Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Red Hat Local Security Checks >> RHSA-2005-032: php


Vulnerability Assessment Details

RHSA-2005-032: php

Vulnerability Assessment Summary
Check for the version of the php packages

Detailed Explanation for this Vulnerability Assessment


Updated php packages that fix various security issues are now
available for Red Hat Enterprise Linux 4.

This update has been rated as having important security impact by the Red
Hat
Security Response Team.

PHP is an HTML-embedded scripting language commonly used with the Apache
HTTP Web server.

Flaws including possible information disclosure, double free, and negative
reference index array underflow were found in the deserialization code of
PHP. PHP applications may use the unserialize function on untrusted user
data, which could permit a remote attacker to gain access to memory or
potentially execute arbitrary code. The Common Vulnerabilities and
Exposures project (cve.mitre.org) has assigned the name CVE-2004-1019 to
this issue.

A flaw in the exif extension of PHP was found which lead to a stack
overflow. A possible hacker could create a carefully crafted image file in such
a way which, if parsed by a PHP script using the exif extension, could
cause a crash or potentially execute arbitrary code. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name
CVE-2004-1065 to this issue.

Flaws were found in shmop_write, pack, and unpack PHP functions. These
functions are not normally passed user supplied data, so would require a
malicious PHP script to be exploited. The Common Vulnerabilities and
Exposures project (cve.mitre.org) has assigned the name CVE-2004-1018 to
this issue.

Users of PHP should upgrade to these updated packages, which contain fixes
for these issues.




Solution : http://rhn.redhat.com/errata/RHSA-2005-032.html
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security

Cables, Connectors

Dell PowerEdge R620 Custom 10 Bay Mid-Level Server Dual CPU RPS Rails Bezel
$650.0
Dell PowerEdge R620 Custom 10 Bay Mid-Level Server Dual CPU RPS Rails Bezel pictureDell PowerEdge R620 Custom 10 Bay Mid-Level Server Dual CPU RPS Rails Bezel
$652.0
Dell PowerEdge R620 Custom 10 Bay Mid-Level Server Dual CPU RPS Rails Bezel pictureDell PowerEdge R620 Custom 10 Bay Mid-Level Server Dual CPU RPS Rails Bezel
$682.0
Dell PowerEdge R620 Custom 10 Bay Mid-Level Server Dual CPU RPS Rails Bezel pictureDell PowerEdge R620 Custom 10 Bay Mid-Level Server Dual CPU RPS Rails Bezel
$712.0
Dell PowerEdge R620 Custom 10 Bay Mid-Level Server Dual CPU RPS Rails Bezel picture


Discussions

No Discussions have been posted on this vulnerability.