :

Solution :

Upgrade the php5 packages.

For the stable distribution (wheezy), these problems have been fixed
in version 5.4.4-14+deb7u13. In addition, this update contains several
bugfixes originally targeted for the upcoming Wheezy point release.

Risk factor :

Medium / CVSS Base Score : 6.8
CVSS Temporal Score : 5.0
Public Exploit Available : false

Family: Debian Local Security Checks

Nessus Plugin ID: 77307 ()

Bugtraq ID: 68348

CVE ID: CVE-2014-3538

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now