Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Check for the version of the php packages
Detailed Explanation for this Vulnerability Assessment
Updated php packages that fix various security issues are now
available for Red Hat Enterprise Linux 4.
This update has been rated as having important security impact by the Red
Security Response Team.
PHP is an HTML-embedded scripting language commonly used with the Apache
HTTP Web server.
Flaws including possible information disclosure, double free, and negative
reference index array underflow were found in the deserialization code of
PHP. PHP applications may use the unserialize function on untrusted user
data, which could permit a remote attacker to gain access to memory or
potentially execute arbitrary code. The Common Vulnerabilities and
Exposures project (cve.mitre.org) has assigned the name CVE-2004-1019 to
A flaw in the exif extension of PHP was found which lead to a stack
overflow. A possible hacker could create a carefully crafted image file in such
a way which, if parsed by a PHP script using the exif extension, could
cause a crash or potentially execute arbitrary code. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name
CVE-2004-1065 to this issue.
Flaws were found in shmop_write, pack, and unpack PHP functions. These
functions are not normally passed user supplied data, so would require a
malicious PHP script to be exploited. The Common Vulnerabilities and
Exposures project (cve.mitre.org) has assigned the name CVE-2004-1018 to
Users of PHP should upgrade to these updated packages, which contain fixes
for these issues.
Solution : http://rhn.redhat.com/errata/RHSA-2005-032.html
Network Security Threat Level: High
Networks Security ID:
Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security
|DELL PowerEdge 2950 64-bit 2xQuad-Core Xeon 3.0GHz + 48GB RAM + 6x2TB 7.2K SATA
|800358-001 HP 24 SFF SERVER BACKPLANE FOR APOLLO R2600 GEN9 CTO CHASSIS
|Lot of 22 x 4GB 2Rx8 pc3 pc3l 10600r server memory.
|SolarFlare SFN4112F Single Port 10GB PCIe Server Adapter SF329-4000-R02
No Discussions have been posted on this vulnerability.