Search 211766 CVE descriptions
and 97459 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:
Category:SuSE Local Security Checks
Title:SUSE: Security Advisory (SUSE-SU-2016:2461-1)
Summary:The remote host is missing an update for the 'php53' package(s) announced via the SUSE-SU-2016:2461-1 advisory.
The remote host is missing an update for the 'php53' package(s) announced via the SUSE-SU-2016:2461-1 advisory.

Vulnerability Insight:
This update for php53 fixes the following issues:
* CVE-2016-7411: php5: Memory corruption when destructing deserialized
* CVE-2016-7412: Heap overflow in mysqlnd when not receiving UNSIGNED_FLAG
in BIT field
* CVE-2016-7413: Use after free in wddx_deserialize
* CVE-2016-7414: Out of bounds heap read when verifying signature of zip
phar in phar_parse_zipfile
* CVE-2016-7416: Stack based buffer overflow in msgfmt_format_message
* CVE-2016-7417: Missing type check when unserializing SplArray
* CVE-2016-7418: Null pointer dereference in php_wddx_push_element

Affected Software/OS:
'php53' package(s) on SUSE Linux Enterprise Server 11-SP2, SUSE Linux Enterprise Debuginfo 11-SP2

Please install the updated package(s).

CVSS Score:

CVSS Vector:

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2016-7411
BugTraq ID: 93009
Common Vulnerability Exposure (CVE) ID: CVE-2016-7412
BugTraq ID: 93005
RedHat Security Advisories: RHSA-2018:1296
Common Vulnerability Exposure (CVE) ID: CVE-2016-7413
BugTraq ID: 93006
Common Vulnerability Exposure (CVE) ID: CVE-2016-7414
BugTraq ID: 93004
Common Vulnerability Exposure (CVE) ID: CVE-2016-7416
BugTraq ID: 93008
Common Vulnerability Exposure (CVE) ID: CVE-2016-7417
BugTraq ID: 93007
Common Vulnerability Exposure (CVE) ID: CVE-2016-7418
BugTraq ID: 93011
CopyrightCopyright (C) 2021 Greenbone Networks GmbH

This is only one of 97459 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

© 1998-2021 E-Soft Inc. All rights reserved.