Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.60272
Category:SuSE Local Security Checks
Title:SuSE Security Advisory SUSE-SA:2008:004 (php4, php5)
Summary:NOSUMMARY
Description:Description:

The remote host is missing updates announced in
advisory SUSE-SA:2008:004.

php5 was updated to version 5.2.5 to fix several security
vulnerabilities. For php4 on SLES9 the patches were backported.

- php4 on SLES9 and php5 on SLES10/10.1 contained a copy of the pcre
library which was vulnerable to several security issues. On SLES9
the included library was patched. SLES10/10.1 now uses the system
pcre library. 10.2 and 10.3 already used the system pcre library
before.
(CVE-2007-1659, CVE-2006-7230, CVE-2007-1660, CVE-2006-7227
CVE-2005-4872, CVE-2006-7228)

- flaws in processing multi byte sequences in htmlentities/htmlspecialchars
(CVE-2007-5898)

- overly long arguments to the dl() function could crash php
(CVE-2007-4825)

- overy long arguments to the glob() function could crash php
(CVE-2007-4782)

- overly long arguments to some iconv functions could crash php
(CVE-2007-4840)

- overy long arguments to the setlocale() function could crash php
(CVE-2007-4784)

- the wordwrap-function could cause a floating point exception
(CVE-2007-3998)

- overy long arguments to the fnmatch() function could crash php
(CVE-2007-4782)

- incorrect size calculation in the chunk_split function could lead
to a buffer overflow
(CVE-2007-4661)

- flaws in the GD extension could lead to integer overflows
(CVE-2007-3996)

- the money_format function contained format string flaws
(CVE-2007-4658)

Solution:
Update your system with the packages as indicated in
the referenced security advisory.

