PHP Remote getimagesize DoS

High Nessus Network Monitor Plugin ID 2782


The remote host is missing a critical security patch or upgrade.


The remote host is running a version of PHP that is older than 4.3.11 or 5.0.4. This version contains a bug that can be triggered when the getimagesize() function processes malicious IFF or JPEG image files. An attacker exploiting this flaw would be able to present an image to the function that would cause the function to go into an infinite loop by processing a negative file size. A successful exploit would result in the loss of system availability for valid users. There is also a reported flaw in the way that PHP handles data being passed to the Image File Directory (IFD). Reportedly, this leads to a remote Denial of Service (DoS) attack. Other flaws impacting this version of PHP have been reported; however, details have not been released.


Upgrade to 4.3.11, 5.0.4 or higher.

See Also

Plugin Details

Severity: High

ID: 2782

File Name: 2782.prm

Family: Web Servers

Published: 2005/04/01

Modified: 2016/01/15

Dependencies: 8728, 8682

Nessus ID: 18033

Risk Information

Risk Factor: High


Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:H/RL:OF/RC:C


Base Score: 7.3

Temporal Score: 7


Temporal Vector: CVSS3#E:H/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:php:php

Patch Publication Date: 2005/03/25

Vulnerability Publication Date: 2005/03/31

Reference Information

CVE: CVE-2005-0524, CVE-2005-0525, CVE-2005-1043

BID: 12963, 12962, 13143, 13163, 13164

OSVDB: 15629, 15630, 15631