VID |
22638 |
Severity |
40 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
According to its banner, the version of PHP 5.6.x installed on the remote host is a version prior to 5.6.2. It is, therefore, affected by the following vulnerabilities :
- A buffer overflow error exists in the function 'mkgmtime' that can allow application crashes or arbitrary code execution. (CVE-2014-3668) - An integer overflow error exists in the function 'unserialize' that can allow denial of service attacks. Note that this only affects 32-bit instances. (CVE-2014-3669) - A heap corruption error exists in the function 'exif_thumbnail' that can allow application crashes or arbitrary code execution. (CVE-2014-3670) - An input-validation error exists in the cURL extension's file 'ext/curl/interface.c' and NULL option handling that can allow information disclosure. (Bug #68089)
* Note: This check solely relied on the version number of the remote PHP to assess this vulnerability, so this might be a false positive.
* References: http://www.php.net/ChangeLog-5.php#5.6.2
* Platforms Affected: PHP Prior to 5.6.2 Any operating system Any version |
Recommendation |
Upgrade to the latest version of PHP (5.6.2 or later), available from the PHP web site at http://www.php.net/downloads.php |
Related URL |
CVE-2014-3668,CVE-2014-3669,CVE-2014-3670 (CVE) |
Related URL |
70611,70665,70666 (SecurityFocus) |
Related URL |
(ISS) |
|