VID |
22612 |
Severity |
40 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
According to its banner, the version of PHP 5.5.x installed on the remote host is prior to 5.5.9. It is, therefore, potentially affected by the following vulnerabilities:
- A heap-based buffer overflow error exists related to the functions 'gdImageCrop' and 'imagecrop' that could allow denial of service attacks and possibly arbitrary code execution. (CVE-2013-7226) - An error exists in the function 'gdImageCrop' related to return value checking that could lead to use of NULL pointers and denial of service attacks. (CVE-2013-7327) - Multiple integer signedness errors exist in the function 'gdImageCrop' that could allow denial of service attacks and information disclosure. (CVE-2013-7328) - A data type checking error exists that could allow information disclosure. (CVE-2014-2020)
Note: This check solely relied on the banner of the remote HTTP server to assess this vulnerability, so this might be a false positive.
* References: http://www.php.net/ChangeLog-5.php#5.5.9 https://github.com/php/php-src/commit/2938329ce19cb8c4197dec146c3ec887c6f61d01 https://github.com/php/php-src/commit/8f4a5373bb71590352fd934028d6dde5bc18530b
* Platforms Affected: PHP Prior to 5.5.9 Any operating system Any version |
Recommendation |
Upgrade to the latest version of PHP (5.5.9 or later), available from the PHP Web site at http://www.php.net/ |
Related URL |
CVE-2013-7226,CVE-2013-7327,CVE-2013-7328,CVE-2014-2020 (CVE) |
Related URL |
65533,65656,65668,65676 (SecurityFocus) |
Related URL |
(ISS) |
|