FreeBSD : php -- multiple vulnerabilities (3d675519-5654-11e5-9ad8-14dae9d210b8)

This script is Copyright (C) 2015-2016 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing one or more security-related
updates.

Description :

PHP reports :

- Core :

- Fixed bug #70172 (Use After Free Vulnerability in unserialize()).

- Fixed bug #70219 (Use after free vulnerability in session
deserializer).

- EXIF :

- Fixed bug #70385 (Buffer over-read in exif_read_data with TIFF IFD
tag byte value of 32 bytes).

- hash :

- Fixed bug #70312 (HAVAL gives wrong hashes in specific cases).

- PCRE :

- Fixed bug #70345 (Multiple vulnerabilities related to PCRE
functions).

- SOAP :

- Fixed bug #70388 (SOAP serialize_function_call() type confusion /
RCE).

- SPL :

- Fixed bug #70365 (Use-after-free vulnerability in unserialize() with
SplObjectStorage).

- Fixed bug #70366 (Use-after-free vulnerability in unserialize() with
SplDoublyLinkedList).

- XSLT :

- Fixed bug #69782 (NULL pointer dereference).

- ZIP :

- Fixed bug #70350 (ZipArchive::extractTo allows for directory
traversal when creating directories).

See also :

http://php.net/ChangeLog-5.php#5.4.45
http://php.net/ChangeLog-5.php#5.5.29
http://php.net/ChangeLog-5.php#5.6.13
http://www.nessus.org/u?372dbde1

Solution :

Update the affected packages.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 85859 ()

Bugtraq ID:

CVE ID: CVE-2015-6834
CVE-2015-6835
CVE-2015-6836
CVE-2015-6837
CVE-2015-6838

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now