openSUSE Security Update : apache2-mod_php5 (openSUSE-SU-2011:1137-1)

Critical Nessus Plugin ID 75433

Synopsis

The remote openSUSE host is missing a security update.

Description

The blowfish password hashing implementation did not properly handle 8-characters in passwords, which made it easier for attackers to crack the hash (CVE-2011-2483). After this update existing hashes with id '$2a$' for passwords that contain 8-bit characters will no longer be compatible with newly generated hashes. Affected users will either have to change their password to store a new hash or the id of the existing hash has to be manually changed to '$2x$' in order to activate a compat mode. Please see the description of the CVE-2011-2483 glibc update for details.

File uploads could potentially overwrite files owned by the user running php (CVE-2011-2202).

A long salt argument to the crypt function could cause a buffer overflow (CVE-2011-3268)

Solution

Update the affected apache2-mod_php5 packages.

See Also

https://bugzilla.novell.com/show_bug.cgi?id=699711

https://bugzilla.novell.com/show_bug.cgi?id=701491

https://bugzilla.novell.com/show_bug.cgi?id=709549

https://bugzilla.novell.com/show_bug.cgi?id=715646

https://lists.opensuse.org/opensuse-updates/2011-10/msg00014.html

Plugin Details

Severity: Critical

ID: 75433

File Name: suse_11_3_apache2-mod_php5-110907.nasl

Version: 1.4

Type: local

Agent: unix

Published: 2014/06/13

Updated: 2018/11/10

Dependencies: 12634

Risk Information

Risk Factor: Critical

CVSS v2.0

Base Score: 10

Temporal Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:apache2-mod_php5, p-cpe:/a:novell:opensuse:php5, p-cpe:/a:novell:opensuse:php5-bcmath, p-cpe:/a:novell:opensuse:php5-bz2, p-cpe:/a:novell:opensuse:php5-calendar, p-cpe:/a:novell:opensuse:php5-ctype, p-cpe:/a:novell:opensuse:php5-curl, p-cpe:/a:novell:opensuse:php5-dba, p-cpe:/a:novell:opensuse:php5-devel, p-cpe:/a:novell:opensuse:php5-dom, p-cpe:/a:novell:opensuse:php5-enchant, p-cpe:/a:novell:opensuse:php5-exif, p-cpe:/a:novell:opensuse:php5-fastcgi, p-cpe:/a:novell:opensuse:php5-fileinfo, p-cpe:/a:novell:opensuse:php5-ftp, p-cpe:/a:novell:opensuse:php5-gd, p-cpe:/a:novell:opensuse:php5-gettext, p-cpe:/a:novell:opensuse:php5-gmp, p-cpe:/a:novell:opensuse:php5-hash, p-cpe:/a:novell:opensuse:php5-iconv, p-cpe:/a:novell:opensuse:php5-imap, p-cpe:/a:novell:opensuse:php5-intl, p-cpe:/a:novell:opensuse:php5-json, p-cpe:/a:novell:opensuse:php5-ldap, p-cpe:/a:novell:opensuse:php5-mbstring, p-cpe:/a:novell:opensuse:php5-mcrypt, p-cpe:/a:novell:opensuse:php5-mysql, p-cpe:/a:novell:opensuse:php5-odbc, p-cpe:/a:novell:opensuse:php5-openssl, p-cpe:/a:novell:opensuse:php5-pcntl, p-cpe:/a:novell:opensuse:php5-pdo, p-cpe:/a:novell:opensuse:php5-pear, p-cpe:/a:novell:opensuse:php5-pgsql, p-cpe:/a:novell:opensuse:php5-phar, p-cpe:/a:novell:opensuse:php5-posix, p-cpe:/a:novell:opensuse:php5-pspell, p-cpe:/a:novell:opensuse:php5-readline, p-cpe:/a:novell:opensuse:php5-shmop, p-cpe:/a:novell:opensuse:php5-snmp, p-cpe:/a:novell:opensuse:php5-soap, p-cpe:/a:novell:opensuse:php5-sockets, p-cpe:/a:novell:opensuse:php5-sqlite, p-cpe:/a:novell:opensuse:php5-suhosin, p-cpe:/a:novell:opensuse:php5-sysvmsg, p-cpe:/a:novell:opensuse:php5-sysvsem, p-cpe:/a:novell:opensuse:php5-sysvshm, p-cpe:/a:novell:opensuse:php5-tidy, p-cpe:/a:novell:opensuse:php5-tokenizer, p-cpe:/a:novell:opensuse:php5-wddx, p-cpe:/a:novell:opensuse:php5-xmlreader, p-cpe:/a:novell:opensuse:php5-xmlrpc, p-cpe:/a:novell:opensuse:php5-xmlwriter, p-cpe:/a:novell:opensuse:php5-xsl, p-cpe:/a:novell:opensuse:php5-zip, p-cpe:/a:novell:opensuse:php5-zlib, cpe:/o:novell:opensuse:11.3

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2011/09/07

Reference Information

CVE: CVE-2011-2202, CVE-2011-2483, CVE-2011-3268