VID |
22587 |
Severity |
40 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
According to its banner, the version of PHP 5.3.x installed on the remote host is prior to 5.3.26. It is, therefore, potentially affected by the following vulnerabilities:
- An error exists in the function 'php_quot_print_encode' in the file 'ext/standard/quot_print.c' that could allow a heap-based buffer overflow when attempting to parse certain strings (Bug #64879)
- An integer overflow error exists related to the value of 'JEWISH_SDN_MAX' in the file 'ext/calendar/jewish.c' that could allow denial of service attacks. (Bug #64895)
Note: This check solely relied on the banner of the remote HTTP server to assess this vulnerability, so this might be a false positive.
* References: https://github.com/php/php-src/commit/93e0d78ec655f59ebfa82b2c6f8486c43651c1d0 http://www.php.net/ChangeLog-5.php#5.3.26
* Platforms Affected: PHP Prior to 5.3.26 Any operating system Any version |
Recommendation |
Upgrade to the latest version of PHP (5.3.26 or later), available from the PHP Web site at http://www.php.net/ |
Related URL |
CVE-2013-2110,CVE-2013-4635 (CVE) |
Related URL |
60411,60731 (SecurityFocus) |
Related URL |
(ISS) |
|