SuSE 11 / 11.1 Security Update : PHP5 (SAT Patch Numbers 3489 / 3490)

medium Nessus Plugin ID 50973

Language:

Synopsis

The remote SuSE 11 host is missing one or more security updates.

Description

The following issues have been fixed :

- Insufficient handling of certain character sequences in the utf8_decode() function could be leveraged to conduct cross-site scripting (XSS) attacks. (CVE-2010-3870)

- php5 could also consume large amounts of memory and crash if a long mail address was passed to filter_var() with parmeter FILTER_VALIDATE_EMAIL. (CVE-2010-3710)

Solution

Apply SAT patch number 3489 / 3490 as appropriate.

See Also

https://bugzilla.novell.com/show_bug.cgi?id=649210

https://bugzilla.novell.com/show_bug.cgi?id=650700

http://support.novell.com/security/cve/CVE-2010-3710.html

http://support.novell.com/security/cve/CVE-2010-3870.html

Plugin Details

Severity: Medium

ID: 50973

File Name: suse_11_apache2-mod_php5-101105.nasl

Version: 1.9

Type: local

Agent: unix

Published: 12/3/2010

Updated: 1/14/2021

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:11:apache2-mod_php5, p-cpe:/a:novell:suse_linux:11:php5, p-cpe:/a:novell:suse_linux:11:php5-bcmath, p-cpe:/a:novell:suse_linux:11:php5-bz2, p-cpe:/a:novell:suse_linux:11:php5-calendar, p-cpe:/a:novell:suse_linux:11:php5-ctype, p-cpe:/a:novell:suse_linux:11:php5-curl, p-cpe:/a:novell:suse_linux:11:php5-dba, p-cpe:/a:novell:suse_linux:11:php5-dbase, p-cpe:/a:novell:suse_linux:11:php5-dom, p-cpe:/a:novell:suse_linux:11:php5-exif, p-cpe:/a:novell:suse_linux:11:php5-fastcgi, p-cpe:/a:novell:suse_linux:11:php5-ftp, p-cpe:/a:novell:suse_linux:11:php5-gd, p-cpe:/a:novell:suse_linux:11:php5-gettext, p-cpe:/a:novell:suse_linux:11:php5-gmp, p-cpe:/a:novell:suse_linux:11:php5-hash, p-cpe:/a:novell:suse_linux:11:php5-iconv, p-cpe:/a:novell:suse_linux:11:php5-json, p-cpe:/a:novell:suse_linux:11:php5-ldap, p-cpe:/a:novell:suse_linux:11:php5-mbstring, p-cpe:/a:novell:suse_linux:11:php5-mcrypt, p-cpe:/a:novell:suse_linux:11:php5-mysql, p-cpe:/a:novell:suse_linux:11:php5-odbc, p-cpe:/a:novell:suse_linux:11:php5-openssl, p-cpe:/a:novell:suse_linux:11:php5-pcntl, p-cpe:/a:novell:suse_linux:11:php5-pdo, p-cpe:/a:novell:suse_linux:11:php5-pear, p-cpe:/a:novell:suse_linux:11:php5-pgsql, p-cpe:/a:novell:suse_linux:11:php5-pspell, p-cpe:/a:novell:suse_linux:11:php5-shmop, p-cpe:/a:novell:suse_linux:11:php5-snmp, p-cpe:/a:novell:suse_linux:11:php5-soap, p-cpe:/a:novell:suse_linux:11:php5-suhosin, p-cpe:/a:novell:suse_linux:11:php5-sysvmsg, p-cpe:/a:novell:suse_linux:11:php5-sysvsem, p-cpe:/a:novell:suse_linux:11:php5-sysvshm, p-cpe:/a:novell:suse_linux:11:php5-tokenizer, p-cpe:/a:novell:suse_linux:11:php5-wddx, p-cpe:/a:novell:suse_linux:11:php5-xmlreader, p-cpe:/a:novell:suse_linux:11:php5-xmlrpc, p-cpe:/a:novell:suse_linux:11:php5-xmlwriter, p-cpe:/a:novell:suse_linux:11:php5-xsl, p-cpe:/a:novell:suse_linux:11:php5-zip, p-cpe:/a:novell:suse_linux:11:php5-zlib, cpe:/o:novell:suse_linux:11

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Patch Publication Date: 11/5/2010

Reference Information

CVE: CVE-2010-3710, CVE-2010-3870