Executive Summary

Summary
Title PHP4 vulnerabilities
Informations
Name USN-112-1 First vendor Publication 2005-04-14
Vendor Ubuntu Last vendor Modification 2005-04-14
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score 7.5 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

A security issue affects the following Ubuntu releases:

Ubuntu 4.10 (Warty Warthog)

The following packages are affected:

libapache2-mod-php4 php4-cgi

The problem can be corrected by upgrading the affected package to version 4:4.3.8-3ubuntu7.8. After performing a standard system upgrade you need to reload the PHP module in the webserver by executing

sudo /etc/init.d/apache2 reload

to effect the necessary changes.

Details follow:

An integer overflow was discovered in the exif_process_IFD_TAG() function in PHP4's EXIF module. EXIF tags with a specially crafted "Image File Directory" (IFD) tag caused a buffer overflow which could have been exploited to execute arbitrary code with the privileges of the PHP4 server. (CAN-2005-1042)

The same module also contained a Denial of Service vulnerability. EXIF headers with a large IFD nesting level caused an unbound recursion which would eventually overflow the stack and cause the executed program to crash. (CAN-2005-1043)

In web applications that automatically process EXIF tags of uploaded images, both vulnerabilities could be exploited remotely.

Original Source

Url : http://www.ubuntu.com/usn/USN-112-1

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:10307
 
Oval ID: oval:org.mitre.oval:def:10307
Title: exif.c in PHP before 4.3.11 allows remote attackers to cause a denial of service (memory consumption and crash) via an EXIF header with a large IFD nesting level, which causes significant stack recursion.
Description: exif.c in PHP before 4.3.11 allows remote attackers to cause a denial of service (memory consumption and crash) via an EXIF header with a large IFD nesting level, which causes significant stack recursion.
Family: unix Class: vulnerability
Reference(s): CVE-2005-1043
Version: 5
Platform(s): Red Hat Enterprise Linux 3
CentOS Linux 3
Red Hat Enterprise Linux 4
CentOS Linux 4
Oracle Linux 4
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:10822
 
Oval ID: oval:org.mitre.oval:def:10822
Title: Integer overflow in the exif_process_IFD_TAG function in exif.c in PHP before 4.3.11 may allow remote attackers to execute arbitrary code via an IFD tag that leads to a negative byte count.
Description: Integer overflow in the exif_process_IFD_TAG function in exif.c in PHP before 4.3.11 may allow remote attackers to execute arbitrary code via an IFD tag that leads to a negative byte count.
Family: unix Class: vulnerability
Reference(s): CVE-2005-1042
Version: 5
Platform(s): Red Hat Enterprise Linux 3
CentOS Linux 3
Red Hat Enterprise Linux 4
CentOS Linux 4
Oracle Linux 4
Product(s):
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 11
Application 1
Os 3
Os 3
Os 2
Os 1
Os 50

OpenVAS Exploits

Date Description
2009-11-17 Name : Mac OS X Version
File : nvt/macosx_version.nasl
2009-10-10 Name : SLES9: Security update for PHP4
File : nvt/sles9p5015816.nasl
2009-10-10 Name : SLES9: Security update for PHP4
File : nvt/sles9p5021505.nasl
2009-10-10 Name : SLES9: Security update for PHP4
File : nvt/sles9p5021688.nasl
2008-09-24 Name : Gentoo Security Advisory GLSA 200504-15 (PHP)
File : nvt/glsa_200504_15.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
15630 PHP EXIF Header Large IFD Nesting Level DoS

PHP contains a flaw that may allow a remote attacker to cause a denial of service. The issue is due to functions in exif.c not properly sanitizing user-supplied input. By passing a crafted EXIF header with a large IFD nesting level, an attacker can cause stack recursion leading to memory consumption and eventually the application crashing.
15629 PHP exif.c exif_process_IFD_TAG Function IDF Tag Handling Overflow

PHP contains a flaw that may allow a remote attacker to gain elevated privileges. The issue is due to the exif_process_IFD_TAG function in exif.c not properly sanitizing user-supplied input. By supplying a crafted IFD tag, an attacker can trigger an overflow and execute arbitrary code.

Nessus® Vulnerability Scanner

Date Description
2007-01-08 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2005-406.nasl - Type : ACT_GATHER_INFO
2006-07-03 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2005-405.nasl - Type : ACT_GATHER_INFO
2006-01-15 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-112-1.nasl - Type : ACT_GATHER_INFO
2005-09-12 Name : The remote Fedora Core host is missing a security update.
File : fedora_2005-315.nasl - Type : ACT_GATHER_INFO
2005-06-08 Name : The remote host is missing a Mac OS X update that fixes a security issue.
File : macosx_SecUpd2005-006.nasl - Type : ACT_GATHER_INFO
2005-05-04 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2005-406.nasl - Type : ACT_GATHER_INFO
2005-04-29 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2005-405.nasl - Type : ACT_GATHER_INFO
2005-04-19 Name : The remote Mandrake Linux host is missing one or more security updates.
File : mandrake_MDKSA-2005-072.nasl - Type : ACT_GATHER_INFO
2005-04-18 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-200504-15.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2014-02-17 11:58:32
  • Multiple Updates