Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.57101
Category:Mandrake Local Security Checks
Title:Mandrake Security Advisory MDKSA-2006:122 (php)
Summary:NOSUMMARY
Description:Description:

The remote host is missing an update to php
announced via advisory MDKSA-2006:122. For details on the issues,
please visit the referenced advisories.

Updated packages have been patched to address all these issues. Once
these packages have been installed, you will need to restart Apache
(service httpd restart) in order for the changes to take effect.

Affected: 10.2, 2006.0, Corporate 3.0, Multi Network Firewall 2.0

Solution:
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

https://secure1.securityspace.com/smysecure/catid.html?in=MDKSA-2006:122

Risk factor : Critical

CVSS Score:
10.0

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2004-0941
BugTraq ID: 11663
http://www.securityfocus.com/bid/11663
Computer Incident Advisory Center Bulletin: P-071
http://www.ciac.org/ciac/bulletins/p-071.shtml
Debian Security Information: DSA-601 (Google Search)
http://www.debian.org/security/2004/dsa-601
http://www.mandriva.com/security/advisories?name=MDKSA-2006:113
http://www.mandriva.com/security/advisories?name=MDKSA-2006:114
http://www.mandriva.com/security/advisories?name=MDKSA-2006:122
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11176
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1195
http://www.redhat.com/support/errata/RHSA-2004-638.html
http://www.redhat.com/support/errata/RHSA-2006-0194.html
http://secunia.com/advisories/13179/
http://secunia.com/advisories/18686
http://secunia.com/advisories/20824
http://secunia.com/advisories/21050
http://www.trustix.org/errata/2004/0058
https://www.ubuntu.com/usn/usn-25-1/
https://www.ubuntu.com/usn/usn-33-1/
XForce ISS Database: gd-graphics-gdmalloc-bo(18048)
https://exchange.xforce.ibmcloud.com/vulnerabilities/18048
Common Vulnerability Exposure (CVE) ID: CVE-2004-0990
BugTraq ID: 11523
http://www.securityfocus.com/bid/11523
Bugtraq: 20041026 libgd integer overflow (Google Search)
http://marc.info/?l=bugtraq&m=109882489302099&w=2
Debian Security Information: DSA-589 (Google Search)
http://www.debian.org/security/2004/dsa-589
Debian Security Information: DSA-591 (Google Search)
http://www.debian.org/security/2004/dsa-591
Debian Security Information: DSA-602 (Google Search)
http://www.debian.org/security/2004/dsa-602
http://www.mandriva.com/security/advisories?name=MDKSA-2004:132
http://www.osvdb.org/11190
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1260
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9952
http://secunia.com/advisories/18717
http://secunia.com/advisories/20866
http://secunia.com/advisories/23783
SuSE Security Announcement: SUSE-SR:2006:003 (Google Search)
http://lists.suse.com/archive/suse-security-announce/2006-Feb/0001.html
https://www.ubuntu.com/usn/usn-11-1/
XForce ISS Database: gd-png-bo(17866)
https://exchange.xforce.ibmcloud.com/vulnerabilities/17866
Common Vulnerability Exposure (CVE) ID: CVE-2006-1017
Bugtraq: 20060228 (PHP) imap functions bypass safemode and open_basedir restrictions (Google Search)
http://www.securityfocus.com/archive/1/426339/100/0/threaded
http://www.osvdb.org/23535
http://secunia.com/advisories/18694
http://secunia.com/advisories/21546
http://securityreason.com/securityalert/516
http://www.vupen.com/english/advisories/2006/0772
XForce ISS Database: php-imap-restriction-bypass(24964)
https://exchange.xforce.ibmcloud.com/vulnerabilities/24964
Common Vulnerability Exposure (CVE) ID: CVE-2002-1396
BugTraq ID: 6488
http://www.securityfocus.com/bid/6488
Bugtraq: 20021227 Buffer overflow in PHP "wordwrap" function (Google Search)
http://marc.info/?l=bugtraq&m=104102689503192&w=2
