Debian DSA-2266-1 : php5 - several vulnerabilities

high Nessus Plugin ID 55486
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

The remote Debian host is missing a security-related update.

Description

Several vulnerabilities were discovered in PHP, which could lead to denial of service or potentially the execution of arbitrary code.

- CVE-2010-2531 An information leak was found in the var_export() function.

- CVE-2011-0421 The Zip module could crash.

- CVE-2011-0708 An integer overflow was discovered in the Exif module.

- CVE-2011-1466 An integer overflow was discovered in the Calendar module.

- CVE-2011-1471 The Zip module was prone to denial of service through malformed archives.

- CVE-2011-2202 Path names in form based file uploads (RFC 1867) were incorrectly validated.

This update also fixes two bugs, which are not treated as security issues, but fixed nonetheless, see README.Debian.security for details on the scope of security support for PHP (CVE-2011-0420, CVE-2011-1153 ).

Solution

Upgrade the php5 packages.

For the oldstable distribution (lenny), these problems have been fixed in version 5.2.6.dfsg.1-1+lenny12.

For the stable distribution (squeeze), these problems have been fixed in version 5.3.3-7+squeeze3.

See Also

https://security-tracker.debian.org/tracker/CVE-2010-2531

https://security-tracker.debian.org/tracker/CVE-2011-0421

https://security-tracker.debian.org/tracker/CVE-2011-0708

https://security-tracker.debian.org/tracker/CVE-2011-1466

https://security-tracker.debian.org/tracker/CVE-2011-1471

https://security-tracker.debian.org/tracker/CVE-2011-2202

https://security-tracker.debian.org/tracker/CVE-2011-0420

https://security-tracker.debian.org/tracker/CVE-2011-1153

https://packages.debian.org/source/squeeze/php5

https://www.debian.org/security/2011/dsa-2266

Plugin Details

Severity: High

ID: 55486

File Name: debian_DSA-2266.nasl

Version: 1.12

Type: local

Agent: unix

Published: 7/5/2011

Updated: 1/4/2021

Dependencies: ssh_get_info.nasl

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.9

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: E:POC/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:php5, cpe:/o:debian:debian_linux:5.0, cpe:/o:debian:debian_linux:6.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 6/29/2011

Reference Information

CVE: CVE-2010-2531, CVE-2011-0420, CVE-2011-0421, CVE-2011-0708, CVE-2011-1153, CVE-2011-1466, CVE-2011-1471, CVE-2011-2202

BID: 46975, 48259

DSA: 2266