SuSE 10 Security Update : PHP5 (ZYPP Patch Number 8114)

high Nessus Plugin ID 59053


The remote SuSE 10 host is missing a security-related patch.


This update fixes several security issues in PHP5 :

- A directory traversal bug has been fixed in php5.

- A command injection was possible when PHP5 was operated in CGI mode using commandline options. This problem does not affect PHP5 in the normal Apache module mode setup.
(CVE-2012-1823 / CVE-2012-2311)

- Also a pack/unpacking bug on big endian 64bit architectures (ppc64 and s390x) has been fixed.


Apply ZYPP patch number 8114.

See Also

Plugin Details

Severity: High

ID: 59053

File Name: suse_apache2-mod_php5-8114.nasl

Version: 1.14

Type: local

Agent: unix

Published: 5/9/2012

Updated: 3/28/2022

Supported Sensors: Nessus Agent

Risk Information


Risk Factor: Critical

Score: 9


Risk Factor: High

Base Score: 7.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/o:suse:suse_linux

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 5/4/2012

CISA Known Exploited Dates: 4/15/2022

Exploitable With


Core Impact

Metasploit (PHP CGI Argument Injection)

Reference Information

CVE: CVE-2012-1172, CVE-2012-1823, CVE-2012-2311