Vulnerabilities > CVE-2009-1271 - Unspecified vulnerability in PHP
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
NONE Integrity impact
NONE Availability impact
PARTIAL Summary
The JSON_parser function (ext/json/JSON_parser.c) in PHP 5.2.x before 5.2.9 allows remote attackers to cause a denial of service (segmentation fault) via a malformed string to the json_decode API function.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 10 |
Nessus
NASL family Gentoo Local Security Checks NASL id GENTOO_GLSA-201001-03.NASL description The remote host is affected by the vulnerability described in GLSA-201001-03 (PHP: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in PHP. Please review the CVE identifiers referenced below and the associated PHP release notes for details. Impact : A context-dependent attacker could execute arbitrary code via a specially crafted string containing an HTML entity when the mbstring extension is enabled. Furthermore a remote attacker could execute arbitrary code via a specially crafted GD graphics file. A remote attacker could also cause a Denial of Service via a malformed string passed to the json_decode() function, via a specially crafted ZIP file passed to the php_zip_make_relative_path() function, via a malformed JPEG image passed to the exif_read_data() function, or via temporary file exhaustion. It is also possible for an attacker to spoof certificates, bypass various safe_mode and open_basedir restrictions when certain criteria are met, perform Cross-site scripting attacks, more easily perform SQL injection attacks, manipulate settings of other virtual hosts on the same server via a malicious .htaccess entry when running on Apache, disclose memory portions, and write arbitrary files via a specially crafted ZIP archive. Some vulnerabilities with unknown impact and attack vectors have been reported as well. Workaround : There is no known workaround at this time. last seen 2020-06-01 modified 2020-06-02 plugin id 44892 published 2010-02-25 reporter This script is Copyright (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/44892 title GLSA-201001-03 : PHP: Multiple vulnerabilities code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Gentoo Linux Security Advisory GLSA 201001-03. # # The advisory text is Copyright (C) 2001-2018 Gentoo Foundation, Inc. # and licensed under the Creative Commons - Attribution / Share Alike # license. See http://creativecommons.org/licenses/by-sa/3.0/ # include("compat.inc"); if (description) { script_id(44892); script_version("1.17"); script_cvs_date("Date: 2019/08/02 13:32:45"); script_cve_id("CVE-2008-5498", "CVE-2008-5514", "CVE-2008-5557", "CVE-2008-5624", "CVE-2008-5625", "CVE-2008-5658", "CVE-2008-5814", "CVE-2008-5844", "CVE-2008-7002", "CVE-2009-0754", "CVE-2009-1271", "CVE-2009-1272", "CVE-2009-2626", "CVE-2009-2687", "CVE-2009-3291", "CVE-2009-3292", "CVE-2009-3293", "CVE-2009-3546", "CVE-2009-3557", "CVE-2009-3558", "CVE-2009-4017", "CVE-2009-4142", "CVE-2009-4143"); script_bugtraq_id(32625, 32948, 32958, 33002, 33542, 35440, 36449, 36712, 37079, 37390); script_xref(name:"GLSA", value:"201001-03"); script_name(english:"GLSA-201001-03 : PHP: Multiple vulnerabilities"); script_summary(english:"Checks for updated package(s) in /var/db/pkg"); script_set_attribute( attribute:"synopsis", value: "The remote Gentoo host is missing one or more security-related patches." ); script_set_attribute( attribute:"description", value: "The remote host is affected by the vulnerability described in GLSA-201001-03 (PHP: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in PHP. Please review the CVE identifiers referenced below and the associated PHP release notes for details. Impact : A context-dependent attacker could execute arbitrary code via a specially crafted string containing an HTML entity when the mbstring extension is enabled. Furthermore a remote attacker could execute arbitrary code via a specially crafted GD graphics file. A remote attacker could also cause a Denial of Service via a malformed string passed to the json_decode() function, via a specially crafted ZIP file passed to the php_zip_make_relative_path() function, via a malformed JPEG image passed to the exif_read_data() function, or via temporary file exhaustion. It is also possible for an attacker to spoof certificates, bypass various safe_mode and open_basedir restrictions when certain criteria are met, perform Cross-site scripting attacks, more easily perform SQL injection attacks, manipulate settings of other virtual hosts on the same server via a malicious .htaccess entry when running on Apache, disclose memory portions, and write arbitrary files via a specially crafted ZIP archive. Some vulnerabilities with unknown impact and attack vectors have been reported as well. Workaround : There is no known workaround at this time." ); script_set_attribute( attribute:"see_also", value:"https://security.gentoo.org/glsa/200911-03" ); script_set_attribute( attribute:"see_also", value:"https://security.gentoo.org/glsa/201001-03" ); script_set_attribute( attribute:"solution", value: "All PHP users should upgrade to the latest version. As PHP is statically linked against a vulnerable version of the c-client