Fedora 19 : php-5.5.18-1.fc19 (2014-13031)

Medium Nessus Plugin ID 78708


The remote Fedora host is missing a security update.


16 Oct 2014, PHP 5.5.18

Core :

- Fixed bug #67985 (Incorrect last used array index copied to new array after unset). (Tjerk)

- Fixed bug #67739 (Windows 8.1/Server 2012 R2 OS build number reported as 6.2 (instead of 6.3)). (Christian Wenz)

- Fixed bug #67633 (A foreach on an array returned from a function not doing copy-on-write). (Nikita)

- Fixed bug #51800 (proc_open on Windows hangs forever).

- Fixed bug #68044 (Integer overflow in unserialize() (32-bits only)). (CVE-2014-3669) (Stas)

cURL :

- Fixed bug #68089 (NULL byte injection - cURL lib).


- Fixed bug #68113 (Heap corruption in exif_thumbnail()).
(CVE-2014-3670) (Stas)


- Fixed bug #65641 (PHP-FPM incorrectly defines the SCRIPT_NAME variable when using Apache, mod_proxy-fcgi and ProxyPass). (Remi)

OpenSSL :

- Revert regression introduced by fix of bug #41631

Reflection :

- Fixed bug #68103 (Duplicate entry in Reflection for class alias). (Remi)

Session :

- Fixed bug #67972 (SessionHandler Invalid memory read create_sid()). (Adam)


- Fixed bug #68027 (Global buffer overflow in mkgmtime() function). (CVE-2014-3668) (Stas)

Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.


Update the affected php package.

See Also


Plugin Details

Severity: Medium

ID: 78708

File Name: fedora_2014-13031.nasl

Version: 1.6

Type: local

Agent: unix

Published: 2014/10/29

Updated: 2020/03/12

Dependencies: 12634

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:fedoraproject:fedora:php, cpe:/o:fedoraproject:fedora:19

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2014/10/17

Reference Information

BID: 61128, 61776, 61929, 64225, 67118, 70611, 70665, 70666

FEDORA: 2014-13031