Fedora Core 5 : php-5.1.6-1.1 (2006-1024)

Medium Nessus Plugin ID 24032

Synopsis

The remote Fedora Core host is missing a security update.

Description

This update includes the latest upstream release of PHP 5.1, version 5.1.6, fixing a number of security vulnerabilities, and other bugs.

An integer overflow was discovered in the PHP memory handling routines. If a script can cause memory allocation based on untrusted user data, a remote attacker sending a carefully crafted request could execute arbitrary code as the 'apache' user. (CVE-2006-4812)

A buffer overflow was discovered in the PHP sscanf() function. If a script used the sscanf() function with positional arguments in the format string, a remote attacker sending a carefully crafted request could execute arbitrary code as the 'apache' user. (CVE-2006-4020)

An integer overflow was discovered in the PHP wordwrap() and str_repeat() functions. If a script running on a 64-bit server used either of these functions on untrusted user data, a remote attacker sending a carefully crafted request might be able to cause a heap overflow. (CVE-2006-4482)

A buffer overflow was discovered in the PHP gd extension. If a script was set up to process GIF images from untrusted sources using the gd extension, a remote attacker could cause a heap overflow.
(CVE-2006-4484)

A buffer overread was discovered in the PHP stripos() function. If a script used the stripos() function with untrusted user data, PHP may read past the end of a buffer, which could allow a denial of service attack by a remote user. (CVE-2006-4485)

An integer overflow was discovered in the PHP memory allocation handling. On 64-bit platforms, the 'memory_limit' setting was not enforced correctly, which could allow a denial of service attack by a remote user. (CVE-2006-4486)

Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?bc45eb90

Plugin Details

Severity: Medium

ID: 24032

File Name: fedora_2006-1024.nasl

Version: 1.19

Type: local

Agent: unix

Published: 2007/01/17

Updated: 2019/08/02

Dependencies: 12634

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 5.8

Temporal Score: 4.5

Vector: CVSS2#AV:A/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:fedoraproject:fedora:php, p-cpe:/a:fedoraproject:fedora:php-bcmath, p-cpe:/a:fedoraproject:fedora:php-dba, p-cpe:/a:fedoraproject:fedora:php-debuginfo, p-cpe:/a:fedoraproject:fedora:php-devel, p-cpe:/a:fedoraproject:fedora:php-gd, p-cpe:/a:fedoraproject:fedora:php-imap, p-cpe:/a:fedoraproject:fedora:php-ldap, p-cpe:/a:fedoraproject:fedora:php-mbstring, p-cpe:/a:fedoraproject:fedora:php-mysql, p-cpe:/a:fedoraproject:fedora:php-ncurses, p-cpe:/a:fedoraproject:fedora:php-odbc, p-cpe:/a:fedoraproject:fedora:php-pdo, p-cpe:/a:fedoraproject:fedora:php-pgsql, p-cpe:/a:fedoraproject:fedora:php-snmp, p-cpe:/a:fedoraproject:fedora:php-soap, p-cpe:/a:fedoraproject:fedora:php-xml, p-cpe:/a:fedoraproject:fedora:php-xmlrpc, cpe:/o:fedoraproject:fedora_core:5

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2006/10/19

Reference Information

BID: 19415, 19582, 20349

FEDORA: 2006-1024