VID |
22613 |
Severity |
40 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
According to its banner, the version of PHP 5.5.x installed on the remote host is prior to 5.5.8. It is, therefore, potentially affected by the following vulnerabilities:
- A heap-based buffer overflow error exists in the file 'ext/date/lib/parse_iso_intervals.c' related to handling DateInterval objects that could allow denial of service attacks. (CVE-2013-6712) - An integer overflow error exists in the function 'exif_process_IFD_TAG' in the file 'ext/exif/exif.c' that could allow denial of service attacks or arbitrary memory reads. (Bug #65873) - A use-after-free error exists in the function 'do_soap_call' in the file 'ext/soap/soap.c' related to 'typemap' values and error handling and having unspecified impact. (Bug #66112)
Note: This check solely relied on the banner of the remote HTTP server to assess this vulnerability, so this might be a false positive.
* References: http://www.php.net/ChangeLog-5.php#5.5.8
* Platforms Affected: PHP Prior to 5.5.8 Any operating system Any version |
Recommendation |
Upgrade to the latest version of PHP (5.5.8 or later), available from the PHP Web site at http://www.php.net/ |
Related URL |
CVE-2013-6712 (CVE) |
Related URL |
64018 (SecurityFocus) |
Related URL |
(ISS) |
|