GLSA-200703-21 : PHP: Multiple vulnerabilities

critical Nessus Plugin ID 24887
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

The remote Gentoo host is missing one or more security-related patches.

Description

The remote host is affected by the vulnerability described in GLSA-200703-21 (PHP: Multiple vulnerabilities)

Several vulnerabilities were found in PHP by the Hardened-PHP Project and other researchers. These vulnerabilities include a heap-based buffer overflow in htmlentities() and htmlspecialchars() if called with UTF-8 parameters, and an off-by-one error in str_ireplace(). Other vulnerabilities were also found in the PHP4 branch, including possible overflows, stack corruptions and a format string vulnerability in the
*print() functions on 64 bit systems.
Impact :

Remote attackers might be able to exploit these issues in PHP applications making use of the affected functions, potentially resulting in the execution of arbitrary code, Denial of Service, execution of scripted contents in the context of the affected site, security bypass or information leak.
Workaround :

There is no known workaround at this time.

Solution

All PHP users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose 'dev-lang/php'

See Also

http://www.php.net/releases/4_4_5.php

http://www.php.net/releases/5_2_1.php

https://security.gentoo.org/glsa/200703-21

Plugin Details

Severity: Critical

ID: 24887

File Name: gentoo_GLSA-200703-21.nasl

Version: 1.20

Type: local

Published: 3/26/2007

Updated: 1/6/2021

Dependencies: ssh_get_info.nasl

Risk Information

VPR

Risk Factor: High

Score: 7.3

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.3

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: E:F/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:gentoo:linux:php, cpe:/o:gentoo:linux

Required KB Items: Host/local_checks_enabled, Host/Gentoo/release, Host/Gentoo/qpkg-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 3/20/2007

Vulnerability Publication Date: 11/2/2006

Exploitable With

Metasploit (PHP 4 unserialize() ZVAL Reference Counter Overflow (Cookie))

Reference Information

CVE: CVE-2006-5465, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-0911, CVE-2007-0988, CVE-2007-1286, CVE-2007-1375, CVE-2007-1376, CVE-2007-1380, CVE-2007-1383

BID: 20879, 22496, 22505, 22765, 22805, 22851, 22862

GLSA: 200703-21

CWE: 20, 189, 399