Description: | Description:
The remote host is missing an update to php5 announced via advisory USN-375-1.
A security issue affects the following Ubuntu releases:
Ubuntu 5.10 Ubuntu 6.06 LTS Ubuntu 6.10
This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu.
Details follow:
Stefan Esser discovered two buffer overflows in the htmlentities() and htmlspecialchars() functions. By supplying specially crafted input to PHP applications which process that input with these functions, a remote attacker could potentially exploit this to execute arbitrary code with the privileges of the application. (CVE-2006-5465)
This update also fixes bugs in the chdir() and tempnam() functions, which did not perform proper open_basedir checks. This could allow local scripts to bypass intended restrictions.
Solution: The problem can be corrected by upgrading your system to the following package versions:
Ubuntu 5.10: libapache2-mod-php5 5.0.5-2ubuntu1.6 php5-cli 5.0.5-2ubuntu1.6
Ubuntu 6.06 LTS: libapache2-mod-php5 5.1.2-1ubuntu3.4 php5-cli 5.1.2-1ubuntu3.4
Ubuntu 6.10: libapache2-mod-php5 5.1.6-1ubuntu2.1 php5-cli 5.1.6-1ubuntu2.1
In general, a standard system upgrade is sufficient to effect the necessary changes.
https://secure1.securityspace.com/smysecure/catid.html?in=USN-375-1
Risk factor : High
CVSS Score: 7.5
|