VID |
22419 |
Severity |
40 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
The Web server is running a version of PHP which is older than 5.1.4 or 4.4.3. PHP is a widely-used general-purpose scripting language that is especially suited for Web development and can be embedded into HTML. PHP versions prior to 5.1.4 or 4.4.3 are reported prone to multiple local and remote vulnerabilities, including a buffer overflow, heap corruption that may lead to code execution within the context of the vulnerable process.
* Note: This check solely relied on the banner of the remote Web server to assess this vulnerability, so this might be a false positive.
* References: http://www.php.net/release_4_4_3.php http://www.php.net/release_5_1_3.php http://www.php.net/release_5_1_4.php http://www.securityfocus.com/archive/1/20060409192313.20536.qmail@securityfocus.com http://www.hardened-php.net/hphp/zend_hash_del_key_or_index_vulnerability.html http://www.securityfocus.com/archive/1/archive/1/442437/100/0/threaded
* Platforms Affected: PHP versions prior to 4.4.3 PHP versions prior to 5.1.4 Any operating systems Any version |
Recommendation |
Upgrade to the latest version of PHP (5.1.4 or 4.4.3 or later), available from the PHP Web site at http://www.php.net |
Related URL |
CVE-2006-1494,CVE-2006-1608,CVE-2006-1990,CVE-2006-1991,CVE-2006-2563,CVE-2006-2660,CVE-2006-3011,CVE-2006-3016,CVE-2006-3017,CVE-2006-3018 (CVE) |
Related URL |
17296,17362,17439,18116,18645 (SecurityFocus) |
Related URL |
25508,25705,25706,26764,27414 (ISS) |
|