Ubuntu 5.04 / 5.10 / 6.06 LTS : php4, php5 vulnerabilities (USN-320-1)

high Nessus Plugin ID 27897
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

The phpinfo() PHP function did not properly sanitize long strings. A remote attacker could use this to perform cross-site scripting attacks against sites that have publicly-available PHP scripts that call phpinfo(). Please note that it is not recommended to publicly expose phpinfo(). (CVE-2006-0996)

An information disclosure has been reported in the html_entity_decode() function. A script which uses this function to process arbitrary user-supplied input could be exploited to expose a random part of memory, which could potentially reveal sensitive data.
(CVE-2006-1490)

The wordwrap() function did not sufficiently check the validity of the 'break' argument. An attacker who could control the string passed to the 'break' parameter could cause a heap overflow; however, this should not happen in practical applications. (CVE-2006-1990)

The substr_compare() function did not sufficiently check the validity of the 'offset' argument. A script which passes untrusted user-defined values to this parameter could be exploited to crash the PHP interpreter. (CVE-2006-1991)

In certain situations, using unset() to delete a hash entry could cause the deletion of the wrong element, which would leave the specified variable defined. This could potentially cause information disclosure in security-relevant operations. (CVE-2006-3017)

In certain situations the session module attempted to close a data file twice, which led to memory corruption. This could potentially be exploited to crash the PHP interpreter, though that could not be verified. (CVE-2006-3018)

This update also fixes various bugs which allowed local scripts to bypass open_basedir and 'safe mode' restrictions by passing special arguments to tempnam() (CVE-2006-1494, CVE-2006-2660), copy() (CVE-2006-1608), the curl module (CVE-2006-2563), or error_log() (CVE-2006-3011).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.

Solution

Update the affected packages.

See Also

https://usn.ubuntu.com/320-1/

Plugin Details

Severity: High

ID: 27897

File Name: ubuntu_USN-320-1.nasl

Version: 1.18

Type: local

Agent: unix

Published: 11/10/2007

Updated: 1/19/2021

Dependencies: ssh_get_info.nasl

Risk Information

VPR

Risk Factor: Medium

Score: 6

CVSS v2

Risk Factor: High

Base Score: 9.3

Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:canonical:ubuntu_linux:libapache2-mod-php4, p-cpe:/a:canonical:ubuntu_linux:libapache2-mod-php5, p-cpe:/a:canonical:ubuntu_linux:php-pear, p-cpe:/a:canonical:ubuntu_linux:php4, p-cpe:/a:canonical:ubuntu_linux:php4-cgi, p-cpe:/a:canonical:ubuntu_linux:php4-cli, p-cpe:/a:canonical:ubuntu_linux:php4-common, p-cpe:/a:canonical:ubuntu_linux:php4-dev, p-cpe:/a:canonical:ubuntu_linux:php5, p-cpe:/a:canonical:ubuntu_linux:php5-cgi, p-cpe:/a:canonical:ubuntu_linux:php5-cli, p-cpe:/a:canonical:ubuntu_linux:php5-common, p-cpe:/a:canonical:ubuntu_linux:php5-curl, p-cpe:/a:canonical:ubuntu_linux:php5-dev, p-cpe:/a:canonical:ubuntu_linux:php5-gd, p-cpe:/a:canonical:ubuntu_linux:php5-ldap, p-cpe:/a:canonical:ubuntu_linux:php5-mhash, p-cpe:/a:canonical:ubuntu_linux:php5-mysql, p-cpe:/a:canonical:ubuntu_linux:php5-mysqli, p-cpe:/a:canonical:ubuntu_linux:php5-odbc, p-cpe:/a:canonical:ubuntu_linux:php5-pgsql, p-cpe:/a:canonical:ubuntu_linux:php5-recode, p-cpe:/a:canonical:ubuntu_linux:php5-snmp, p-cpe:/a:canonical:ubuntu_linux:php5-sqlite, p-cpe:/a:canonical:ubuntu_linux:php5-sybase, p-cpe:/a:canonical:ubuntu_linux:php5-xmlrpc, p-cpe:/a:canonical:ubuntu_linux:php5-xsl, cpe:/o:canonical:ubuntu_linux:5.04, cpe:/o:canonical:ubuntu_linux:5.10, cpe:/o:canonical:ubuntu_linux:6.06:-:lts

Required KB Items: Host/cpu, Host/Ubuntu, Host/Ubuntu/release, Host/Debian/dpkg-l

Patch Publication Date: 7/19/2006

Reference Information

CVE: CVE-2006-0996, CVE-2006-1490, CVE-2006-1494, CVE-2006-1608, CVE-2006-1990, CVE-2006-1991, CVE-2006-2563, CVE-2006-2660, CVE-2006-3011, CVE-2006-3016, CVE-2006-3017, CVE-2006-3018

USN: 320-1

CWE: 79