VID |
22445 |
Severity |
40 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
The Web server is running a version of PHP which is older than 5.2.3. PHP is a widely-used general-purpose scripting language that is especially suited for Web development and can be embedded into HTML. PHP versions 5.x prior to 5.2.3 are reported prone to multiple vulnerabilities, which could be exploited by attackers to bypass security checks, cause a denial of service or execute arbitrary code via multiple integer overflows.
* Note: This check solely relied on the banner of the remote Web server to assess this vulnerability, so this might be a false positive.
* References: http://www.php.net/releases/5_2_3.php http://www.securityfocus.com/archive/1/archive/1/470244/100/0/threaded http://www.sec-consult.com/291.html http://www.frsirt.com/english/advisories/2007/2016 http://www.frsirt.com/english/advisories/2007/1905 http://www.frsirt.com/english/advisories/2007/1904 http://www.securitytracker.com/id?1018186 http://www.securitytracker.com/id?1018187 http://secunia.com/advisories/24824 http://secunia.com/advisories/25378 http://secunia.com/advisories/25456
* Platforms Affected: PHP versions 5.x prior to 5.2.3 Any operating systems Any version |
Recommendation |
Upgrade to the latest version of PHP (5.5.3 later), available from the PHP Web site at http://www.php.net |
Related URL |
CVE-2007-1900,CVE-2007-2756,CVE-2007-2872,CVE-2007-3007 (CVE) |
Related URL |
23359,24089,24259,24261 (SecurityFocus) |
Related URL |
33510 (ISS) |
|