Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Mandrake Local Security Checks >> MDKSA-2004:151: php


Vulnerability Assessment Details

MDKSA-2004:151: php

Vulnerability Assessment Summary
Check for the version of the php package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory MDKSA-2004:151 (php).



A number of vulnerabilities in PHP versions prior to 4.3.10 were discovered by
Stefan Esser. Some of these vulnerabilities were not deemed to be severe enough
to warrant CVE names, however the packages provided, with the exception of the
Corporate Server 2.1 packages, include fixes for all of the vulnerabilities,
thanks to the efforts of the OpenPKG team who extracted and backported the
fixes.

The vulnerabilities fixed in all provided packages include a fix for a possible
information disclosure, double free, and negative reference index array
underflow in deserialization code (CVE-2004-1019). As well, the exif_read_data
() function suffers from an overflow on a long sectionname
this vulnerability
was discovered by Ilia Alshanetsky (CVE-2004-1065).

The other fixes that appear in Mandrakelinux 9.2 and newer packages include a
fix for out of bounds memory write access in shmop_write() and integer overflow
/underflows in the pack() and unpack() functions. The addslashes() function did
not properly escape '



Solution : http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2004:151
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

Missile Command (large 8 1/2" x 11" 400/800 version) manual - Atari XL/XE
$4.99
Missile Command (large 8 1/2Page Designer manual (XLEnt Software) -near mint to mint - Atari 400/800/XL/XE
$4.24
Page Designer manual (XLEnt  Software) -near mint to mint - Atari 400/800/XL/XE pictureAtariwriter -RED TEXT - GREAT LABEL- Atari 400/800/XL/XE - WORKS & GUARANTEED
$29.99
Atariwriter -RED TEXT - GREAT LABEL- Atari 400/800/XL/XE - WORKS & GUARANTEED pictureJawbreaker II cart - WRONG LABEL- Atari 400/800/XL/XE - WORKS & GUARANTEED #2
$29.99
Jawbreaker II cart - WRONG LABEL- Atari 400/800/XL/XE - WORKS & GUARANTEED #2 picture


Discussions

No Discussions have been posted on this vulnerability.