FreeBSD : php -- multiple vulnerabilities (59b68b1e-9c78-11e1-b5e0-000c299b62e1)

High Nessus Plugin ID 59084


The remote FreeBSD host is missing one or more security-related updates.


The PHP Development Team reports :

The release of PHP 5.4.13 and 5.4.3 complete a fix for the vulnerability in CGI-based setups as originally described in CVE-2012-1823. (CVE-2012-2311)

Note: mod_php and php-fpm are not vulnerable to this attack.

PHP 5.4.3 fixes a buffer overflow vulnerability in the apache_request_headers() (CVE-2012-2329).


Update the affected packages.

See Also

Plugin Details

Severity: High

ID: 59084

File Name: freebsd_pkg_59b68b1e9c7811e1b5e0000c299b62e1.nasl

Version: $Revision: 1.9 $

Type: local

Published: 2012/05/14

Modified: 2014/03/27

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:php5, p-cpe:/a:freebsd:freebsd:php52, p-cpe:/a:freebsd:freebsd:php53, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2012/05/12

Vulnerability Publication Date: 2012/05/08

Exploitable With


Core Impact

Metasploit (PHP apache_request_headers Function Buffer Overflow)

Reference Information

CVE: CVE-2012-1823, CVE-2012-2311, CVE-2012-2329