Executive Summary
Summary | |
---|---|
Title | PHP vulnerabilities |
Informations | |||
---|---|---|---|
Name | USN-1042-1 | First vendor Publication | 2011-01-11 |
Vendor | Ubuntu | Last vendor Modification | 2011-01-11 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 6.8 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
A security issue affects the following Ubuntu releases: Ubuntu 6.06 LTS Ubuntu 8.04 LTS Ubuntu 9.10 Ubuntu 10.04 LTS Ubuntu 10.10 This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 6.06 LTS: Ubuntu 8.04 LTS: Ubuntu 9.10: Ubuntu 10.04 LTS: Ubuntu 10.10: In general, a standard system update will make all the necessary changes. Details follow: It was discovered that an integer overflow in the XML UTF-8 decoding code could allow an attacker to bypass cross-site scripting (XSS) protections. This issue only affected Ubuntu 6.06 LTS, Ubuntu 8.04 LTS, and Ubuntu 9.10. (CVE-2009-5016) It was discovered that the XML UTF-8 decoding code did not properly handle non-shortest form UTF-8 encoding and ill-formed subsequences in UTF-8 data, which could allow an attacker to bypass cross-site scripting (XSS) protections. (CVE-2010-3870) It was discovered that attackers might be able to bypass open_basedir() restrictions by passing a specially crafted filename. (CVE-2010-3436) Maksymilian Arciemowicz discovered that a NULL pointer derefence in the ZIP archive handling code could allow an attacker to cause a denial of service through a specially crafted ZIP archive. This issue only affected Ubuntu 8.04 LTS, Ubuntu 9.10, Ubuntu 10.04 LTS, and Ubuntu 10.10. (CVE-2010-3709) It was discovered that a stack consumption vulnerability in the filter_var() PHP function when in FILTER_VALIDATE_EMAIL mode, could allow a remote attacker to cause a denial of service. This issue only affected Ubuntu 8.04 LTS, Ubuntu 9.10, Ubuntu 10.04 LTS, and Ubuntu 10.10. (CVE-2010-3710) It was discovered that the mb_strcut function in the Libmbfl library within PHP could allow an attacker to read arbitrary memory within the application process. This issue only affected Ubuntu 10.10. (CVE-2010-4156) Maksymilian Arciemowicz discovered that an integer overflow in the NumberFormatter::getSymbol function could allow an attacker to cause a denial of service. This issue only affected Ubuntu 10.04 LTS and Ubuntu 10.10. (CVE-2010-4409) Rick Regan discovered that when handing PHP textual representations of the largest subnormal double-precision floating-point number, the zend_strtod function could go into an infinite loop on 32bit x86 processors, allowing an attacker to cause a denial of service. (CVE-2010-4645) |
Original Source
Url : http://www.ubuntu.com/usn/USN-1042-1 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
38 % | CWE-189 | Numeric Errors (CWE/SANS Top 25) |
38 % | CWE-20 | Improper Input Validation |
12 % | CWE-399 | Resource Management Errors |
12 % | CWE-264 | Permissions, Privileges, and Access Controls |
OVAL Definitions
CPE : Common Platform Enumeration
ExploitDB Exploits
id | Description |
---|---|
2010-12-10 | PHP 5.3.3 NumberFormatter::getSymbol Integer Overflow |
2010-11-05 | PHP 5.3.3/5.2.14 ZipArchive::getArchiveComment NULL Pointer Deference |
OpenVAS Exploits
Date | Description |
---|---|
2012-07-30 | Name : CentOS Update for php53 CESA-2011:0196 centos5 x86_64 File : nvt/gb_CESA-2011_0196_php53_centos5_x86_64.nasl |
2012-06-21 | Name : PHP version smaller than 5.3.4 File : nvt/nopsec_php_5_3_4.nasl |
2012-06-21 | Name : PHP 5.2 < 5.2.15 File : nvt/nopsec_php_5_2_15.nasl |
