Scientific Linux Security Update : php53 on SL5.x i386/x86_64

High Nessus Plugin ID 78852


The remote Scientific Linux host is missing one or more security updates.


A buffer overflow flaw was found in the Exif extension. A specially crafted JPEG or TIFF file could cause a PHP application using the exif_thumbnail() function to crash or, possibly, execute arbitrary code with the privileges of the user running that PHP application.

An integer overflow flaw was found in the way custom objects were unserialized. Specially crafted input processed by the unserialize() function could cause a PHP application to crash. (CVE-2014-3669)

An out-of-bounds read flaw was found in the way the File Information (fileinfo) extension parsed Executable and Linkable Format (ELF) files. A remote attacker could use this flaw to crash a PHP application using fileinfo via a specially crafted ELF file.

An out of bounds read flaw was found in the way the xmlrpc extension parsed dates in the ISO 8601 format. A specially crafted XML-RPC request or response could possibly cause a PHP application to crash.

After installing the updated packages, the httpd daemon must be restarted for the update to take effect.


Update the affected packages.

See Also

Plugin Details

Severity: High

ID: 78852

File Name: sl_20141030_php53_on_SL5_x.nasl

Version: $Revision: 1.4 $

Type: local

Agent: unix

Published: 2014/11/04

Modified: 2015/01/15

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: x-cpe:/o:fermilab:scientific_linux

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/RedHat/release, Host/RedHat/rpm-list

Patch Publication Date: 2014/10/30

Reference Information

CVE: CVE-2014-3668, CVE-2014-3669, CVE-2014-3670, CVE-2014-3710