PHP 5.6.x < 5.6.6 Multiple Vulnerabilities (GHOST)

Critical Web Application Scanning Plugin ID 98829


PHP 5.6.x < 5.6.6 Multiple Vulnerabilities (GHOST)


According to its banner, the version of PHP 5.6.x installed on the remote host is prior to 5.6.6. It is, therefore, affected by multiple vulnerabilities :

- A heap-based buffer overflow flaw in the GNU C Library (glibc) due to improperly validating user-supplied input in the glibc functions __nss_hostname_digits_dots(), gethostbyname(), and gethostbyname2(). This allows a remote attacker to cause a buffer overflow, resulting in a denial of service condition or the execution of arbitrary code. (CVE-2015-0235)

- A use-after-free flaw exists in the function php_date_timezone_initialize_from_hash() within the 'ext/date/php_date.c' script. An attacker can exploit this to access sensitive information or crash applications linked to PHP. (CVE-2015-0273)

- An XML External Entity (XXE) flaw exists in the PHP-FPM component due to improper parsing of XML data. A remote attacker can exploit this, via specially crafted XML data, to disclose sensitive information or cause a denial of service. (CVE-2015-8866)

Note that the scanner has not attempted to exploit these issues but has instead relied only on the application's self-reported version number.


Upgrade to PHP version 5.6.6 or later.

See Also

Plugin Details

Severity: Critical

ID: 98829

Type: remote

Published: 2019/01/09

Updated: 2020/07/24

Risk Information

Risk Factor: Critical

CVSS v2.0

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS v3.0

Base Score: 8.1

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: cpe:2.3:a:php:php:*:*:*:*:*:*:*:*

Exploit Available: true

Patch Publication Date: 2015/02/19

Vulnerability Publication Date: 2015/01/12

Reference Information

CVE: CVE-2014-9705, CVE-2015-0235, CVE-2015-0273, CVE-2015-8866

BID: 72325, 72701, 73031, 87470

CWE: 119

WASC: Buffer Overflow

OWASP: 2013-A9, 2017-A9