Vulnerability Assessment & Network Security Forums

If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.

Home >> Browse Vulnerability Assessment Database >> SuSE Local Security Checks >> SUSE-SA:2006:024: php4,php5

Vulnerability Assessment Details

SUSE-SA:2006:024: php4,php5

Vulnerability Assessment Summary
Check for the version of the php4,php5 package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory SUSE-SA:2006:024 (php4,php5).

This update fixes the following security issues in the scripting languages
PHP4 and PHP5:

- copy() and tempnam() functions could bypass open_basedir restrictions (CVE-2006-1494)
- Cross-Site-Scripting (XSS) bug in phpinfo() (CVE-2006-0996)
- mb_send_mail() lacked safe_mode checks (CVE-2006-1014, CVE-2006-1015)
- html_entity_decode() could expose memory content (CVE-2006-1490)

Solution :
Network Security Threat Level: Medium

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2006 Tenable Network Security

Cables, Connectors

INTEL 300GB 710 Series 2.5" SATA SSD SSDSA2BZ300G3 Solid State Drive
INTEL 300GB 710 Series 2.5Sk Hynix 128Gb Ssd Drive 5sd0h43484 Tested HFS128G39MND-3310A DB SATA 6.0 GBPS
Sk Hynix 128Gb Ssd Drive 5sd0h43484 Tested HFS128G39MND-3310A DB SATA 6.0 GBPS pictureUsed INTEL DC S3700 100GB 2.5" SATA SSD SSDSC2BA100G3 Solid State Drive
Used INTEL DC S3700 100GB 2.5Samsung 250GB 850 Evo 2.5" SATA III SSD, Solid state drive
Samsung 250GB 850 Evo 2.5


No Discussions have been posted on this vulnerability.