Korean
<< Back
VID 22640
Severity 40
Port 80, ...
Protocol TCP
Class CGI
Detailed Description According to its banner, the version of PHP 5.4.x installed on the remote host is a version prior to 5.4.34. It is, therefore, affected by the following vulnerabilities :

- A buffer overflow error exists in the function 'mkgmtime' that can allow application crashes or arbitrary code execution. (CVE-2014-3668)
- An integer overflow error exists in the function 'unserialize' that can allow denial of service attacks. Note that this only affects 32-bit instances. (CVE-2014-3669)
- A heap corruption error exists in the function 'exif_thumbnail' that can allow application crashes or arbitrary code execution. (CVE-2014-3670)
- An input-validation error exists in the cURL extension's file 'ext/curl/interface.c' and NULL option handling that can allow information disclosure. (Bug #68089)

* Note: This check solely relied on the version number of the remote PHP to assess this vulnerability, so this might be a false positive.

* References:
http://www.php.net/ChangeLog-5.php#5.4.34

* Platforms Affected:
PHP Prior to 5.4.34
Any operating system Any version
Recommendation Upgrade to the latest version of PHP (5.4.34 or later), available from the PHP web site at http://www.php.net/downloads.php
Related URL CVE-2014-3668,CVE-2014-3669,CVE-2014-3670 (CVE)
Related URL 70611,70665,70666 (SecurityFocus)
Related URL (ISS)