Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.50631
Category:Mandrake Local Security Checks
Title:Mandrake Security Advisory MDKSA-2004:151 (php)
Summary:NOSUMMARY
Description:Description:

The remote host is missing an update to php
announced via advisory MDKSA-2004:151.

A number of vulnerabilities in PHP versions prior to 4.3.10 were
discovered by Stefan Esser. Some of these vulnerabilities were not
deemed to be severe enough to warrant CVE names, however the packages
provided, with the exception of the Corporate Server 2.1 packages,
include fixes for all of the vulnerabilities, thanks to the efforts of
the OpenPKG team who extracted and backported the fixes.

The vulnerabilities fixed in all provided packages include a fix for
a possible information disclosure, double free, and negative reference
index array underflow in deserialization code (CVE-2004-1019). As
well, the exif_read_data() function suffers from an overflow on a long
sectionname
this vulnerability was discovered by Ilia Alshanetsky
(CVE-2004-1065).

The other fixes that appear in Mandrakelinux 9.2 and newer packages
include a fix for out of bounds memory write access in shmop_write()
and integer overflow/underflows in the pack() and unpack() functions.
The addslashes() function did not properly escape \0 correctly. A
directory bypass issue existed in safe_mode execution. There is an
issue of arbitrary file access through path truncation. Finally, the
magic_quotes_gpc functionality could lead to one level directory
traversal with file uploads.

Affected versions: 10.0, 10.1, 9.2, Corporate Server 2.1

Solution:
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

https://secure1.securityspace.com/smysecure/catid.html?in=MDKSA-2004:151
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1019
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1065
http://www.php.net/release_4_3_10.php
http://www.hardened-php.net/advisories/012004.txt

Risk factor : Critical

CVSS Score:
10.0

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2004-1019
Bugtraq: 20041215 Advisory 01/2004: Multiple vulnerabilities in PHP 4/5 (Google Search)
http://marc.info/?l=bugtraq&m=110314318531298&w=2
https://bugzilla.fedora.us/show_bug.cgi?id=2344
HPdes Security Advisory: HPSBMA01212
http://www.securityfocus.com/advisories/9028
http://www.mandriva.com/security/advisories?name=MDKSA-2004:151
http://www.hardened-php.net/advisories/012004.txt
http://msgs.securepoint.com/cgi-bin/get/bugtraq0412/157.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10511
http://www.redhat.com/support/errata/RHSA-2004-687.html
http://www.redhat.com/support/errata/RHSA-2005-032.html
http://www.redhat.com/support/errata/RHSA-2005-816.html
SuSE Security Announcement: SUSE-SA:2005:002 (Google Search)
http://www.novell.com/linux/security/advisories/2005_02_php4_mod_php4.html
SuSE Security Announcement: SUSE-SU-2015:0365 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00029.html
SuSE Security Announcement: openSUSE-SU-2015:0325 (Google Search)
http://lists.opensuse.org/opensuse-updates/2015-02/msg00079.html
XForce ISS Database: php-unserialize-code-execution(18514)
https://exchange.xforce.ibmcloud.com/vulnerabilities/18514
Common Vulnerability Exposure (CVE) ID: CVE-2004-1065
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10877
XForce ISS Database: php-exifreaddata-bo(18517)
https://exchange.xforce.ibmcloud.com/vulnerabilities/18517
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.