Vulnerability Assessment & Network Security Forums

If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.

Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA020] DSA-020-1 php4

Vulnerability Assessment Details

[DSA020] DSA-020-1 php4

Vulnerability Assessment Summary
DSA-020-1 php4

Detailed Explanation for this Vulnerability Assessment
The Zend people have found a vulnerability in older
versions of PHP4 (the original advisory speaks of 4.0.4 while the bugs are
present in 4.0.3 as well). It is possible to specify PHP directives on a
per-directory basis which leads to a remote attacker crafting an HTTP request
that would cause the next page to be served with the wrong values for these
directives. Also even if PHP is installed, it can be activated and deactivated
on a per-directory or per-virtual host basis using the "engine=on" or
"engine=off" directive. This setting can be leaked to other virtual hosts on
the same machine, effectively disabling PHP for those hosts and resulting in
PHP source code being sent to the client instead of being executed on the

Solution :
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is (C) 2005 Michel Arboi

Cables, Connectors

100% test INTEL SE7501BR2 A95686-507 (by EMS or DHL 90days Warranty) #j1688
100% test INTEL SE7501BR2  A95686-507   (by EMS or DHL 90days Warranty)  #j1688 pictureMacBook Air 13" A1466 2015 i5-1.6GHZ 8G RAM Logic Board 820-000165
MacBook Air 13MacBook Air 13" A1466 2015 i5-1.6GHZ 4G RAM Logic Board 820-000165
MacBook Air 13


No Discussions have been posted on this vulnerability.