Korean
<< Back
VID 22338
Severity 30
Port 80, ...
Protocol TCP
Class WWW
Detailed Description The Web server is running a version of PHP which has a denial of service vulnerability. PHP is a widely-used general-purpose scripting language that is especially suited for Web development and can be embedded into HTML. PHP versions 4.x prior to 4.3.11 and PHP versions 5.0.x prior to 5.0.4 are vulnerable to a denial of service attack, caused by improper validation of file data in the routines 'php_handle_iff' and 'php_handle_jpeg', which are called by the PHP function 'getimagesize()'. By sending a specially-crafted image (JPEG or IFF) to the getimagesize() PHP function, a remote attacker could cause PHP to enter into an infinite loop to consume excessive processing resources on an affected computer, leading to a denial of service condition.

* Note: This check solely relied on the banner of the remote HTTP server to assess this vulnerability, so this might be a false positive.

* References:
http://www.idefense.com/application/poi/display?id=222&type=vulnerabilities
http://secunia.com/advisories/14792/

* Platforms Affected:
PHP Group, PHP versions 4.x prior to 4.3.11
PHP Group, PHP versions 5.0.x prior to 5.0.4
Any operating system Any version
Recommendation Upgrade to the latest version of PHP (4.3.11 or 5.0.4 or later), available from the PHP Web site at http://www.php.net/
Related URL CVE-2005-0524,CVE-2005-0525 (CVE)
Related URL 12962,12963 (SecurityFocus)
Related URL 19920,19924 (ISS)