library when the imap or kolab USE flag is enabled (GLSA 200911-03), users should upgrade net-libs/c-client beforehand: # emerge --sync # emerge --ask --oneshot --verbose '>=net-libs/c-client-2007e' # emerge --ask --oneshot --verbose '>=dev-lang/php-5.2.12'" ); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C"); script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available"); script_set_attribute(attribute:"exploit_available", value:"true"); script_cwe_id(16, 20, 22, 79, 119, 134, 200, 264); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:gentoo:linux:php"); script_set_attribute(attribute:"cpe", value:"cpe:/o:gentoo:linux"); script_set_attribute(attribute:"patch_publication_date", value:"2010/01/05"); script_set_attribute(attribute:"plugin_publication_date", value:"2010/02/25"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"Gentoo Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/Gentoo/release", "Host/Gentoo/qpkg-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("qpkg.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/Gentoo/release")) audit(AUDIT_OS_NOT, "Gentoo"); if (!get_kb_item("Host/Gentoo/qpkg-list")) audit(AUDIT_PACKAGE_LIST_MISSING); flag = 0; if (qpkg_check(package:"dev-lang/php", unaffected:make_list("ge 5.2.12"), vulnerable:make_list("lt 5.2.12"))) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get()); else security_hole(0); exit(0); } else { tested = qpkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "PHP"); }
NASL family Mandriva Local Security Checks NASL id MANDRIVA_MDVSA-2009-090.NASL description A vulnerability has been found and corrected in PHP : The JSON_parser function (ext/json/JSON_parser.c) in PHP 5.2.x before 5.2.9 allows remote attackers to cause a denial of service (segmentation fault) via a malformed string to the json_decode API function (CVE-2009-1271). The updated packages have been patched to correct these issues. last seen 2020-06-01 modified 2020-06-02 plugin id 37871 published 2009-04-23 reporter This script is Copyright (C) 2009-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/37871 title Mandriva Linux Security Advisory : php (MDVSA-2009:090) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Mandriva Linux Security Advisory MDVSA-2009:090. # The text itself is copyright (C) Mandriva S.A. # include("compat.inc"); if (description) { script_id(37871); script_version ("1.11"); script_cvs_date("Date: 2019/08/02 13:32:51"); script_cve_id("CVE-2009-1271"); script_xref(name:"MDVSA", value:"2009:090"); script_name(english:"Mandriva Linux Security Advisory : php (MDVSA-2009:090)"); script_summary(english:"Checks rpm output for the updated packages"); script_set_attribute( attribute:"synopsis", value: "The remote Mandriva Linux host is missing one or more security updates." ); script_set_attribute( attribute:"description", value: "A vulnerability has been found and corrected in PHP : The JSON_parser function (ext/json/JSON_parser.c) in PHP 5.2.x before 5.2.9 allows remote attackers to cause a denial of service (segmentation fault) via a malformed string to the json_decode API function (CVE-2009-1271). The updated packages have been patched to correct these issues." ); script_set_attribute(attribute:"solution", value:"Update the affected packages."); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64php5_common5"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libphp5_common5"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-bcmath"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-bz2"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-calendar"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-cgi"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-cli"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-ctype"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-curl"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-dba"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-dbase"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-dom"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-exif"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-fcgi"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-filter"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-ftp"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-gd"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-gettext"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-gmp"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-hash"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-iconv"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-imap"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-json"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-ldap"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-mbstring"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-mcrypt"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-mhash"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-mime_magic"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-ming"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-mssql"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-mysql"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-mysqli"