VID |
22711 |
Severity |
40 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
According to its banner, the version of PHP 5.6.x installed on the remote host is a version prior to 5.6.18 The PHP versions are affected by multiple vulnerabilities :
- An out-of-bounds read error exists in the gdImageRotateInterpolated() function in file gd_interpolation.c when handling background colors. A remote attacker can exploit this to disclose memory contents or crash the application. (CVE-2016-1903, OSVDB 132661)
- An integer overflow condition exists in file exec.c in the escapeshellarg() and escapeshellcmd() functions due to a failure to properly validate user-supplied string input. A remote attacker can exploit this to cause a heap-based overflow, resulting in a denial of service or the execution of arbitrary code. (CVE-2016-1904, OSVDB 133047)
- A use-after-free error exists in file wddx.c in the php_wddx_pop_element() function when handling WDDX packet deserialization. A remote attacker can exploit this, by dereferencing already freed memory, to execute arbitrary code. (OSVDB 132658)
- A type confusion flaw exists in file xmlrpc-epi-php.c in the PHP_to_XMLRPC_worker() function. A remote attacker can exploit this to disclose memory contents, crash the application process, or have other impact.(OSVDB 132659)
- A type confusion flaw exists in file wddx.c when handling WDDX packet deserialization. A remote attacker can exploit this to execute arbitrary code. (OSVDB 132660)
- An unspecified flaw exists in file fpm_log.c in the fpm_log_write() function when handling very long HTTP requests. A local attacker can exploit this to obtain sensitive information, via access to the access log file. (OSVDB 132662)
- A flaw exists in file lsapilib.c when handling requests due to the LSAPI module failing to clear its secrets in child processes. A remote attacker can exploit this to gain access to memory contents, resulting in the disclosure of sensitive information. (OSVDB 133626)
- A flaw exists in file lsapilib.c in the parseRequest() function due to a failure to properly sanitize input passed through multiple, unspecified parameters. A remote attacker can exploit this to cause a denial of service. (OSVDB 133689)
* Note: This check solely relied on the version number of the remote PHP to assess this vulnerability, so this might be a false positive.
* References: http://php.net/ChangeLog-5.php#5.6.18
* Platforms Affected: PHP Prior to 5.6.18 Any operating system Any version |
Recommendation |
Upgrade to the latest version of PHP (5.6.18 or later), available from the PHP web site at http://www.php.net/downloads.php |
Related URL |
CVE-2015-8383,CVE-2015-8386,CVE-2015-8387,CVE-2015-8389,CVE-2015-8390,CVE-2015-8391,CVE-2015-8393,CVE-2015-8394 (CVE) |
Related URL |
79810,82990 (SecurityFocus) |
Related URL |
(ISS) |
|