Mandrake Linux Security Advisory : php (MDKSA-2004:068)

medium Nessus Plugin ID 14167


The remote Mandrake Linux host is missing one or more security updates.


Stefan Esser discovered a remotely exploitable vulnerability in PHP where a remote attacker could trigger a memory_limit request termination in places where an interruption is unsafe. This could be used to execute arbitrary code.

As well, Stefan Esser also found a vulnerability in the handling of allowed tags within PHP's strip_tags() function. This could lead to a number of XSS issues on sites that rely on strip_tags(); however, this only seems to affect the Internet Explorer and Safari browsers.

The updated packages have been patched to correct the problem and all users are encouraged to upgrade immediately.


Update the affected packages.

See Also

Plugin Details

Severity: Medium

ID: 14167

File Name: mandrake_MDKSA-2004-068.nasl

Version: 1.22

Type: local

Published: 7/31/2004

Updated: 1/6/2021

Risk Information


Risk Factor: High

Score: 8.5


Risk Factor: Medium

Base Score: 6.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:lib64php_common432, p-cpe:/a:mandriva:linux:libphp_common430, p-cpe:/a:mandriva:linux:libphp_common432, p-cpe:/a:mandriva:linux:php-cgi, p-cpe:/a:mandriva:linux:php-cli, p-cpe:/a:mandriva:linux:php430-devel, p-cpe:/a:mandriva:linux:php432-devel, cpe:/o:mandrakesoft:mandrake_linux:10.0, cpe:/o:mandrakesoft:mandrake_linux:9.1, cpe:/o:mandrakesoft:mandrake_linux:9.2

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 7/14/2004

Exploitable With


Reference Information

CVE: CVE-2004-0594, CVE-2004-0595

MDKSA: 2004:068