VID |
22719 |
Severity |
40 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
According to its banner, the version of PHP running on the remote web server is 5.6.x prior to 5.6.20. It is, therefore, affected by multiple vulnerabilities :
- A buffer over-write condition exists in the finfo_open() function due to improper validation of magic files. An unauthenticated, remote attacker can exploit this, via a crafted file, to cause a denial of service or to execute arbitrary code. (OSVDB 122863)
- A flaw exists in the php_snmp_error() function within file ext/snmp/snmp.c that is triggered when handling format string specifiers. An unauthenticated, remote attacker can exploit this, via a crafted SNMP object, to cause a denial of service or to execute arbitrary code. (OSVDB 136483)
- An invalid memory write error exists when handling the path of phar file names that allows an attacker to have an unspecified impact. (OSVDB 136484)
- A flaw exists in the mbfl_strcut() function within file ext/mbstring/libmbfl/mbfl/mbfilter.c when handling negative parameter values. An unauthenticated, remote attacker can exploit this to cause a denial of service. (OSVDB 136485)
- An integer overflow condition exists in the php_raw_url_encode() function within file ext/standard/url.c due to improper validation of user-supplied input. An unauthenticated, remote attacker can exploit this to have an unspecified impact. (OSVDB 136486)
* Note: This check solely relied on the version number of the remote PHP to assess this vulnerability, so this might be a false positive.
* References: http://php.net/ChangeLog-5.php#5.6.20
* Platforms Affected: PHP Prior to 5.6.20 Any operating system Any version |
Recommendation |
Upgrade to the latest version of PHP (5.6.20 or later), available from the PHP web site at http://www.php.net/downloads.php |
Related URL |
(CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|