VID |
22761 |
Severity |
40 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
According to its banner, the version of PHP 5.6.x installed on the remote host is a version prior to 5.6.29 The PHP versions are affected by multiple vulnerabilities :
- A memory corruption issue exists in the php_wddx_push_element() function in ext/wddx/wddx.c that is triggered when decoding empty boolean elements. An unauthenticated, remote attacker can exploit this to cause a denial of service condition or the execution of arbitrary code. (CVE-2016-9935)
- A flaw exists in the in the openssl_pbkdf2() function in ext/openssl/openssl.c that is triggered when handling overly large key length parameters. An unauthenticated, remote attacker can exploit this to cause a denial of service condition.
* Note: This check solely relied on the version number of the remote PHP to assess this vulnerability, so this might be a false positive.
* References: http://www.php.net/ChangeLog-5.php#5.6.29
* Platforms Affected: PHP Prior to 5.6.29 Any operating system Any version |
Recommendation |
Upgrade to the latest version of PHP (5.6.29 or later), available from the PHP web site at http://www.php.net/downloads.php |
Related URL |
CVE-2016-9935 (CVE) |
Related URL |
94846 (SecurityFocus) |
Related URL |
(ISS) |
|