Korean
<< Back
VID 22443
Severity 40
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The Web server is running a version of PHP which is older than 4.4.7 / 5.2.2. PHP is a widely-used general-purpose scripting language that is especially suited for Web development and can be embedded into HTML. PHP versions prior to 4.4.7 and versions 5.x prior to 5.2.2 are reported prone to multiple buffer overflow vulnerabilities in the createwbmp and readwbmp functions in the GD graphics library (libgd). By creating a specially-crafted Wireless Bitmap (WBMP) image, a remote attacker could execute arbitrary code on the affected host or cause a denial of service, if the attacker could persuade the victim to view the malicious image.

* Note: This check solely relied on the banner of the remote Web server to assess this vulnerability, so this might be a false positive.

* References:
http://www.php.net/releases/4_4_7.php
http://www.php.net/releases/5_2_2.php
http://www.securityfocus.com/archive/1/archive/1/464957/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/466166/100/0/threaded
http://www.frsirt.com/english/advisories/2007/1269
http://secunia.com/advisories/24814
http://secunia.com/advisories/24924
http://secunia.com/advisories/24965
http://secunia.com/advisories/24945

* Platforms Affected:
PHP versions prior to 4.4.7
PHP versions 5.x prior to 5.2.2
Any operating systems Any version
Recommendation Upgrade to the latest version of PHP (4.4.7 or 5.2.2 later), available from the PHP Web site at http://www.php.net
Related URL CVE-2007-1001 (CVE)
Related URL 23357 (SecurityFocus)
Related URL 33453 (ISS)