Vulnerability Assessment & Network Security Forums

If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.

Home >> Browse Vulnerability Assessment Database >> Fedora Local Security Checks >> Fedora Core 3 2004-568: php

Vulnerability Assessment Details

Fedora Core 3 2004-568: php

Vulnerability Assessment Summary
Check for the version of the php package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory FEDORA-2004-568 (php).

PHP is an HTML-embedded scripting language. PHP attempts to make it
easy for developers to write dynamically generated webpages. PHP also
offers built-in database integration for several commercial and
non-commercial database management systems, so writing a
database-enabled webpage with PHP is fairly simple. The most common
use of PHP coding is probably as a replacement for CGI scripts. The
mod_php module enables the Apache Web server to understand and process
the embedded PHP language in Web pages.

This update includes the latest release of PHP 4.3, including fixes
for security issues in the unserializer (CVE CVE-2004-1019) and exif
image parsing (CVE CVE-2004-1065).

Solution :
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

IBM LTO5 FH Bezel For Internal & External & Loader. ( Bezel and 3 Screws only )
IBM LTO5 FH Bezel For Internal & External & Loader. ( Bezel and 3 Screws only )  pictureLENOVO THINKPAD EDGE E455 14" LCD FRONT BEZEL COVER AP0TR000700 BLACK EEE91
LENOVO THINKPAD EDGE E530 15.6Lenovo IdeaPad G505s 20255 15.6" US Keyboard 25211050 V-136520PS1-US ggg38
Lenovo IdeaPad G505s 20255 15.6


No Discussions have been posted on this vulnerability.