openSUSE Security Update : php5 (openSUSE-2015-396)

This script is Copyright (C) 2015 Tenable Network Security, Inc.


Synopsis :

The remote openSUSE host is missing a security update.

Description :

php5 was updated to fix four security issues.

The following vulnerabilities were fixed :

- CVE-2015-4024: Multipart/form-data remote dos
Vulnerability (bnc#931421)

- CVE-2015-4026: pcntl_exec() does not check path validity
(bnc#931776)

- CVE-2015-4022: overflow in ftp_genlist() resulting in
heap overflow (bnc#931772)

- CVE-2015-4021: memory corruption in phar_parse_tarfile
when entry filename starts with NULL (bnc#931769)

See also :

https://bugzilla.opensuse.org/show_bug.cgi?id=931421
https://bugzilla.opensuse.org/show_bug.cgi?id=931769
https://bugzilla.opensuse.org/show_bug.cgi?id=931772
https://bugzilla.opensuse.org/show_bug.cgi?id=931776

Solution :

Update the affected php5 packages.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

Family: SuSE Local Security Checks

Nessus Plugin ID: 83983 ()

Bugtraq ID:

CVE ID: CVE-2015-4021
CVE-2015-4022
CVE-2015-4024
CVE-2015-4026

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now