GLSA-200511-08 : PHP: Multiple vulnerabilities
High Nessus Plugin ID 20195
SynopsisThe remote Gentoo host is missing one or more security-related patches.
DescriptionThe remote host is affected by the vulnerability described in GLSA-200511-08 (PHP: Multiple vulnerabilities)
Multiple vulnerabilities have been found and fixed in PHP:
a possible $GLOBALS variable overwrite problem through file upload handling, extract() and import_request_variables() (CVE-2005-3390) a local Denial of Service through the use of the session.save_path option (CVE-2005-3319) an issue with trailing slashes in allowed basedirs (CVE-2005-3054) an issue with calling virtual() on Apache 2, allowing to bypass safe_mode and open_basedir restrictions (CVE-2005-3392) a problem when a request was terminated due to memory_limit constraints during certain parse_str() calls (CVE-2005-3389) The curl and gd modules allowed to bypass the safe mode open_basedir restrictions (CVE-2005-3391) a cross-site scripting (XSS) vulnerability in phpinfo() (CVE-2005-3388) Impact :
Attackers could leverage these issues to exploit applications that are assumed to be secure through the use of proper register_globals, safe_mode or open_basedir parameters. Remote attackers could also conduct cross-site scripting attacks if a page calling phpinfo() was available. Finally, a local attacker could cause a local Denial of Service using malicious session.save_path options.
There is no known workaround that would solve all issues at this time.
SolutionAll PHP users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose dev-php/php All mod_php users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose dev-php/mod_php All php-cgi users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose dev-php/php-cgi