VID |
22740 |
Severity |
40 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
According to its banner, the version of PHP running on the remote web server is 5.6.x prior to 5.6.25. It is, therefore, affected by multiple vulnerabilities :
- An unspecified flaw exists in the object_common2() function in var_unserializer.c that occurs when handling objects during deserializaiton.
- An integer overflow condition exists in the php_snmp_parse_oid() function in snmp.c.
- An integer truncation flaw exists in the select_colors() function in gd_topal.c that is triggered when handling the number of colors.
- An overflow condition exists in the sql_regcase() function in ereg.c due to improper handling of overly long strings.
- A NULL pointer dereference flaw exists in the php_wddx_pop_element() function in wddx.c that is triggered during the handling of Base64 binary values.
- An unspecified NULL pointer dereference flaw exists in the php_wddx_pop_element() function in wddx.c.
- An integer overflow condition exists in the php_base64_encode() function in base64.c that occurs when handling overly long strings.
- A NULL pointer dereference flaw exists in the php_wddx_deserialize_ex() function in wddx.c that occurs during the handling of invalid XML content.
- An integer overflow condition exists in the php_quot_print_encode() function in quot_print.c that occurs when handling overly long strings.
- A use-after-free error exists in the unserialize() function in var.c.
- A flaw exists in the php_ftp_fopen_connect() function in ftp_fopen_wrapper.c that allows a man-in-the-middle attacker to silently downgrade to regular FTP even if a secure method has been requested.
- A flaw exists in the php_wddx_process_data() function in wddx.c that occurs when deserializing invalid dateTime values.
- A flaw exists in the exif_process_IFD_in_TIFF() function in exif.c that occurs when handling TIFF image content.
- An integer overflow condition exists in the php_url_encode() function in url.c that occurs when handling overly long strings.
- An integer overflow condition exists in the php_uuencode() function in uuencode.c.
- An integer overflow condition exists in the bzdecompress() function in bz2.c.
- An indexing flaw exists in the imagegammacorrect() function in gd.c that occurs when handling negative gamma values.
- An integer overflow condition exists in the curl_escape() function in interface.c that occurs when handling overly long escaped strings.
- An unspecified flaw exists in session.c that occurs when handling session names.
* Note: This check solely relied on the version number of the remote PHP to assess this vulnerability, so this might be a false positive.
* References: http://php.net/ChangeLog-5.php#5.6.25
* Platforms Affected: PHP Prior to 5.6.25 Any operating system Any version |
Recommendation |
Upgrade to the latest version of PHP (5.6.25 or later), available from the PHP web site at http://www.php.net/downloads.php |
Related URL |
(CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|