SuSE 11.1 Security Update : PHP5 (SAT Patch Number 5964)

High Nessus Plugin ID 58740


The remote SuSE 11 host is missing one or more security updates.


This update of php5 fixes multiple security flaws :

- A php5 upload filename injection was fixed.

- A integer overflow in the EXIF extension was fixed that could be used by attackers to crash the interpreter or potentially read memory. (CVE-2011-4566)

- Multiple NULL pointer dereferences were fixed that could lead to crashes. (CVE-2011-3182)

- An integer overflow in the PHP calendar extension was fixed that could have led to crashes. (CVE-2011-1466)

- A symlink vulnerability in the PEAR installer could be exploited by local attackers to inject code.

- missing checks of return values could allow remote attackers to cause a denial of service (NULL pointer dereference). (CVE-2011-4153)

- denial of service via hash collisions. (CVE-2011-4885)

- specially crafted XSLT stylesheets could allow remote attackers to create arbitrary files with arbitrary content. (CVE-2012-0057)

- remote attackers can cause a denial of service via specially crafted input to an application that attempts to perform Tidy::diagnose operations. (CVE-2012-0781)

- applications that use a PDO driver were prone to denial of service flaws which could be exploited remotely.

- memory leak in the timezone functionality could allow remote attackers to cause a denial of service (memory consumption). (CVE-2012-0789)

- a stack-based buffer overflow in the php5 Suhosin extension could allow remote attackers to execute arbitrary code via a long string that is used in a Set-Cookie HTTP header. (CVE-2012-0807)

- this fixes an incorrect fix for CVE-2011-4885 which could allow remote attackers to execute arbitrary code via a request containing a large number of variables.

- temporary changes to the magic_quotes_gpc directive during the importing of environment variables is not properly performed which makes it easier for remote attackers to conduct SQL injections. (CVE-2012-0831)

Also the following bugs have been fixed :

- allow uploading files bigger than 2GB for 64bit systems [bnc#709549]

- amend README.SUSE to discourage using apache module with apache2-worker [bnc#728671]


Apply SAT patch number 5964.

See Also

Plugin Details

Severity: High

ID: 58740

File Name: suse_11_apache2-mod_php5-120309.nasl

Version: 1.13

Type: local

Agent: unix

Published: 2012/04/13

Updated: 2020/06/04

Dependencies: 12634

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:11:apache2-mod_php5, p-cpe:/a:novell:suse_linux:11:php5, p-cpe:/a:novell:suse_linux:11:php5-bcmath, p-cpe:/a:novell:suse_linux:11:php5-bz2, p-cpe:/a:novell:suse_linux:11:php5-calendar, p-cpe:/a:novell:suse_linux:11:php5-ctype, p-cpe:/a:novell:suse_linux:11:php5-curl, p-cpe:/a:novell:suse_linux:11:php5-dba, p-cpe:/a:novell:suse_linux:11:php5-dbase, p-cpe:/a:novell:suse_linux:11:php5-dom, p-cpe:/a:novell:suse_linux:11:php5-exif, p-cpe:/a:novell:suse_linux:11:php5-fastcgi, p-cpe:/a:novell:suse_linux:11:php5-ftp, p-cpe:/a:novell:suse_linux:11:php5-gd, p-cpe:/a:novell:suse_linux:11:php5-gettext, p-cpe:/a:novell:suse_linux:11:php5-gmp, p-cpe:/a:novell:suse_linux:11:php5-hash, p-cpe:/a:novell:suse_linux:11:php5-iconv, p-cpe:/a:novell:suse_linux:11:php5-json, p-cpe:/a:novell:suse_linux:11:php5-ldap, p-cpe:/a:novell:suse_linux:11:php5-mbstring, p-cpe:/a:novell:suse_linux:11:php5-mcrypt, p-cpe:/a:novell:suse_linux:11:php5-mysql, p-cpe:/a:novell:suse_linux:11:php5-odbc, p-cpe:/a:novell:suse_linux:11:php5-openssl, p-cpe:/a:novell:suse_linux:11:php5-pcntl, p-cpe:/a:novell:suse_linux:11:php5-pdo, p-cpe:/a:novell:suse_linux:11:php5-pear, p-cpe:/a:novell:suse_linux:11:php5-pgsql, p-cpe:/a:novell:suse_linux:11:php5-pspell, p-cpe:/a:novell:suse_linux:11:php5-shmop, p-cpe:/a:novell:suse_linux:11:php5-snmp, p-cpe:/a:novell:suse_linux:11:php5-soap, p-cpe:/a:novell:suse_linux:11:php5-suhosin, p-cpe:/a:novell:suse_linux:11:php5-sysvmsg, p-cpe:/a:novell:suse_linux:11:php5-sysvsem, p-cpe:/a:novell:suse_linux:11:php5-sysvshm, p-cpe:/a:novell:suse_linux:11:php5-tokenizer, p-cpe:/a:novell:suse_linux:11:php5-wddx, p-cpe:/a:novell:suse_linux:11:php5-xmlreader, p-cpe:/a:novell:suse_linux:11:php5-xmlrpc, p-cpe:/a:novell:suse_linux:11:php5-xmlwriter, p-cpe:/a:novell:suse_linux:11:php5-xsl, p-cpe:/a:novell:suse_linux:11:php5-zip, p-cpe:/a:novell:suse_linux:11:php5-zlib, cpe:/o:novell:suse_linux:11

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2012/03/09

Exploitable With

Core Impact

Reference Information

CVE: CVE-2011-1072, CVE-2011-1466, CVE-2011-2202, CVE-2011-3182, CVE-2011-4153, CVE-2011-4566, CVE-2011-4885, CVE-2012-0057, CVE-2012-0781, CVE-2012-0788, CVE-2012-0789, CVE-2012-0807, CVE-2012-0830, CVE-2012-0831