https://secure1.securityspace.com/smysecure/catid.html?in=SUSE-SA:2008:004

Risk factor : High

CVSS Score:
7.5

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2005-4872
26462
http://www.securityfocus.com/bid/26462
27582
http://secunia.com/advisories/27582
27773
http://secunia.com/advisories/27773
27869
http://secunia.com/advisories/27869
28658
http://secunia.com/advisories/28658
MDVSA-2008:030
http://www.mandriva.com/security/advisories?name=MDVSA-2008:030
RHSA-2007:1052
http://www.redhat.com/support/errata/RHSA-2007-1052.html
SUSE-SA:2007:062
http://www.novell.com/linux/security/advisories/2007_62_pcre.html
SUSE-SA:2008:004
http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00006.html
http://scary.beasts.org/security/CESA-2007-006.html
http://support.avaya.com/elmodocs2/security/ASA-2007-493.htm
http://www.pcre.org/changelog.txt
oval:org.mitre.oval:def:11615
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11615
Common Vulnerability Exposure (CVE) ID: CVE-2006-7224
Common Vulnerability Exposure (CVE) ID: CVE-2006-7225
26725
http://www.securityfocus.com/bid/26725
28041
http://secunia.com/advisories/28041
RHSA-2007:1059
http://www.redhat.com/support/errata/RHSA-2007-1059.html
RHSA-2007:1068
http://www.redhat.com/support/errata/RHSA-2007-1068.html
http://support.avaya.com/elmodocs2/security/ASA-2007-505.htm
https://bugzilla.redhat.com/show_bug.cgi?id=384761
oval:org.mitre.oval:def:10985
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10985
Common Vulnerability Exposure (CVE) ID: CVE-2006-7226
26727
http://www.securityfocus.com/bid/26727
https://bugzilla.redhat.com/show_bug.cgi?id=384781
oval:org.mitre.oval:def:11545
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11545
pcre-library-subpattern-dos(40020)
https://exchange.xforce.ibmcloud.com/vulnerabilities/40020
Common Vulnerability Exposure (CVE) ID: CVE-2006-7227
27741
http://secunia.com/advisories/27741
28406
http://secunia.com/advisories/28406
28414
http://secunia.com/advisories/28414
28714
http://secunia.com/advisories/28714
28720
http://secunia.com/advisories/28720
30106
http://secunia.com/advisories/30106
30155
http://secunia.com/advisories/30155
30219
http://secunia.com/advisories/30219
DSA-1570
http://www.debian.org/security/2008/dsa-1570
GLSA-200711-30
http://security.gentoo.org/glsa/glsa-200711-30.xml
GLSA-200801-02
http://security.gentoo.org/glsa/glsa-200801-02.xml
GLSA-200801-18
http://security.gentoo.org/glsa/glsa-200801-18.xml
GLSA-200801-19
http://security.gentoo.org/glsa/glsa-200801-19.xml
GLSA-200805-11
http://security.gentoo.org/glsa/glsa-200805-11.xml
http://bugs.gentoo.org/show_bug.cgi?id=198976
oval:org.mitre.oval:def:10408
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10408
Common Vulnerability Exposure (CVE) ID: CVE-2006-7228
20080221 VMSA-2008-0003 Moderate: Updated aacraid driver and samba and python service console updates
http://www.securityfocus.com/archive/1/488457/100/0/threaded
20080416 VMSA-2008-0007 Moderate Updated Service Console packages pcre, net-snmp, and OpenPegasus
http://www.securityfocus.com/archive/1/490917/100/0/threaded
27776
http://secunia.com/advisories/27776
28027
http://secunia.com/advisories/28027
28050
http://secunia.com/advisories/28050
29032
http://secunia.com/advisories/29032
29085
http://secunia.com/advisories/29085
29785
http://secunia.com/advisories/29785
31124
http://secunia.com/advisories/31124
ADV-2008-0637
http://www.vupen.com/english/advisories/2008/0637
ADV-2008-1234
http://www.vupen.com/english/advisories/2008/1234/references
GLSA-200802-10
http://security.gentoo.org/glsa/glsa-200802-10.xml
MDVSA-2008:012
http://www.mandriva.com/security/advisories?name=MDVSA-2008:012
RHSA-2007:1063
http://www.redhat.com/support/errata/RHSA-2007-1063.html
RHSA-2007:1065
http://www.redhat.com/support/errata/RHSA-2007-1065.html
RHSA-2007:1076
http://www.redhat.com/support/errata/RHSA-2007-1076.html
RHSA-2007:1077
http://www.redhat.com/support/errata/RHSA-2007-1077.html
RHSA-2008:0546
http://www.redhat.com/support/errata/RHSA-2008-0546.html
[Security-announce] 20080221 VMSA-2008-0003 Moderate: Updated aacraid driver and samba and python service console updates
http://lists.vmware.com/pipermail/security-announce/2008/000005.html
[Security-announce] 20080415 VMSA-2008-0007 Moderate Updated Service Console packages pcre, net-snmp, and OpenPegasus
http://lists.vmware.com/pipermail/security-announce/2008/000014.html
https://bugzilla.redhat.com/show_bug.cgi?id=383371
oval:org.mitre.oval:def:10810
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10810
Common Vulnerability Exposure (CVE) ID: CVE-2006-7230
26550
http://www.securityfocus.com/bid/26550
https://bugzilla.redhat.com/show_bug.cgi?id=384801
oval:org.mitre.oval:def:10911
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10911
Common Vulnerability Exposure (CVE) ID: CVE-2007-1659
http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html
http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html
BugTraq ID: 26346
http://www.securityfocus.com/bid/26346
Bugtraq: 20071106 rPSA-2007-0231-1 pcre (Google Search)
http://www.securityfocus.com/archive/1/483357/100/0/threaded
Bugtraq: 20071112 FLEA-2007-0064-1 pcre (Google Search)
http://www.securityfocus.com/archive/1/483579/100/0/threaded