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-ncurses"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-odbc"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-openssl"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-pcntl"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-pdo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-pdo_dblib"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-pdo_mysql"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-pdo_odbc"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-pdo_pgsql"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-pdo_sqlite"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-pgsql"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-posix"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-pspell"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-readline"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-recode"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-session"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-shmop"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-snmp"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-soap"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-sockets"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-sqlite"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-sybase"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-sysvmsg"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-sysvsem"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-sysvshm"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-tidy"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-tokenizer"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-wddx"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-xml"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-xmlreader"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-xmlrpc"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-xmlwriter"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-xsl"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-zlib"); script_set_attribute(attribute:"cpe", value:"cpe:/o:mandriva:linux:2008.1"); script_set_attribute(attribute:"cpe", value:"cpe:/o:mandriva:linux:2009.0"); script_set_attribute(attribute:"patch_publication_date", value:"2009/04/10"); script_set_attribute(attribute:"plugin_publication_date", value:"2009/04/23"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2009-2019 Tenable Network Security, Inc."); script_family(english:"Mandriva Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/Mandrake/release", "Host/Mandrake/rpm-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/Mandrake/release")) audit(AUDIT_OS_NOT, "Mandriva / Mandake Linux"); if (!get_kb_item("Host/Mandrake/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if (cpu !~ "^(amd64|i[3-6]86|x86_64)$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Mandriva / Mandrake Linux", cpu); flag = 0; if (rpm_check(release:"MDK2008.1", cpu:"x86_64", reference:"lib64php5_common5-5.2.5-14.5mdv2008.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.1", cpu:"i386", reference:"libphp5_common5-5.2.5-14.5mdv2008.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.1", reference:"php-bcmath-5.2.5-14.5mdv2008.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.1", reference:"php-bz2-5.2.5-14.5mdv2008.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.1", reference:"php-calendar-5.2.5-14.5mdv2008.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.1", reference:"php-cgi-5.2.5-14.5mdv2008.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.1", reference:"php-cli-5.2.5-14.5mdv2008.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.1", reference:"php-ctype-5.2.5-14.5mdv2008.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.1", reference:"php-curl-5.2.5-14.5mdv2008.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.1", reference:"php-dba-5.2.5-14.5mdv2008.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.1", reference:"php-dbase-5.2.5-14.5mdv2008.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.1", reference:"php-devel-5.2.5-14.5mdv2008.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.1", reference:"php-dom-5.2.5-14.5mdv2008.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.1", reference:"php-exif-5.2.5-14.5mdv2008.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.1", reference:"php-fcgi-5.2.5-14.5mdv2008.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.1", reference:"php-filter-5.2.5-14.5mdv2008.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.1", reference:"php-ftp-5.2.5-14.5mdv2008.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.1", reference:"php-gd-5.2.5-14.5mdv2008.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.1", reference:"php-gettext-5.2.5-14.5mdv2008.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.1", reference:"php-gmp-5.2.5-14.5mdv2008.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.1", reference:"php-hash-5.2.5-14.5mdv2008.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.1", reference:"php-iconv-5.2.5-14.5mdv2008.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.1", reference:"php-imap-5.2.5-14.5mdv2008.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.1", reference:"php-json-5.2.5-14.5mdv2008.