Korean
<< Back
VID 22684
Severity 40
Port 80, ...
Protocol TCP
Class CGI
Detailed Description According to its banner, the version of PHP 5.4.x, 5.5.x, 5.6.x installed on the remote host is a version prior to 5.4.38, 5.5.22, 5.6.6. The PHP versions are affected by multiple vulnerabilities :

- A heap-based buffer overflow flaw in the GNU C Library(glibc) due to improperly validating user-supplied input in the glibc functions __nss_hostname_digits_dots(),
gethostbyname(), and gethostbyname2(). This allows a remote attacker to cause a buffer overflow, resulting in a denial of service condition or the execution of arbitrary code. (CVE-2015-0235)

- A use-after-free flaw exists in the function hp_date_timezone_initialize_from_hash() within the 'ext/date/php_date.c' script. An attacker can exploit this to access sensitive information or crash applications linked to PHP. (CVE-2015-0273)

* Note: This check solely relied on the version number of the remote PHP to assess this vulnerability, so this might be a false positive.

* References:
http://php.net/ChangeLog-5.php#5.4.38
http://php.net/ChangeLog-5.php#5.5.22
http://php.net/ChangeLog-5.php#5.6.6

* Platforms Affected:
PHP Prior to 5.4.38, 5.5.22, 5.6.6
Any operating system Any version
Recommendation Upgrade to the latest version of PHP (5.4.38, 5.5.22, 5.6.6 or later), available from the PHP web site at http://www.php.net/downloads.php
Related URL CVE-2015-0235,CVE-2015-0273 (CVE)
Related URL 72325,72701,73031,73034,73037 (SecurityFocus)
Related URL (ISS)