2012-06-21 | Name : PHP version smaller than 5.2.11 File : nvt/nopsec_php_5_2_11.nasl |
2012-06-05 | Name : RedHat Update for php RHSA-2011:0195-01 File : nvt/gb_RHSA-2011_0195-01_php.nasl |
2012-02-12 | Name : Gentoo Security Advisory GLSA 201110-06 (php) File : nvt/glsa_201110_06.nasl |
2011-10-20 | Name : Mac OS X v10.6.8 Multiple Vulnerabilities (2011-006) File : nvt/gb_macosx_su11-006.nasl |
2011-08-26 | Name : Mac OS X v10.6.6 Multiple Vulnerabilities (2011-001) File : nvt/secpod_macosx_su11-001.nasl |
2011-08-09 | Name : CentOS Update for php CESA-2010:0919 centos5 i386 File : nvt/gb_CESA-2010_0919_php_centos5_i386.nasl |
2011-08-09 | Name : CentOS Update for php53 CESA-2011:0196 centos5 i386 File : nvt/gb_CESA-2011_0196_php53_centos5_i386.nasl |
2011-05-12 | Name : Debian Security Advisory DSA 2195-1 (php5) File : nvt/deb_2195_1.nasl |
2011-03-25 | Name : Mandriva Update for php MDVSA-2011:053 (php) File : nvt/gb_mandriva_MDVSA_2011_053.nasl |
2011-03-25 | Name : Mandriva Update for php MDVSA-2011:052 (php) File : nvt/gb_mandriva_MDVSA_2011_052.nasl |
2011-02-04 | Name : RedHat Update for php53 RHSA-2011:0196-01 File : nvt/gb_RHSA-2011_0196-01_php53.nasl |
2011-01-24 | Name : FreeBSD Ports: php5-filter File : nvt/freebsd_php5-filter.nasl |
2011-01-24 | Name : FreeBSD Ports: php5 File : nvt/freebsd_php510.nasl |
2011-01-24 | Name : FreeBSD Ports: php5-zip File : nvt/freebsd_php5-zip.nasl |
2011-01-24 | Name : FreeBSD Ports: php5 File : nvt/freebsd_php57.nasl |
2011-01-24 | Name : Fedora Update for php FEDORA-2011-0329 File : nvt/gb_fedora_2011_0329_php_fc14.nasl |
2011-01-24 | Name : Fedora Update for php-eaccelerator FEDORA-2011-0329 File : nvt/gb_fedora_2011_0329_php-eaccelerator_fc14.nasl |
2011-01-24 | Name : Fedora Update for maniadrive FEDORA-2011-0329 File : nvt/gb_fedora_2011_0329_maniadrive_fc14.nasl |
2011-01-24 | Name : Fedora Update for maniadrive-data FEDORA-2011-0329 File : nvt/gb_fedora_2011_0329_maniadrive-data_fc14.nasl |
2011-01-24 | Name : Fedora Update for php FEDORA-2011-0321 File : nvt/gb_fedora_2011_0321_php_fc13.nasl |
2011-01-24 | Name : Fedora Update for php-eaccelerator FEDORA-2011-0321 File : nvt/gb_fedora_2011_0321_php-eaccelerator_fc13.nasl |
2011-01-24 | Name : Fedora Update for maniadrive FEDORA-2011-0321 File : nvt/gb_fedora_2011_0321_maniadrive_fc13.nasl |
2011-01-24 | Name : Fedora Update for maniadrive-data FEDORA-2011-0321 File : nvt/gb_fedora_2011_0321_maniadrive-data_fc13.nasl |
2011-01-24 | Name : FreeBSD Ports: php5 File : nvt/freebsd_php58.nasl |
2011-01-14 | Name : Ubuntu Update for php5 regression USN-1042-2 File : nvt/gb_ubuntu_USN_1042_2.nasl |
2011-01-14 | Name : Ubuntu Update for php5 vulnerabilities USN-1042-1 File : nvt/gb_ubuntu_USN_1042_1.nasl |
2011-01-11 | Name : Fedora Update for php FEDORA-2010-19011 File : nvt/gb_fedora_2010_19011_php_fc13.nasl |
2011-01-11 | Name : Fedora Update for php-eaccelerator FEDORA-2010-19011 File : nvt/gb_fedora_2010_19011_php-eaccelerator_fc13.nasl |
2011-01-11 | Name : Fedora Update for maniadrive FEDORA-2010-19011 File : nvt/gb_fedora_2010_19011_maniadrive_fc13.nasl |
2011-01-11 | Name : Fedora Update for php FEDORA-2010-18976 File : nvt/gb_fedora_2010_18976_php_fc14.nasl |
2011-01-11 | Name : Fedora Update for php-eaccelerator FEDORA-2010-18976 File : nvt/gb_fedora_2010_18976_php-eaccelerator_fc14.nasl |
2011-01-11 | Name : Fedora Update for maniadrive FEDORA-2010-18976 File : nvt/gb_fedora_2010_18976_maniadrive_fc14.nasl |
2011-01-10 | Name : PHP 'zend_strtod()' Function Floating-Point Value Denial of Service Vulnerabi... File : nvt/gb_php_45668.nasl |