En Garde Linux Advisory: ESA-20030219-003
http://archives.neohapsis.com/archives/linux/engarde/2003-q1/0003.html
http://www.securityfocus.com/advisories/4862
http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:019
http://www.redhat.com/support/errata/RHSA-2003-017.html
SCO Security Bulletin: CSSA-2003-SCO.28
SuSE Security Announcement: SuSE-SA:2003:0009 (Google Search)
http://www.novell.com/linux/security/advisories/2003_009_mod_php4.html
XForce ISS Database: php-wordwrap-bo(10944)
https://exchange.xforce.ibmcloud.com/vulnerabilities/10944
Common Vulnerability Exposure (CVE) ID: CVE-2006-1990
1015979
http://securitytracker.com/id?1015979
19803
http://secunia.com/advisories/19803
20052
http://secunia.com/advisories/20052
20060701-01-U
ftp://patches.sgi.com/support/free/security/advisories/20060701-01-U
20061005 rPSA-2006-0182-1 php php-mysql php-pgsql
http://www.securityfocus.com/archive/1/447866/100/0/threaded
20222
http://secunia.com/advisories/20222
20269
http://secunia.com/advisories/20269
20676
http://secunia.com/advisories/20676
21031
http://secunia.com/advisories/21031
21050
21125
http://secunia.com/advisories/21125
21135
http://secunia.com/advisories/21135
21252
http://secunia.com/advisories/21252
21564
http://secunia.com/advisories/21564
21723
http://secunia.com/advisories/21723
22225
http://secunia.com/advisories/22225
23155
http://secunia.com/advisories/23155
ADV-2006-1500
http://www.vupen.com/english/advisories/2006/1500
ADV-2006-4750
http://www.vupen.com/english/advisories/2006/4750
APPLE-SA-2006-11-28
http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html
GLSA-200605-08
http://security.gentoo.org/glsa/glsa-200605-08.xml
MDKSA-2006:091
http://www.mandriva.com/security/advisories?name=MDKSA-2006:091
MDKSA-2006:122
RHSA-2006:0501
http://www.redhat.com/support/errata/RHSA-2006-0501.html
RHSA-2006:0549
http://rhn.redhat.com/errata/RHSA-2006-0549.html
RHSA-2006:0568
http://www.redhat.com/support/errata/RHSA-2006-0568.html
SUSE-SA:2006:031
http://www.novell.com/linux/security/advisories/2006_31_php.html
TA06-333A
http://www.us-cert.gov/cas/techalerts/TA06-333A.html
TLSA-2006-38
http://www.turbolinux.com/security/2006/TLSA-2006-38.txt
USN-320-1
http://www.ubuntu.com/usn/usn-320-1
http://docs.info.apple.com/article.html?artnum=304829
http://support.avaya.com/elmodocs2/security/ASA-2006-160.htm
http://support.avaya.com/elmodocs2/security/ASA-2006-175.htm
http://www.infigo.hr/en/in_focus/advisories/INFIGO-2006-04-02
https://issues.rpath.com/browse/RPL-683
oval:org.mitre.oval:def:9696
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9696
php-wordwrap-string-bo(26001)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26001
Common Vulnerability Exposure (CVE) ID: CVE-2006-2563
BugTraq ID: 18116
http://www.securityfocus.com/bid/18116
http://securitytracker.com/id?1016175
http://secunia.com/advisories/20337
http://secunia.com/advisories/21847
http://secunia.com/advisories/22039
http://securityreason.com/securityalert/959
http://securityreason.com/achievement_securityalert/39
SuSE Security Announcement: SUSE-SA:2006:052 (Google Search)
http://www.novell.com/linux/security/advisories/2006_52_php.html
SuSE Security Announcement: SUSE-SR:2006:022 (Google Search)
http://www.novell.com/linux/security/advisories/2006_22_sr.html
http://www.vupen.com/english/advisories/2006/2055
XForce ISS Database: php-curl-safemode-bypass(26764)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26764
Common Vulnerability Exposure (CVE) ID: CVE-2006-2660
Bugtraq: 20060611 tempnam() Bypass unique file name PHP 5.1.4 (Google Search)
http://www.securityfocus.com/archive/1/436785/100/0/threaded
http://archives.neohapsis.com/archives/fulldisclosure/2006-06/0209.html
