Korean
<< Back
VID 22755
Severity 40
Port 80, ...
Protocol TCP
Class CGI
Detailed Description According to its banner, the version of PHP 5.6.x installed on the remote host is a version prior to 5.6.28 The PHP versions are affected by multiple vulnerabilities :

- A flaw exists in the parse_url() function due to returning the incorrect host. An unauthenticated, remote attacker can exploit this to have a multiple impacts depending on how the function is implemented, which can include bypassing authentication or conducting open redirection and server-side request forgery attacks.

- An integer overflow condition exists in the _php_imap_mail() function in file ext/imap/php_imap.c when handling overly long strings. An unauthenticated, remote attacker can exploit this to cause a heap-based buffer overflow, resulting in a denial of service condition or the execution of arbitrary code.

- A flaw exists in the bzcompress() function when handling overly long strings. An unauthenticated, remote attacker can exploit this to cause a denial of service condition.

- An integer overflow condition exists in the gdImageAALine() function within file ext/gd/libgd/gd.c due to improper validation of line limit values. An unauthenticated, remote attacker can exploit this to cause an out-of-bounds memory read or write, resulting in a denial of service condition, the disclosure of memory contents, or the execution of arbitrary code.

* Note: This check solely relied on the version number of the remote PHP to assess this vulnerability, so this might be a false positive.

* References:
http://www.php.net/ChangeLog-5.php#5.6.28

* Platforms Affected:
PHP Prior to 5.6.28
Any operating system Any version
Recommendation Upgrade to the latest version of PHP (5.6.28 or later), available from the PHP web site at http://www.php.net/downloads.php
Related URL (CVE)
Related URL (SecurityFocus)
Related URL (ISS)