VID |
22557 |
Severity |
40 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
According to its banner, the version of PHP installed on the remote host is 5.4.x earlier than 5.4.4, and as such is potentially affected the following vulnerabilities :
- An integer overflow error exists in the function 'phar_parse_tarfile' in the file 'ext/phar/tar.c'. This error can lead to a heap-based buffer overflow when handling a maliciously crafted TAR file. Arbitrary code execution is possible due to this error. (CVE-2012-2386)
- A weakness exists in the 'crypt' function related to the DES implementation that can allow brute force attacks. (CVE-2012-2143)
* Note: This check solely relied on the version number of the remote WebLogic server to assess this vulnerability, so this might be a false positive.
* References: http://www.php.net/ChangeLog-5.php#5.4.4 http://0x1byte.blogspot.kr/2011/04/php-phar-extension-heap-overflow.html
* Platforms Affected: PHP Prior to 5.4.4 Any operating system Any version |
Recommendation |
Upgrade to the latest version of PHP (5.4.4 or later), available from the Mozilla Web site at http://www.php.net/downloads.php |
Related URL |
CVE-2012-2143,CVE-2012-2386 (CVE) |
Related URL |
47545,53729 (SecurityFocus) |
Related URL |
(ISS) |
|