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.1", reference:"php-ldap-5.2.5-14.5mdv2008.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.1", reference:"php-mbstring-5.2.5-14.5mdv2008.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.1", reference:"php-mcrypt-5.2.5-14.5mdv2008.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.1", reference:"php-mhash-5.2.5-14.5mdv2008.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.1", reference:"php-mime_magic-5.2.5-14.5mdv2008.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.1", reference:"php-ming-5.2.5-14.5mdv2008.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.1", reference:"php-mssql-5.2.5-14.5mdv2008.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.1", reference:"php-mysql-5.2.5-14.5mdv2008.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.1", reference:"php-mysqli-5.2.5-14.5mdv2008.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.1", reference:"php-ncurses-5.2.5-14.5mdv2008.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.1", reference:"php-odbc-5.2.5-14.5mdv2008.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.1", reference:"php-openssl-5.2.5-14.5mdv2008.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.1", reference:"php-pcntl-5.2.5-14.5mdv2008.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.1", reference:"php-pdo-5.2.5-14.5mdv2008.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.1", reference:"php-pdo_dblib-5.2.5-14.5mdv2008.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.1", reference:"php-pdo_mysql-5.2.5-14.5mdv2008.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.1", reference:"php-pdo_odbc-5.2.5-14.5mdv2008.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.1", reference:"php-pdo_pgsql-5.2.5-14.5mdv2008.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.1", reference:"php-pdo_sqlite-5.2.5-14.5mdv2008.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.1", reference:"php-pgsql-5.2.5-14.5mdv2008.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.1", reference:"php-posix-5.2.5-14.5mdv2008.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.1", reference:"php-pspell-5.2.5-14.5mdv2008.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.1", reference:"php-readline-5.2.5-14.5mdv2008.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.1", reference:"php-recode-5.2.5-14.5mdv2008.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.1", reference:"php-session-5.2.5-14.5mdv2008.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.1", reference:"php-shmop-5.2.5-14.5mdv2008.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.1", reference:"php-snmp-5.2.5-14.5mdv2008.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.1", reference:"php-soap-5.2.5-14.5mdv2008.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.1", reference:"php-sockets-5.2.5-14.5mdv2008.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.1", reference:"php-sqlite-5.2.5-14.5mdv2008.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.1", reference:"php-sysvmsg-5.2.5-14.5mdv2008.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.1", reference:"php-sysvsem-5.2.5-14.5mdv2008.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.1", reference:"php-sysvshm-5.2.5-14.5mdv2008.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.1", reference:"php-tidy-5.2.5-14.5mdv2008.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.1", reference:"php-tokenizer-5.2.5-14.5mdv2008.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.1", reference:"php-wddx-5.2.5-14.5mdv2008.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.1", reference:"php-xml-5.2.5-14.5mdv2008.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.1", reference:"php-xmlreader-5.2.5-14.5mdv2008.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.1", reference:"php-xmlrpc-5.2.5-14.5mdv2008.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.1", reference:"php-xmlwriter-5.2.5-14.5mdv2008.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.1", reference:"php-xsl-5.2.5-14.5mdv2008.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.1", reference:"php-zlib-5.2.5-14.5mdv2008.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2009.0", cpu:"x86_64", reference:"lib64php5_common5-5.2.6-18.5mdv2009.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2009.0", cpu:"i386", reference:"libphp5_common5-5.2.6-18.5mdv2009.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2009.0", reference:"php-bcmath-5.2.6-18.5mdv2009.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2009.0", reference:"php-bz2-5.2.6-18.5mdv2009.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2009.0", reference:"php-calendar-5.2.6-18.5mdv2009.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2009.0", reference:"php-cgi-5.2.6-18.5mdv2009.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2009.0", reference:"php-cli-5.2.6-18.5mdv2009.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2009.0", reference:"php-ctype-5.2.6-18.5mdv2009.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2009.0", reference:"php-curl-5.2.6-18.5mdv2009.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2009.0", reference:"php-dba-5.2.6-18.5mdv2009.