Korean
<< Back
VID 22529
Severity 40
Port 80, ...
Protocol TCP
Class CGI
Detailed Description According to its banner, the version of PHP 5.3.x installed on the remote host is older than 5.3.7. The new versions resolve the following issues :

- A stack buffer overflow in socket_connect() (CVE-2011-1938)

- A use-after-free vulnerability in substr_replace() (CVE-2011-1148)

- A code execution vulnerability in ZipArchive::addGlob()
(CVE-2011-1657)

- crypt_blowfish was updated to 1.2. (CVE-2011-2483)

- Multiple null pointer dereferences

- An unspecified crash in error_log()

- A buffer overflow in crypt()

* Note: This check solely relied on the version number of the remote WebLogic server to assess this vulnerability, so this might be a false positive.

* References:
http://securityreason.com/achievement_securityalert/101
http://securityreason.com/exploitalert/10738
https://bugs.php.net/bug.php?id=54238
https://bugs.php.net/bug.php?id=54681
https://bugs.php.net/bug.php?id=54939
http://www.php.net/releases/5_3_7.php

* Platforms Affected:
PHP 5.3.x Prior to 5.3.7
Any operating system Any version
Recommendation Upgrade to the latest version of PHP (5.3.7 or later), available from the Mozilla Web site at http://www.php.net/downloads.php
Related URL CVE-2011-1148,CVE-2011-1657,CVE-2011-1938,CVE-2011-2202,CVE-2011-2483 (CVE)
Related URL 46843,47950,48259,49241,49249,49252 (SecurityFocus)
Related URL (ISS)