Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
146377 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.800110
Categoría:Web application abuses
Título:PHP < 5.2.6 Multiple Vulnerabilities (Aug 2008)
Resumen:PHP is prone to multiple vulnerabilities.
Descripción:Summary:
PHP is prone to multiple vulnerabilities.

Vulnerability Insight:
The following flaws exist:

- CVE-2007-4850: Error in curl/interface.c in the cURL library(libcurl), which could be exploited
by attackers to bypass safe_mode security restrictions.

- CVE-2008-0599: Error during path translation in cgi_main.c.

- CVE-2008-0674: Buffer overflow error in PCRE when handling a character class containing a very
large number of characters with codepoints greater than 255(UTF-8 mode).

- CVE-2008-2050: Stack-based buffer overflow in FastCGI SAPI (fastcgi.c).

- CVE-2008-2051: Unspecified error within the processing of incomplete multibyte characters in
escapeshellcmd() API function

Vulnerability Impact:
Successful exploitation could result in remote arbitrary code
execution, security restrictions bypass, access to restricted files, denial of service.

Affected Software/OS:
PHP version prior to 5.2.6.

Solution:
Update to version 5.2.6 or later.

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2007-4850
http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html
http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html
BugTraq ID: 27413
http://www.securityfocus.com/bid/27413
BugTraq ID: 29009
http://www.securityfocus.com/bid/29009
BugTraq ID: 31681
http://www.securityfocus.com/bid/31681
Bugtraq: 20080122 PHP 5.2.5 cURL safe_mode bypass (Google Search)
http://www.securityfocus.com/archive/1/486856/100/0/threaded
Bugtraq: 20080527 rPSA-2008-0178-1 php php-mysql php-pgsql (Google Search)
http://www.securityfocus.com/archive/1/492671/100/0/threaded
http://lists.grok.org.uk/pipermail/full-disclosure/2008-January/059849.html
http://www.mandriva.com/security/advisories?name=MDVSA-2009:022
http://www.mandriva.com/security/advisories?name=MDVSA-2009:023
http://www.openwall.com/lists/oss-security/2008/05/02/2
http://secunia.com/advisories/30048
http://secunia.com/advisories/30411
http://secunia.com/advisories/31200
http://secunia.com/advisories/31326
http://secunia.com/advisories/32222
http://securityreason.com/securityalert/3562
http://securityreason.com/achievement_securityalert/51
http://www.ubuntu.com/usn/usn-628-1
http://www.vupen.com/english/advisories/2008/1412
http://www.vupen.com/english/advisories/2008/2268
http://www.vupen.com/english/advisories/2008/2780
XForce ISS Database: php-curlinit-security-bypass(39852)
https://exchange.xforce.ibmcloud.com/vulnerabilities/39852
XForce ISS Database: php-safemode-directive-security-bypass(42134)
https://exchange.xforce.ibmcloud.com/vulnerabilities/42134
Common Vulnerability Exposure (CVE) ID: CVE-2008-0599
Bugtraq: 20080523 rPSA-2008-0176-1 php php-cgi php-imap php-mcrypt php-mysql php-mysqli php-pgsql php-soap php-xsl php5 php5-cgi php5-imap php5-mcrypt php5-mysql php5-mysqli php5-pear php5-pgsql php5-soap php5-xsl (Google Search)
http://www.securityfocus.com/archive/1/492535/100/0/threaded
CERT/CC vulnerability note: VU#147027
http://www.kb.cert.org/vuls/id/147027
https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00779.html
https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00773.html
http://security.gentoo.org/glsa/glsa-200811-05.xml
HPdes Security Advisory: HPSBUX02342
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01476437
HPdes Security Advisory: HPSBUX02431
http://marc.info/?l=bugtraq&m=124654546101607&w=2
HPdes Security Advisory: HPSBUX02465
http://marc.info/?l=bugtraq&m=125631037611762&w=2
HPdes Security Advisory: SSRT080063
HPdes Security Advisory: SSRT090085
HPdes Security Advisory: SSRT090192
http://www.mandriva.com/security/advisories?name=MDVSA-2008:127
http://www.mandriva.com/security/advisories?name=MDVSA-2008:128
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5510
http://www.redhat.com/support/errata/RHSA-2008-0505.html