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2009.0", reference:"php-dbase-5.2.6-18.5mdv2009.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2009.0", reference:"php-devel-5.2.6-18.5mdv2009.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2009.0", reference:"php-dom-5.2.6-18.5mdv2009.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2009.0", reference:"php-exif-5.2.6-18.5mdv2009.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2009.0", reference:"php-fcgi-5.2.6-18.5mdv2009.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2009.0", reference:"php-filter-5.2.6-18.5mdv2009.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2009.0", reference:"php-ftp-5.2.6-18.5mdv2009.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2009.0", reference:"php-gd-5.2.6-18.5mdv2009.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2009.0", reference:"php-gettext-5.2.6-18.5mdv2009.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2009.0", reference:"php-gmp-5.2.6-18.5mdv2009.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2009.0", reference:"php-hash-5.2.6-18.5mdv2009.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2009.0", reference:"php-iconv-5.2.6-18.5mdv2009.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2009.0", reference:"php-imap-5.2.6-18.5mdv2009.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2009.0", reference:"php-json-5.2.6-18.5mdv2009.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2009.0", reference:"php-ldap-5.2.6-18.5mdv2009.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2009.0", reference:"php-mbstring-5.2.6-18.5mdv2009.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2009.0", reference:"php-mcrypt-5.2.6-18.5mdv2009.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2009.0", reference:"php-mhash-5.2.6-18.5mdv2009.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2009.0", reference:"php-mime_magic-5.2.6-18.5mdv2009.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2009.0", reference:"php-ming-5.2.6-18.5mdv2009.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2009.0", reference:"php-mssql-5.2.6-18.5mdv2009.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2009.0", reference:"php-mysql-5.2.6-18.5mdv2009.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2009.0", reference:"php-mysqli-5.2.6-18.5mdv2009.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2009.0", reference:"php-ncurses-5.2.6-18.5mdv2009.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2009.0", reference:"php-odbc-5.2.6-18.5mdv2009.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2009.0", reference:"php-openssl-5.2.6-18.5mdv2009.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2009.0", reference:"php-pcntl-5.2.6-18.5mdv2009.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2009.0", reference:"php-pdo-5.2.6-18.5mdv2009.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2009.0", reference:"php-pdo_dblib-5.2.6-18.5mdv2009.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2009.0", reference:"php-pdo_mysql-5.2.6-18.5mdv2009.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2009.0", reference:"php-pdo_odbc-5.2.6-18.5mdv2009.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2009.0", reference:"php-pdo_pgsql-5.2.6-18.5mdv2009.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2009.0", reference:"php-pdo_sqlite-5.2.6-18.5mdv2009.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2009.0", reference:"php-pgsql-5.2.6-18.5mdv2009.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2009.0", reference:"php-posix-5.2.6-18.5mdv2009.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2009.0", reference:"php-pspell-5.2.6-18.5mdv2009.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2009.0", reference:"php-readline-5.2.6-18.5mdv2009.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2009.0", reference:"php-recode-5.2.6-18.5mdv2009.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2009.0", reference:"php-session-5.2.6-18.5mdv2009.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2009.0", reference:"php-shmop-5.2.6-18.5mdv2009.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2009.0", reference:"php-snmp-5.2.6-18.5mdv2009.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2009.0", reference:"php-soap-5.2.6-18.5mdv2009.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2009.0", reference:"php-sockets-5.2.6-18.5mdv2009.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2009.0", reference:"php-sqlite-5.2.6-18.5mdv2009.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2009.0", reference:"php-sybase-5.2.6-18.5mdv2009.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2009.0", reference:"php-sysvmsg-5.2.6-18.5mdv2009.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2009.0", reference:"php-sysvsem-5.2.6-18.5mdv2009.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2009.0", reference:"php-sysvshm-5.2.6-18.5mdv2009.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2009.0", reference:"php-tidy-5.2.6-18.5mdv2009.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2009.0", reference:"php-tokenizer-5.2.6-18.5mdv2009.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2009.0", reference:"php-wddx-5.2.6-18.5mdv2009.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2009.0", reference:"php-xml-5.2.6-18.5mdv2009.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2009.0", reference:"php-xmlreader-5.2.6-18.5mdv2009.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2009.0", reference:"php-xmlrpc-5.2.6-18.5mdv2009.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2009.0", reference:"php-xmlwriter-5.2.6-18.5mdv2009.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2009.0", reference:"php-xsl-5.2.6-18.5mdv2009.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2009.0", reference:"php-zlib-5.2.6-18.5mdv2009.0", yank:"mdv")) flag++; if (flag) { if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get()); else security_warning(0); exit(0); } else audit(AUDIT_HOST_NOT, "affected");
