Scientific Linux Security Update : php on SL6.x, SL7.x i386/x86_64

High Nessus Plugin ID 78853


The remote Scientific Linux host is missing one or more security updates.


A buffer overflow flaw was found in the Exif extension. A specially crafted JPEG or TIFF file could cause a PHP application using the exif_thumbnail() function to crash or, possibly, execute arbitrary code with the privileges of the user running that PHP application.

An integer overflow flaw was found in the way custom objects were unserialized. Specially crafted input processed by the unserialize() function could cause a PHP application to crash. (CVE-2014-3669)

An out-of-bounds read flaw was found in the way the File Information (fileinfo) extension parsed Executable and Linkable Format (ELF) files. A remote attacker could use this flaw to crash a PHP application using fileinfo via a specially crafted ELF file.

An out of bounds read flaw was found in the way the xmlrpc extension parsed dates in the ISO 8601 format. A specially crafted XML-RPC request or response could possibly cause a PHP application to crash.

The CVE-2014-3710 issue was discovered by Francisco Alonso of Red Hat Product Security.

After installing the updated packages, the httpd daemon must be restarted for the update to take effect.


Update the affected packages.

See Also

Plugin Details

Severity: High

ID: 78853

File Name: sl_20141030_php_on_SL6_x.nasl

Version: $Revision: 1.4 $

Type: local

Agent: unix

Published: 2014/11/04

Modified: 2015/01/15

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: x-cpe:/o:fermilab:scientific_linux

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/RedHat/release, Host/RedHat/rpm-list

Patch Publication Date: 2014/10/30

Reference Information

CVE: CVE-2014-3668, CVE-2014-3669, CVE-2014-3670, CVE-2014-3710