Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA351] DSA-351-1 php4


Vulnerability Assessment Details

[DSA351] DSA-351-1 php4

Vulnerability Assessment Summary
DSA-351-1 php4

Detailed Explanation for this Vulnerability Assessment

The transparent session ID feature in the php4 package does not
properly escape user-supplied input before inserting it into the
generated HTML page. A possible hacker could use this vulnerability to
execute embedded scripts within the context of the generated page.
For the stable distribution (woody) this problem has been fixed in
version 4:4.1.2-6woody3.
For the unstable distribution (sid) this problem will be fixed soon.
Refer to Debian bug #200736.
We recommend that you update your php4 package.


Solution : http://www.debian.org/security/2003/dsa-351
Network Security Threat Level: High

Networks Security ID: 7761

Vulnerability Assessment Copyright: This script is (C) 2006 Michel Arboi

Cables, Connectors

Lenovo G555 LCD Screen Video Flex Cable Laptop Replacement Parts
$7.99
Lenovo G555 LCD Screen Video Flex Cable Laptop Replacement Parts pictureGenuine Lenovo Battery L15S4A01 L15L4A01 L15M4A01 for V4400 Ideapad 100-15IBD
$45.59
Genuine Lenovo Battery L15S4A01 L15L4A01 L15M4A01 for V4400 Ideapad 100-15IBD pictureLot of 2 IBM 39R6530 1M External Mini SAS Cables 39R6589
$44.97
Lot of 2 IBM 39R6530 1M External Mini SAS Cables 39R6589 picture*LOT OF 20* Hitachi 80GB 5400RPM 2.5" Hard Drives HTS541680J9SA00 Lenovo 42T1028
$179.99
*LOT OF 20* Hitachi 80GB 5400RPM 2.5


Discussions

No Discussions have been posted on this vulnerability.