Cert/CC Advisory: TA07-352A
http://www.us-cert.gov/cas/techalerts/TA07-352A.html
Debian Security Information: DSA-1399 (Google Search)
http://www.debian.org/security/2007/dsa-1399
Debian Security Information: DSA-1570 (Google Search)
https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00181.html
http://www.mandriva.com/security/advisories?name=MDKSA-2007:211
http://www.mandriva.com/security/advisories?name=MDKSA-2007:212
http://mail.gnome.org/archives/gtk-devel-list/2007-November/msg00022.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9725
http://www.redhat.com/support/errata/RHSA-2007-0967.html
http://securitytracker.com/id?1018895
http://secunia.com/advisories/27538
http://secunia.com/advisories/27543
http://secunia.com/advisories/27547
http://secunia.com/advisories/27554
http://secunia.com/advisories/27598
http://secunia.com/advisories/27697
http://secunia.com/advisories/27965
http://secunia.com/advisories/28136
http://secunia.com/advisories/29267
http://secunia.com/advisories/29420
SuSE Security Announcement: SUSE-SA:2007:062 (Google Search)
SuSE Security Announcement: SUSE-SA:2008:004 (Google Search)
SuSE Security Announcement: SUSE-SR:2007:025 (Google Search)
http://www.novell.com/linux/security/advisories/2007_25_sr.html
https://usn.ubuntu.com/547-1/
http://www.vupen.com/english/advisories/2007/3725
http://www.vupen.com/english/advisories/2007/3790
http://www.vupen.com/english/advisories/2007/4238
http://www.vupen.com/english/advisories/2008/0924/references
XForce ISS Database: pcre-regex-code-execution(38272)
https://exchange.xforce.ibmcloud.com/vulnerabilities/38272
Common Vulnerability Exposure (CVE) ID: CVE-2007-1660
Bugtraq: 20080416 VMSA-2008-0007 Moderate Updated Service Console packages pcre, net-snmp, and OpenPegasus (Google Search)
http://www.mandriva.com/security/advisories?name=MDKSA-2007:213
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10562
http://www.redhat.com/support/errata/RHSA-2007-0968.html
http://secunia.com/advisories/27862
XForce ISS Database: pcre-character-class-dos(38273)
https://exchange.xforce.ibmcloud.com/vulnerabilities/38273
Common Vulnerability Exposure (CVE) ID: CVE-2007-2872
1018186
http://www.securitytracker.com/id?1018186
2007-0023
http://www.trustix.org/errata/2007/0023/
20070601 SEC Consult SA-20070601-0 :: PHP chunk_split() integer overflow
http://www.securityfocus.com/archive/1/470244/100/0/threaded
24261
http://www.securityfocus.com/bid/24261
25456
http://secunia.com/advisories/25456
25535
http://secunia.com/advisories/25535
26048
http://secunia.com/advisories/26048
26231
http://secunia.com/advisories/26231
26838
http://secunia.com/advisories/26838
26871
http://secunia.com/advisories/26871
26895
http://secunia.com/advisories/26895
26930
http://secunia.com/advisories/26930
26967
http://secunia.com/advisories/26967
27037
http://secunia.com/advisories/27037
27102
http://secunia.com/advisories/27102
27110
http://secunia.com/advisories/27110
27351
http://secunia.com/advisories/27351
27377
http://secunia.com/advisories/27377
27545
http://secunia.com/advisories/27545
27864
http://secunia.com/advisories/27864
28318
http://secunia.com/advisories/28318
28750
http://secunia.com/advisories/28750
28936
http://secunia.com/advisories/28936
30040
http://secunia.com/advisories/30040
36083
http://osvdb.org/36083
ADV-2007-2061
http://www.vupen.com/english/advisories/2007/2061
ADV-2007-3386
http://www.vupen.com/english/advisories/2007/3386
ADV-2008-0059
http://www.vupen.com/english/advisories/2008/0059
ADV-2008-0398
http://www.vupen.com/english/advisories/2008/0398
FEDORA-2007-2215
https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00397.html
FEDORA-2007-709
https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00354.html
GLSA-200710-02
http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml
HPSBUX02262
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795
HPSBUX02308
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01345501
HPSBUX02332
http://www.securityfocus.com/archive/1/491693/100/0/threaded
MDKSA-2007:187
http://www.mandriva.com/security/advisories?name=MDKSA-2007:187
OpenPKG-SA-2007.020
http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.020.html
RHSA-2007:0888
http://www.redhat.com/support/errata/RHSA-2007-0888.html
RHSA-2007:0889
http://rhn.redhat.com/errata/RHSA-2007-0889.html
RHSA-2007:0890
http://www.redhat.com/support/errata/RHSA-2007-0890.html
RHSA-2007:0891
http://www.redhat.com/support/errata/RHSA-2007-0891.html
SSA:2007-152-01
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.482863
SSA:2008-045-03
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.335136
SSRT071447
SSRT080010
SSRT080056
SUSE-SA:2007:044
http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html
USN-549-1
https://usn.ubuntu.com/549-1/
USN-549-2
http://www.ubuntu.com/usn/usn-549-2
http://support.avaya.com/elmodocs2/security/ASA-2007-449.htm
http://www.php.net/ChangeLog-4.php
http://www.php.net/releases/4_4_8.php
http://www.php.net/releases/5_2_3.php
http://www.sec-consult.com/291.html
https://issues.rpath.com/browse/RPL-1693
https://issues.rpath.com/browse/RPL-1702
https://launchpad.net/bugs/173043
oval:org.mitre.oval:def:9424
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9424
