Korean
<< Back
VID 22445
Severity 40
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The Web server is running a version of PHP which is older than 5.2.3. PHP is a widely-used general-purpose scripting language that is especially suited for Web development and can be embedded into HTML. PHP versions 5.x prior to 5.2.3 are reported prone to multiple vulnerabilities, which could be exploited by attackers to bypass security checks, cause a denial of service or execute arbitrary code via multiple integer overflows.

* Note: This check solely relied on the banner of the remote Web server to assess this vulnerability, so this might be a false positive.

* References:
http://www.php.net/releases/5_2_3.php
http://www.securityfocus.com/archive/1/archive/1/470244/100/0/threaded
http://www.sec-consult.com/291.html
http://www.frsirt.com/english/advisories/2007/2016
http://www.frsirt.com/english/advisories/2007/1905
http://www.frsirt.com/english/advisories/2007/1904
http://www.securitytracker.com/id?1018186
http://www.securitytracker.com/id?1018187
http://secunia.com/advisories/24824
http://secunia.com/advisories/25378
http://secunia.com/advisories/25456

* Platforms Affected:
PHP versions 5.x prior to 5.2.3
Any operating systems Any version
Recommendation Upgrade to the latest version of PHP (5.5.3 later), available from the PHP Web site at http://www.php.net
Related URL CVE-2007-1900,CVE-2007-2756,CVE-2007-2872,CVE-2007-3007 (CVE)
Related URL 23359,24089,24259,24261 (SecurityFocus)
Related URL 33510 (ISS)