2010-12-28 | Name : Mandriva Update for php MDVSA-2010:254 (php) File : nvt/gb_mandriva_MDVSA_2010_254.nasl |
2010-12-28 | Name : Mandriva Update for php-intl MDVSA-2010:255 (php-intl) File : nvt/gb_mandriva_MDVSA_2010_255.nasl |
2010-12-09 | Name : RedHat Update for php RHSA-2010:0919-01 File : nvt/gb_RHSA-2010_0919-01_php.nasl |
2010-12-09 | Name : CentOS Update for php CESA-2010:0919 centos4 i386 File : nvt/gb_CESA-2010_0919_php_centos4_i386.nasl |
2010-11-23 | Name : PHP 'filter_var()' function Stack Consumption Vulnerability File : nvt/gb_php_stack_consumption_vuln.nasl |
2010-11-16 | Name : Mandriva Update for libmbfl MDVSA-2010:225-1 (libmbfl) File : nvt/gb_mandriva_MDVSA_2010_225_1.nasl |
2010-11-16 | Name : Mandriva Update for libmbfl MDVSA-2010:225 (libmbfl) File : nvt/gb_mandriva_MDVSA_2010_225.nasl |
2010-11-16 | Name : Mandriva Update for php MDVSA-2010:224 (php) File : nvt/gb_mandriva_MDVSA_2010_224.nasl |
2010-11-16 | Name : Mandriva Update for php MDVSA-2010:218 (php) File : nvt/gb_mandriva_MDVSA_2010_218.nasl |
2010-11-10 | Name : PHP 'xml_utf8_decode()' UTF-8 Input Validation Vulnerability File : nvt/gb_php_44605.nasl |
2010-11-09 | Name : PHP 'mb_strcut()' Function Information Disclosure Vulnerability File : nvt/gb_php_44727.nasl |
2010-10-01 | Name : PHP 'phar_stream_flush' Format String Vulnerability File : nvt/secpod_php_format_string_vuln.nasl |
0000-00-00 | Name : Slackware Advisory SSA:2011-010-01 php File : nvt/esoft_slk_ssa_2011_010_01.nasl |
0000-00-00 | Name : Slackware Advisory SSA:2010-357-01 php File : nvt/esoft_slk_ssa_2010_357_01.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
70370 | PHP strtod.c zend_strtod Function x87 FPU Register DoS PHP contains a flaw in strtod.c, as used in the function 'zend_strtod' that may allow a context-dependent denial of service. This may allow an attacker to cause an infinite loop denial of service via a certain floating-point value in scientific notation, which x87 FPU registers fail to handle properly. |
69651 | PHP NumberFormatter::getSymbol Function Invalid Argument Overflow DoS PHP is prone to an overflow condition. The 'NumberFormatter::getSymbol' function fails to properly sanitize user-supplied input resulting in an integer overflow. With an invalid argument, a context-dependent attacker can potentially cause a denial of service. |
69230 | PHP utf8_decode Function UTF-8 Encoding / Data Crafted String Protection Mech... |
69227 | PHP ext/xml/xml.c xml_utf8_decode Function UTF-8 Encoding Remote Overflow |
69110 | PHP fopen_wrappers.c Filename Length open_basedir Restriction Remote Bypass PHP contains a flaw related to the 'php_check_specific_open_basedir()' function in 'fopen_wrappers.c'. The issue is triggered when a remote attacker uses vectors related to filename length to bypass 'open_basedir' restrictions. |
69109 | PHP ZipArchive::getArchiveComment Function Crafted ZIP Archive NULL Dereferen... PHP contains a flaw related to the ZipArchive::getArchiveComment function that may allow a context-dependent denial of service. The issue is triggered via a maliciously crafted ZIP archive, and will result in loss of availability. |
69099 | PHP ext/mbstring/libmbfl/mbfl/mbfilter.c mb_strcut() Function length Paramete... PHP contains a flaw that may lead to an unauthorized information disclosure. Â The issue is triggered due to an error in 'mbfl_strcut()' in 'ext/mbstring/libmbfl/mbfl/mbfilter.c', which may be exploited by passing a large 'length' parameter to the 'mb_strcut' function, which will disclose potentially sensitive information to a remote attacker. |