php-chunksplit-security-bypass(39398)
https://exchange.xforce.ibmcloud.com/vulnerabilities/39398
Common Vulnerability Exposure (CVE) ID: CVE-2007-3996
Debian Security Information: DSA-1613 (Google Search)
http://www.debian.org/security/2008/dsa-1613
http://security.gentoo.org/glsa/glsa-200712-13.xml
http://secweb.se/en/advisories/php-imagecopyresized-integer-overflow/
http://secweb.se/en/advisories/php-imagecreatetruecolor-integer-overflow/
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11147
RedHat Security Advisories: RHSA-2007:0889
http://secunia.com/advisories/26642
http://secunia.com/advisories/26822
http://secunia.com/advisories/28009
http://secunia.com/advisories/28147
http://secunia.com/advisories/31168
http://securityreason.com/securityalert/3103
http://www.trustix.org/errata/2007/0026/
http://www.ubuntu.com/usn/usn-557-1
http://www.vupen.com/english/advisories/2007/3023
XForce ISS Database: php-gdimagecopyresized-bo(36383)
https://exchange.xforce.ibmcloud.com/vulnerabilities/36383
XForce ISS Database: php-gdimagecreate-bo(36382)
https://exchange.xforce.ibmcloud.com/vulnerabilities/36382
Common Vulnerability Exposure (CVE) ID: CVE-2007-3998
Debian Security Information: DSA-1444 (Google Search)
http://www.debian.org/security/2008/dsa-1444
Debian Security Information: DSA-1578 (Google Search)
http://www.debian.org/security/2008/dsa-1578
http://secweb.se/en/advisories/php-wordwrap-vulnerability/
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10603
http://secunia.com/advisories/28249
http://secunia.com/advisories/30288
Common Vulnerability Exposure (CVE) ID: CVE-2007-4658
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10363
XForce ISS Database: php-moneyformat-unspecified(36377)
https://exchange.xforce.ibmcloud.com/vulnerabilities/36377
Common Vulnerability Exposure (CVE) ID: CVE-2007-4661
http://cvs.php.net/viewvc.cgi/php-src/ext/standard/string.c?r1=1.445.2.14.2.58&r2=1.445.2.14.2.59
Common Vulnerability Exposure (CVE) ID: CVE-2007-4782
Bugtraq: 20070904 PHP < 5.2.3 fnmatch() denial of service (Google Search)
http://www.securityfocus.com/archive/1/478630/100/0/threaded
Bugtraq: 20070905 PHP < 5.2.3 glob() denial of service (Google Search)
http://www.securityfocus.com/archive/1/478626/100/0/threaded
http://www.securityfocus.com/archive/1/478726/100/0/threaded
https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00773.html
http://www.mandriva.com/security/advisories?name=MDVSA-2009:022
http://www.mandriva.com/security/advisories?name=MDVSA-2009:023
http://osvdb.org/38686
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10897
http://www.redhat.com/support/errata/RHSA-2008-0505.html
http://www.redhat.com/support/errata/RHSA-2008-0544.html
http://www.redhat.com/support/errata/RHSA-2008-0545.html
http://www.redhat.com/support/errata/RHSA-2008-0582.html
http://secunia.com/advisories/30828
http://secunia.com/advisories/31119
http://secunia.com/advisories/31200
http://securityreason.com/securityalert/3109
http://www.ubuntu.com/usn/usn-628-1
XForce ISS Database: php-fnmatch-dos(36457)
https://exchange.xforce.ibmcloud.com/vulnerabilities/36457
XForce ISS Database: php-globfunction-dos(36461)
https://exchange.xforce.ibmcloud.com/vulnerabilities/36461
Common Vulnerability Exposure (CVE) ID: CVE-2007-4784
Bugtraq: 20070904 PHP < 5.2.4 setlocale() denial of service (Google Search)
http://www.securityfocus.com/archive/1/478627/100/0/threaded
http://osvdb.org/38687
http://securityreason.com/securityalert/3114
XForce ISS Database: php-setlocale-dos(36458)
https://exchange.xforce.ibmcloud.com/vulnerabilities/36458
Common Vulnerability Exposure (CVE) ID: CVE-2007-4825
Bugtraq: 20070910 /* PHP <=5.2.4 open_basedir bypass & code exec & denial of service errata ... working on windows too .. */ (Google Search)
http://www.securityfocus.com/archive/1/478988/100/0/threaded
Bugtraq: 20070910 PHP <=5.2.4 open_basedir bypass & code exec & denial of service (Google Search)
http://www.securityfocus.com/archive/1/478985/100/0/threaded
Bugtraq: 20070910 Re: PHP <=5.2.4 open_basedir bypass & code exec & denial of service (Google Search)
http://www.securityfocus.com/archive/1/478989/100/0/threaded
http://osvdb.org/45902
http://securityreason.com/securityalert/3119
XForce ISS Database: php-dl-security-bypass(36528)
https://exchange.xforce.ibmcloud.com/vulnerabilities/36528
Common Vulnerability Exposure (CVE) ID: CVE-2007-4840
Bugtraq: 20070906 PHP <= 5.2.4 multiple Iconv functions denial of service (Google Search)
http://www.securityfocus.com/archive/1/478730/100/0/threaded
HPdes Security Advisory: HPSBUX02332
HPdes Security Advisory: SSRT080056
http://osvdb.org/38916
http://secunia.com/advisories/27659
http://securityreason.com/securityalert/3122
Common Vulnerability Exposure (CVE) ID: CVE-2007-5898
http://www.mandriva.com/security/advisories?name=MDVSA-2008:125
http://www.mandriva.com/security/advisories?name=MDVSA-2008:126
http://www.mandriva.com/security/advisories?name=MDVSA-2008:127
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10080
http://securitytracker.com/id?1018934
http://secunia.com/advisories/27648
CopyrightCopyright (c) 2008 E-Soft Inc. http://www.securityspace.com

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.