Fedora 19 : php-5.5.3-1.fc19 (2013-14998)

Medium Nessus Plugin ID 69462

New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.

VPR Score: 5.3


The remote Fedora host is missing a security update.


Version 5.5.3, 22 Aug 2013

Openssl: + Fixed UMR in fix for CVE-2013-4248.

Version 5.5.2, 15-Aug-2013

Core :

- Fixed bug #65372 (Segfault in gc_zval_possible_root when return reference fails).

- Fixed value of FILTER_SANITIZE_FULL_SPECIAL_CHARS constant (previously was erroneously set to FILTER_SANITIZE_SPECIAL_CHARS value).

- Fixed bug #65304 (Use of max int in array_sum).

- Fixed bug #65291 (get_defined_constants() causes PHP to crash in a very limited case).

- Fixed bug #62691 (solaris sed has no -i switch).

- Fixed bug #61345 (CGI mode - make install don't work).

- Fixed bug #61268 (--enable-dtrace leads make to clobber Zend/zend_dtrace.d).


- Added flags option to DOMDocument::schemaValidate() and DOMDocument::schemaValidateSource(). Added LIBXML_SCHEMA_CREATE flag.

OPcache :

- Added opcache.restrict_api configuration directive that may limit usage of OPcahce API functions only to patricular script(s).

- Added support for glob symbols in blacklist entries (?, *, **).

- Fixed bug #65338 (Enabling both php_opcache and php_wincache AVs on shutdown).

Openssl :

- Fixed handling null bytes in subjectAltName (CVE-2013-4248).

PDO_mysql :

- Fixed bug #65299 (pdo mysql parsing errors).

Phar :

- Fixed bug #65028 (Phar::buildFromDirectory creates corrupt archives for some specific contents).

Pgsql :

- Fixed bug #62978 (Disallow possible SQL injections with pg_select()/pg_update() /pg_delete()/pg_insert()).

- Fixed bug #65336 (pg_escape_literal/identifier() silently returns false).

Sessions :

- Implemented strict sessions RFC (https://wiki.php.net/rfc/strict_sessions) which protects against session fixation attacks and session collisions (CVE-2011-4718).

- Fixed possible buffer overflow under Windows. Note:
Not a security fix.

- Changed session.auto_start to PHP_INI_PERDIR.


- Fixed bug #65018 (SoapHeader problems with SoapServer).


- Fixed bug #65328 (Segfault when getting SplStack object Value).

- Added RecursiveTreeIterator setPostfix and getPostifx methods.

- Fixed bug #61697 (spl_autoload_functions returns lambda functions incorrectly).

Streams :

- Fixed bug #65268 (select() implementation uses outdated tick API).

Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.


Update the affected php package.

See Also





Plugin Details

Severity: Medium

ID: 69462

File Name: fedora_2013-14998.nasl

Version: 1.11

Type: local

Agent: unix

Published: 2013/08/25

Updated: 2020/03/12

Dependencies: 12634

Risk Information

Risk Factor: Medium

VPR Score: 5.3

CVSS v2.0

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:fedoraproject:fedora:php, cpe:/o:fedoraproject:fedora:19

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2013/08/19

Reference Information

CVE: CVE-2011-4718, CVE-2013-4248

BID: 61776, 61929

FEDORA: 2013-14998