Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.56723
Category:Gentoo Local Security Checks
Title:Gentoo Security Advisory GLSA 200605-08 (php)
Summary:The remote host is missing updates announced in;advisory GLSA 200605-08.
Description:Summary:
The remote host is missing updates announced in
advisory GLSA 200605-08.

Vulnerability Insight:
PHP is affected by multiple issues, including a buffer overflow in
wordwrap() which may lead to execution of arbitrary code.

Solution:
All PHP users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose '>=dev-lang/php-5.1.4'

PHP4 users that wish to keep that version line should upgrade to the
latest 4.x version:

# emerge --sync
# emerge --ask --oneshot --verbose =dev-lang/php-4.4.2-r2

CVSS Score:
6.4

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2006-0996
BugTraq ID: 17362
http://www.securityfocus.com/bid/17362
http://security.gentoo.org/glsa/glsa-200605-08.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2006:074
http://marc.info/?l=php-cvs&m=114374620416389&w=2
http://www.osvdb.org/24484
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10997
RedHat Security Advisories: RHSA-2006:0276
http://rhn.redhat.com/errata/RHSA-2006-0276.html
http://www.redhat.com/support/errata/RHSA-2006-0501.html
RedHat Security Advisories: RHSA-2006:0549
http://rhn.redhat.com/errata/RHSA-2006-0549.html
http://securitytracker.com/id?1015879
http://secunia.com/advisories/19599
http://secunia.com/advisories/19775
http://secunia.com/advisories/19832
http://secunia.com/advisories/19979
http://secunia.com/advisories/20052
http://secunia.com/advisories/20210
http://secunia.com/advisories/20222
http://secunia.com/advisories/20951
http://secunia.com/advisories/21125
http://secunia.com/advisories/21252
http://secunia.com/advisories/21564
SGI Security Advisory: 20060501-01-U
ftp://patches.sgi.com/support/free/security/advisories/20060501-01-U.asc
http://securityreason.com/securityalert/675
http://securityreason.com/achievement_securityalert/34
SuSE Security Announcement: SUSE-SA:2006:024 (Google Search)
http://www.novell.com/linux/security/advisories/05-05-2006.html
http://www.ubuntu.com/usn/usn-320-1
http://www.vupen.com/english/advisories/2006/1290
http://www.vupen.com/english/advisories/2006/2685
XForce ISS Database: php-phpinfo-long-array-xss(25702)
https://exchange.xforce.ibmcloud.com/vulnerabilities/25702
Common Vulnerability Exposure (CVE) ID: CVE-2006-1490
17296
http://www.securityfocus.com/bid/17296
19383
http://secunia.com/advisories/19383
19499
http://secunia.com/advisories/19499
19570
http://secunia.com/advisories/19570
19832
19979
20052
2006-0020
http://www.trustix.org/errata/2006/0020
20060328 Critical PHP bug - act ASAP if you are running web with sensitive data
http://www.securityfocus.com/archive/1/429164/100/0/threaded
20060328 Re: [Full-disclosure] Critical PHP bug - act ASAP if you are running web with sensitive data
http://www.securityfocus.com/archive/1/429162/100/0/threaded
20060501-01-U
20210
20951
21125
23155
http://secunia.com/advisories/23155
ADV-2006-1149
http://www.vupen.com/english/advisories/2006/1149
ADV-2006-2685
ADV-2006-4750
http://www.vupen.com/english/advisories/2006/4750
APPLE-SA-2006-11-28
http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html
GLSA-200605-08
MDKSA-2006:063
http://www.mandriva.com/security/advisories?name=MDKSA-2006:063
RHSA-2006:0276
SUSE-SA:2006:024
TA06-333A
http://www.us-cert.gov/cas/techalerts/TA06-333A.html
USN-320-1
http://bugs.gentoo.org/show_bug.cgi?id=127939
http://cvs.php.net/viewcvs.cgi/php-src/ext/standard/html.c?r1=1.112&r2=1.113
http://cvs.php.net/viewcvs.cgi/php-src/ext/standard/html.c?view=log
http://docs.info.apple.com/article.html?artnum=304829
http://support.avaya.com/elmodocs2/security/ASA-2006-129.htm
oval:org.mitre.oval:def:11084
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11084
php-htmlentitydecode-information-disclosure(25508)
https://exchange.xforce.ibmcloud.com/vulnerabilities/25508
Common Vulnerability Exposure (CVE) ID: CVE-2006-1990
1015979
http://securitytracker.com/id?1015979
19803
http://secunia.com/advisories/19803
20060701-01-U
ftp://patches.sgi.com/support/free/security/advisories/20060701-01-U
20061005 rPSA-2006-0182-1 php php-mysql php-pgsql
http://www.securityfocus.com/archive/1/447866/100/0/threaded
20222
20269
http://secunia.com/advisories/20269
20676
http://secunia.com/advisories/20676
21031
http://secunia.com/advisories/21031
21050
http://secunia.com/advisories/21050
21135
http://secunia.com/advisories/21135
21252
21564
21723
http://secunia.com/advisories/21723
22225
http://secunia.com/advisories/22225
ADV-2006-1500
http://www.vupen.com/english/advisories/2006/1500
MDKSA-2006:091
http://www.mandriva.com/security/advisories?name=MDKSA-2006:091
MDKSA-2006:122
http://www.mandriva.com/security/advisories?name=MDKSA-2006:122
RHSA-2006:0501
RHSA-2006:0549
RHSA-2006:0568
http://www.redhat.com/support/errata/RHSA-2006-0568.html
SUSE-SA:2006:031
http://www.novell.com/linux/security/advisories/2006_31_php.html
TLSA-2006-38
http://www.turbolinux.com/security/2006/TLSA-2006-38.txt
http://support.avaya.com/elmodocs2/security/ASA-2006-160.htm
http://support.avaya.com/elmodocs2/security/ASA-2006-175.htm
http://www.infigo.hr/en/in_focus/advisories/INFIGO-2006-04-02
https://issues.rpath.com/browse/RPL-683
oval:org.mitre.oval:def:9696
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9696
php-wordwrap-string-bo(26001)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26001
Common Vulnerability Exposure (CVE) ID: CVE-2006-1991
SuSE Security Announcement: SUSE-SA:2006:031 (Google Search)
XForce ISS Database: php-substrcompare-length-dos(26003)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26003
CopyrightCopyright (C) 2008 E-Soft Inc.

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.