http://www.securitytracker.com/id?1019958
http://secunia.com/advisories/30083
http://secunia.com/advisories/30345
http://secunia.com/advisories/30616
http://secunia.com/advisories/30757
http://secunia.com/advisories/30828
http://secunia.com/advisories/32746
http://secunia.com/advisories/35650
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.488951
http://www.vupen.com/english/advisories/2008/1810/references
XForce ISS Database: php-vector-unspecified(42137)
https://exchange.xforce.ibmcloud.com/vulnerabilities/42137
Common Vulnerability Exposure (CVE) ID: CVE-2008-0674
http://lists.apple.com/archives/security-announce/2009/Aug/msg00001.html
BugTraq ID: 27786
http://www.securityfocus.com/bid/27786
Bugtraq: 20080228 rPSA-2008-0086-1 pcre (Google Search)
http://www.securityfocus.com/archive/1/488927/100/0/threaded
Cert/CC Advisory: TA09-218A
http://www.us-cert.gov/cas/techalerts/TA09-218A.html
Debian Security Information: DSA-1499 (Google Search)
http://www.debian.org/security/2008/dsa-1499
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00371.html
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00632.html
https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00181.html
http://security.gentoo.org/glsa/glsa-200803-24.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2008:053
http://www.securitytracker.com/id?1022674
http://secunia.com/advisories/28923
http://secunia.com/advisories/28957
http://secunia.com/advisories/28960
http://secunia.com/advisories/28985
http://secunia.com/advisories/28996
http://secunia.com/advisories/29027
http://secunia.com/advisories/29048
http://secunia.com/advisories/29175
http://secunia.com/advisories/29267
http://secunia.com/advisories/29282
http://secunia.com/advisories/36096
SuSE Security Announcement: SUSE-SR:2008:004 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00008.html
https://usn.ubuntu.com/581-1/
http://www.vupen.com/english/advisories/2008/0570
http://www.vupen.com/english/advisories/2008/0592
http://www.vupen.com/english/advisories/2009/2172
XForce ISS Database: pcre-characterclass-bo(40505)
https://exchange.xforce.ibmcloud.com/vulnerabilities/40505
Common Vulnerability Exposure (CVE) ID: CVE-2008-2050
20080523 rPSA-2008-0176-1 php php-cgi php-imap php-mcrypt php-mysql php-mysqli php-pgsql php-soap php-xsl php5 php5-cgi php5-imap php5-mcrypt php5-mysql php5-mysqli php5-pear php5-pgsql php5-soap php5-xsl
29009
30048
30083
30158
http://secunia.com/advisories/30158
30345
30967
http://secunia.com/advisories/30967
31200
31326
32746
ADV-2008-1412
ADV-2008-2268
APPLE-SA-2008-07-31
DSA-1572
http://www.debian.org/security/2008/dsa-1572
GLSA-200811-05
MDVSA-2009:022
MDVSA-2009:023
SSA:2008-128-01
SUSE-SR:2008:014
http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html
USN-628-1
[oss-security] 20080502 CVE Request (PHP)
http://cvs.php.net/viewvc.cgi/php-src/sapi/cgi/fastcgi.c?r1=1.44&r2=1.45&diff_format=u
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0176
http://www.php.net/ChangeLog-5.php
https://issues.rpath.com/browse/RPL-2503
php-fastcgisapi-bo(42133)
https://exchange.xforce.ibmcloud.com/vulnerabilities/42133
Common Vulnerability Exposure (CVE) ID: CVE-2008-2051
Debian Security Information: DSA-1572 (Google Search)
Debian Security Information: DSA-1578 (Google Search)
http://www.debian.org/security/2008/dsa-1578
http://www.mandriva.com/security/advisories?name=MDVSA-2008:125
http://www.mandriva.com/security/advisories?name=MDVSA-2008:126
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10256
http://www.redhat.com/support/errata/RHSA-2008-0544.html
http://www.redhat.com/support/errata/RHSA-2008-0545.html
http://www.redhat.com/support/errata/RHSA-2008-0546.html
http://www.redhat.com/support/errata/RHSA-2008-0582.html
http://secunia.com/advisories/30288
http://secunia.com/advisories/31119
http://secunia.com/advisories/31124
SuSE Security Announcement: SUSE-SR:2008:014 (Google Search)
CopyrightCopyright (C) 2008 Greenbone AG

Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.