68597 | PHP ext/filter/logical_filters.c php_filter_validate_email() Function Overflo... PHP is prone to an overflow condition. The 'php_filter_validate_email()' function in 'ext/filter/logical_filters.c' fails to properly sanitize user-supplied input resulting in a stack overflow. With a specially crafted overly long e-mail address string, a remote attacker can potentially cause a denial of service. |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2014-10-10 | Name : The remote device is missing a vendor-supplied security patch. File : f5_bigip_SOL13519.nasl - Type : ACT_GATHER_INFO |
2014-10-10 | Name : The remote device is missing a vendor-supplied security patch. File : f5_bigip_SOL12650.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2012-57.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : suse_11_3_apache2-mod_php5-101110.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : suse_11_3_apache2-mod_php5-110309.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : suse_11_3_icu-120117.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : suse_11_4_icu-120117.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2011-0195.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2010-0919.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2011-0196.nasl - Type : ACT_GATHER_INFO |
2013-01-25 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_icu-121219.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20110203_php_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20110203_php53_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20101129_php_on_SL4_x.nasl - Type : ACT_GATHER_INFO |
2012-04-20 | Name : The remote web server is affected by multiple vulnerabilities. File : hpsmh_7_0_0_24.nasl - Type : ACT_GATHER_INFO |
2012-01-20 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_icu-7928.nasl - Type : ACT_GATHER_INFO |
2012-01-20 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_icu-120116.nasl - Type : ACT_GATHER_INFO |
2011-12-13 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_apache2-mod_php5-7393.nasl - Type : ACT_GATHER_INFO |
2011-10-13 | Name : The remote host is missing a Mac OS X update that fixes several security issues. File : macosx_SecUpd2011-006.nasl - Type : ACT_GATHER_INFO |
2011-10-12 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201110-06.nasl - Type : ACT_GATHER_INFO |
2011-05-05 | Name : The remote openSUSE host is missing a security update. File : suse_11_2_apache2-mod_php5-110309.nasl - Type : ACT_GATHER_INFO |
2011-05-05 | Name : The remote openSUSE host is missing a security update. File : suse_11_1_apache2-mod_php5-101105.nasl - Type : ACT_GATHER_INFO |
2011-05-05 | Name : The remote openSUSE host is missing a security update. File : suse_11_2_apache2-mod_php5-101110.nasl - Type : ACT_GATHER_INFO |
2011-04-22 | Name : The remote web server is affected by multiple vulnerabilities. File : hpsmh_6_3_0_22.nasl - Type : ACT_GATHER_INFO |
2011-04-15 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2011-0196.nasl - Type : ACT_GATHER_INFO |
2011-04-04 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_apache2-mod_php5-110310.nasl - Type : ACT_GATHER_INFO |
2011-03-24 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2011-052.nasl - Type : ACT_GATHER_INFO |
2011-03-24 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2011-053.nasl - Type : ACT_GATHER_INFO |
