Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.68810
Category:Ubuntu Local Security Checks
Title:Ubuntu USN-1042-2 (php5)
Summary:NOSUMMARY
Description:Description:
The remote host is missing an update to php5
announced via advisory USN-1042-2.

Details follow:

USN-1042-1 fixed vulnerabilities in PHP5. The fix for CVE-2010-3436
introduced a regression in the open_basedir restriction handling code.
This update fixes the problem.

We apologize for the inconvenience.

Original advisory details:

It was discovered that attackers might be able to bypass open_basedir()
restrictions by passing a specially crafted filename. (CVE-2010-3436)

Solution:
The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
libapache2-mod-php5 5.1.2-1ubuntu3.21
php5-cgi 5.1.2-1ubuntu3.21
php5-cli 5.1.2-1ubuntu3.21

Ubuntu 8.04 LTS:
libapache2-mod-php5 5.2.4-2ubuntu5.14
php5-cgi 5.2.4-2ubuntu5.14
php5-cli 5.2.4-2ubuntu5.14

Ubuntu 9.10:
libapache2-mod-php5 5.2.10.dfsg.1-2ubuntu6.7
php5-cgi 5.2.10.dfsg.1-2ubuntu6.7
php5-cli 5.2.10.dfsg.1-2ubuntu6.7

Ubuntu 10.04 LTS:
libapache2-mod-php5 5.3.2-1ubuntu4.7
php5-cgi 5.3.2-1ubuntu4.7
php5-cli 5.3.2-1ubuntu4.7

Ubuntu 10.10:
libapache2-mod-php5 5.3.3-1ubuntu9.3
php5-cgi 5.3.3-1ubuntu9.3
php5-cli 5.3.3-1ubuntu9.3

In general, a standard system update will make all the necessary changes.

https://secure1.securityspace.com/smysecure/catid.html?in=USN-1042-2

Risk factor : Medium

CVSS Score:
5.0

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2010-3436
42729
http://secunia.com/advisories/42729
42812
http://secunia.com/advisories/42812
44723
http://www.securityfocus.com/bid/44723
ADV-2010-3313
http://www.vupen.com/english/advisories/2010/3313
ADV-2011-0077
http://www.vupen.com/english/advisories/2011/0077
APPLE-SA-2011-03-21-1
http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html
APPLE-SA-2011-10-12-3
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html
MDVSA-2010:218
http://www.mandriva.com/security/advisories?name=MDVSA-2010:218
SSA:2010-357-01
http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.490619
USN-1042-1
http://www.ubuntu.com/usn/USN-1042-1
http://security-tracker.debian.org/tracker/CVE-2010-3436
http://support.apple.com/kb/HT4581
http://support.apple.com/kb/HT5002
http://svn.php.net/viewvc/php/php-src/trunk/main/fopen_wrappers.c?r1=303824&r2=303823&pathrev=303824
http://svn.php.net/viewvc?view=revision&revision=303824
http://www.php.net/ChangeLog-5.php
http://www.php.net/archive/2010.php#id2010-12-10-1
http://www.php.net/releases/5_2_15.php
http://www.php.net/releases/5_3_4.php
CopyrightCopyright (c) 2011 E-Soft Inc. http://www.securityspace.com

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.