http://securitytracker.com/id?1016271
http://securityreason.com/securityalert/1069
XForce ISS Database: php-tempnam-bypass(27049)
https://exchange.xforce.ibmcloud.com/vulnerabilities/27049
Common Vulnerability Exposure (CVE) ID: CVE-2006-2906
BugTraq ID: 18294
http://www.securityfocus.com/bid/18294
Bugtraq: 20060606 libgd 2.0.33 infinite loop in GIF decoding ? (Google Search)
http://www.securityfocus.com/archive/1/436132
Debian Security Information: DSA-1117 (Google Search)
http://www.debian.org/security/2006/dsa-1117
http://www.mandriva.com/security/advisories?name=MDKSA-2006:112
http://secunia.com/advisories/20500
http://secunia.com/advisories/20571
http://secunia.com/advisories/20853
http://secunia.com/advisories/20887
http://secunia.com/advisories/21186
http://securityreason.com/securityalert/1067
SuSE Security Announcement: SUSE-SA:2006:031 (Google Search)
http://www.trustix.org/errata/2006/0038
https://usn.ubuntu.com/298-1/
http://www.vupen.com/english/advisories/2006/2174
XForce ISS Database: gdgraphicslibrary-gif-dos(26976)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26976
Common Vulnerability Exposure (CVE) ID: CVE-2006-3011
BugTraq ID: 18645
http://www.securityfocus.com/bid/18645
http://www.osvdb.org/26827
http://securitytracker.com/id?1016377
http://secunia.com/advisories/20818
http://securityreason.com/securityalert/1129
http://securityreason.com/achievement_securityalert/41
http://www.vupen.com/english/advisories/2006/2523
XForce ISS Database: php-errorlog-safe-mode-bypass(27414)
https://exchange.xforce.ibmcloud.com/vulnerabilities/27414
Common Vulnerability Exposure (CVE) ID: CVE-2006-3016
BugTraq ID: 17843
http://www.securityfocus.com/bid/17843
Bugtraq: 20061005 rPSA-2006-0182-1 php php-mysql php-pgsql (Google Search)
http://www.osvdb.org/25253
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10597
http://www.redhat.com/support/errata/RHSA-2006-0669.html
http://www.redhat.com/support/errata/RHSA-2006-0682.html
RedHat Security Advisories: RHSA-2006:0736
http://rhn.redhat.com/errata/RHSA-2006-0736.html
http://securitytracker.com/id?1016306
http://secunia.com/advisories/19927
http://secunia.com/advisories/22004
http://secunia.com/advisories/22069
http://secunia.com/advisories/22440
http://secunia.com/advisories/22487
http://secunia.com/advisories/23247
SGI Security Advisory: 20061001-01-P
ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.asc
TurboLinux Advisory: TLSA-2006-38
Common Vulnerability Exposure (CVE) ID: CVE-2006-3017
Bugtraq: 20060806 PHP: Zend_Hash_Del_Key_Or_Index Vulnerability (Google Search)
http://www.securityfocus.com/archive/1/442437/100/0/threaded
Debian Security Information: DSA-1206 (Google Search)
http://www.debian.org/security/2006/dsa-1206
http://archives.neohapsis.com/archives/fulldisclosure/2006-08/0166.html
http://www.hardened-php.net/hphp/zend_hash_del_key_or_index_vulnerability.html
http://www.osvdb.org/25255
http://www.osvdb.org/26466
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10118
RedHat Security Advisories: RHSA-2006:0549
http://www.redhat.com/support/errata/RHSA-2006-0567.html
http://securitytracker.com/id?1016649
http://secunia.com/advisories/21202
http://secunia.com/advisories/22713
SGI Security Advisory: 20060701-01-U
SuSE Security Announcement: SUSE-SA:2006:034 (Google Search)
http://www.novell.com/linux/security/advisories/2006_34_php4.html
https://usn.ubuntu.com/320-1/
XForce ISS Database: php-zendhashdel-unspecified(27396)
https://exchange.xforce.ibmcloud.com/vulnerabilities/27396
Common Vulnerability Exposure (CVE) ID: CVE-2006-3018
http://www.osvdb.org/25254
CopyrightCopyright (c) 2006 E-Soft Inc. http://www.securityspace.com

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.