2011-03-22 | Name : The remote host is missing a Mac OS X update that fixes several security issues. File : macosx_SecUpd2011-001.nasl - Type : ACT_GATHER_INFO |
2011-03-22 | Name : The remote host is missing a Mac OS X update that fixes several security issues. File : macosx_10_6_7.nasl - Type : ACT_GATHER_INFO |
2011-03-21 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2195.nasl - Type : ACT_GATHER_INFO |
2011-02-04 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2011-0195.nasl - Type : ACT_GATHER_INFO |
2011-02-04 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2011-0196.nasl - Type : ACT_GATHER_INFO |
2011-01-24 | Name : The remote Fedora host is missing one or more security updates. File : fedora_2011-0329.nasl - Type : ACT_GATHER_INFO |
2011-01-24 | Name : The remote Fedora host is missing one or more security updates. File : fedora_2011-0321.nasl - Type : ACT_GATHER_INFO |
2011-01-14 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1042-2.nasl - Type : ACT_GATHER_INFO |
2011-01-13 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_c623f05810e711e0becc0022156e8794.nasl - Type : ACT_GATHER_INFO |
2011-01-13 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_736342940fa711e0becc0022156e8794.nasl - Type : ACT_GATHER_INFO |
2011-01-13 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_2a41233d10e711e0becc0022156e8794.nasl - Type : ACT_GATHER_INFO |
2011-01-12 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1042-1.nasl - Type : ACT_GATHER_INFO |
2011-01-11 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2011-010-01.nasl - Type : ACT_GATHER_INFO |
2011-01-10 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_2b6ed5c71a7f11e0b61d000c29d1636d.nasl - Type : ACT_GATHER_INFO |
2011-01-07 | Name : The remote web server uses a version of PHP that is affected by a denial of s... File : php_5_3_5.nasl - Type : ACT_GATHER_INFO |
2011-01-05 | Name : The remote Fedora host is missing one or more security updates. File : fedora_2010-19011.nasl - Type : ACT_GATHER_INFO |
2011-01-05 | Name : The remote Fedora host is missing one or more security updates. File : fedora_2010-18976.nasl - Type : ACT_GATHER_INFO |
2010-12-26 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2010-357-01.nasl - Type : ACT_GATHER_INFO |
2010-12-16 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2010-254.nasl - Type : ACT_GATHER_INFO |
2010-12-13 | Name : The remote web server uses a version of PHP that is affected by multiple flaws. File : php_5_3_4.nasl - Type : ACT_GATHER_INFO |
2010-12-13 | Name : The remote web server uses a version of PHP that is affected by multiple flaws. File : php_5_2_15.nasl - Type : ACT_GATHER_INFO |
2010-12-03 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_apache2-mod_php5-101105.nasl - Type : ACT_GATHER_INFO |
2010-12-03 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_apache2-mod_php5-7221.nasl - Type : ACT_GATHER_INFO |
2010-12-02 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2010-0919.nasl - Type : ACT_GATHER_INFO |
2010-11-30 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2010-0919.nasl - Type : ACT_GATHER_INFO |
2010-11-10 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2010-225.nasl - Type : ACT_GATHER_INFO |
2010-11-10 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2010-224.nasl - Type : ACT_GATHER_INFO |
2010-11-01 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2010-218.nasl - Type : ACT_GATHER_INFO |
2009-09-18 | Name : The remote web server uses a version of PHP that is affected by multiple flaws. File : php_5_2_11.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:58:10 |
|