VID |
22685 |
Severity |
40 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
According to its banner, the version of PHP 5.4.x, 5.5.x installed on the remote host is a version prior to 5.4.30, 5.5.14. The PHP versions are affected by multiple vulnerabilities :
- Boundary checking errors exist related to the Fileinfo extension, Composite Document Format (CDF) handling and the functions 'cdf_read_short_sector', 'cdf_check_stream_offset', 'cdf_count_chain', and 'cdf_read_property_info'. (CVE-2014-0207, CVE-2014-3479, CVE-2014-3480, CVE-2014-3487)
- A pascal string size handling error exists related to the Fileinfo extension and the function 'mconvert'. (CVE-2014-3478)
- A type-confusion error exists related to the Standard PHP Library (SPL) extension and the function 'unserialize'. (CVE-2014-3515)
- An error exists related to configuration scripts and temporary file handling that could allow insecure file usage. (CVE-2014-3981)
- A heap-based buffer overflow error exists related to the function 'dns_get_record' that could allow execution of arbitrary code. (CVE-2014-4049)
- A type-confusion error exists related to the function 'php_print_info' that could allow disclosure of sensitive information. (CVE-2014-4721)
* Note: This check solely relied on the version number of the remote PHP to assess this vulnerability, so this might be a false positive.
* References: http://php.net/ChangeLog-5.php#5.4.30 http://php.net/ChangeLog-5.php#5.5.14
* Platforms Affected: PHP Prior to 5.4.30, 5.5.14 Any operating system Any version |
Recommendation |
Upgrade to the latest version of PHP (5.4.30, 5.5.14 or later), available from the PHP web site at http://www.php.net/downloads.php |
Related URL |
CVE-2014-0207,CVE-2014-3478,CVE-2014-3479,CVE-2014-3480,CVE-2014-3487,CVE-2014-3515,CVE-2014-3981,CVE-2014-4049,CVE-2014-4721 (CVE) |
Related URL |
67837,68007,68120,68237,68238,68239,68241,68243,68423,68550 (SecurityFocus) |
Related URL |
(ISS) |
|