VID |
22684 |
Severity |
40 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
According to its banner, the version of PHP 5.4.x, 5.5.x, 5.6.x installed on the remote host is a version prior to 5.4.38, 5.5.22, 5.6.6. The PHP versions are affected by multiple vulnerabilities :
- A heap-based buffer overflow flaw in the GNU C Library(glibc) due to improperly validating user-supplied input in the glibc functions __nss_hostname_digits_dots(), gethostbyname(), and gethostbyname2(). This allows a remote attacker to cause a buffer overflow, resulting in a denial of service condition or the execution of arbitrary code. (CVE-2015-0235)
- A use-after-free flaw exists in the function hp_date_timezone_initialize_from_hash() within the 'ext/date/php_date.c' script. An attacker can exploit this to access sensitive information or crash applications linked to PHP. (CVE-2015-0273)
* Note: This check solely relied on the version number of the remote PHP to assess this vulnerability, so this might be a false positive.
* References: http://php.net/ChangeLog-5.php#5.4.38 http://php.net/ChangeLog-5.php#5.5.22 http://php.net/ChangeLog-5.php#5.6.6
* Platforms Affected: PHP Prior to 5.4.38, 5.5.22, 5.6.6 Any operating system Any version |
Recommendation |
Upgrade to the latest version of PHP (5.4.38, 5.5.22, 5.6.6 or later), available from the PHP web site at http://www.php.net/downloads.php |
Related URL |
CVE-2015-0235,CVE-2015-0273 (CVE) |
Related URL |
72325,72701,73031,73034,73037 (SecurityFocus) |
Related URL |
(ISS) |
|