|Category:||Huawei EulerOS Local Security Checks|
|Title:||Huawei EulerOS: Security Advisory for php (EulerOS-SA-2021-2423)|
|Summary:||The remote host is missing an update for the Huawei EulerOS 'php' package(s) announced via the EulerOS-SA-2021-2423 advisory.|
The remote host is missing an update for the Huawei EulerOS 'php' package(s) announced via the EulerOS-SA-2021-2423 advisory.
When using the gdImageCreateFromXbm() function in the GD Graphics Library (aka LibGD) 2.2.5, as used in the PHP GD extension in PHP versions 7.1.x below 7.1.30, 7.2.x below 7.2.19 and 7.3.x below 7.3.6, it is possible to supply data that will cause the function to use the value of uninitialized variable. This may lead to disclosing contents of the stack that has been left there by previous code.(CVE-2019-11038)
In PHP versions 7.3.x below 7.3.26, 7.4.x below 7.4.14 and 8.0.0, when validating URL with functions like filter_var($url, FILTER_VALIDATE_URL), PHP will accept an URL with invalid password as valid URL. This may lead to functions that rely on URL being valid to mis-parse the URL and produce wrong data as components of the URL.(CVE-2020-7071)
'php' package(s) on Huawei EulerOS V2.0SP2.
Please install the updated package(s).
Common Vulnerability Exposure (CVE) ID: CVE-2020-7071|
Debian Security Information: DSA-4856 (Google Search)
|Copyright||Copyright (C) 2021 Greenbone Networks GmbH|
|This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.