NASL family MacOS X Local Security Checks NASL id MACOSX_SECUPD2009-005.NASL description The remote host is running a version of Mac OS X 10.5 or 10.4 that does not have Security Update 2009-005 applied. This security update contains fixes for the following products : - Alias Manager - CarbonCore - ClamAV - ColorSync - CoreGraphics - CUPS - Flash Player plug-in - ImageIO - Launch Services - MySQL - PHP - SMB - Wiki Server last seen 2020-06-01 modified 2020-06-02 plugin id 40945 published 2009-09-11 reporter This script is Copyright (C) 2009-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/40945 title Mac OS X Multiple Vulnerabilities (Security Update 2009-005) code # # (C) Tenable Network Security, Inc. # if (!defined_func("bn_random")) exit(0); if (NASL_LEVEL < 3004) exit(0); include("compat.inc"); if (description) { script_id(40945); script_version("1.21"); script_cvs_date("Date: 2018/07/14 1:59:35"); script_cve_id("CVE-2008-2079", "CVE-2008-5498", "CVE-2008-6680", "CVE-2009-0590", "CVE-2009-0591", "CVE-2009-0789", "CVE-2009-0949", "CVE-2009-1241", "CVE-2009-1270", "CVE-2009-1271", "CVE-2009-1272", "CVE-2009-1371", "CVE-2009-1372", "CVE-2009-1862", "CVE-2009-1863", "CVE-2009-1864", "CVE-2009-1865", "CVE-2009-1866", "CVE-2009-1867", "CVE-2009-1868", "CVE-2009-1869", "CVE-2009-1870", "CVE-2009-2468", "CVE-2009-2800", "CVE-2009-2803", "CVE-2009-2804", "CVE-2009-2805", "CVE-2009-2807", "CVE-2009-2809", "CVE-2009-2811", "CVE-2009-2812", "CVE-2009-2813", "CVE-2009-2814"); script_bugtraq_id( 29106, 33002, 34256, 34357, 35759, 36350, 36354, 36355, 36357, 36358, 36359, 36360, 36361, 36363, 36364 ); script_name(english:"Mac OS X Multiple Vulnerabilities (Security Update 2009-005)"); script_summary(english:"Check for the presence of Security Update 2009-005"); script_set_attribute( attribute:"synopsis", value: "The remote host is missing a Mac OS X update that fixes various security issues." ); script_set_attribute( attribute:"description", value: "The remote host is running a version of Mac OS X 10.5 or 10.4 that does not have Security Update 2009-005 applied. This security update contains fixes for the following products : - Alias Manager - CarbonCore - ClamAV - ColorSync - CoreGraphics - CUPS - Flash Player plug-in - ImageIO - Launch Services - MySQL - PHP - SMB - Wiki Server" ); script_set_attribute( attribute:"see_also", value:"http://support.apple.com/kb/HT3865" ); script_set_attribute( attribute:"see_also", value:"http://lists.apple.com/archives/security-announce/2009/Sep/msg00004.html" ); script_set_attribute( attribute:"see_also", value:"http://www.securityfocus.com/advisories/17867" ); script_set_attribute( attribute:"solution", value:"Install Security Update 2009-005 or later." ); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C"); script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available"); script_set_attribute(attribute:"exploit_available", value:"true"); script_set_attribute(attribute:"exploit_framework_core", value:"true"); script_set_attribute(attribute:"exploited_by_malware", value:"true"); script_set_attribute(attribute:"exploit_framework_canvas", value:"true"); script_set_attribute(attribute:"canvas_package", value:'CANVAS'); script_cwe_id(20, 59, 79, 94, 119, 189, 200, 264, 287, 399); script_set_attribute(attribute:"patch_publication_date", value:"2009/09/10"); script_set_attribute(attribute:"plugin_publication_date", value:"2009/09/11"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/o:apple:mac_os_x"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_family(english:"MacOS X Local Security Checks"); script_copyright(english:"This script is Copyright (C) 2009-2018 Tenable Network Security, Inc."); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/MacOSX/packages", "Host/uname"); exit(0); } # uname = get_kb_item("Host/uname"); if (!uname) exit(1, "The 'Host/uname' KB item is missing."); if (egrep(pattern:"Darwin.* (8\.[0-9]\.|8\.1[01]\.)", string:uname)) { packages = get_kb_item("Host/MacOSX/packages"); if (!packages) exit(1, "The 'Host/MacOSX/packages' KB item is missing."); if (egrep(pattern:"^SecUpd(Srvr)?(2009-00[5-9]|20[1-9][0-9]-)", string:packages)) exit(0, "The host has Security Update 2009-005 or later installed and therefore is not affected."); else security_hole(0); } else if (egrep(pattern:"Darwin.* (9\.[0-8]\.)", string:uname)) { packages = get_kb_item("Host/MacOSX/packages/boms"); if (!packages) exit(1, "The 'Host/MacOSX/packages/boms' KB item is missing."); if (egrep(pattern:"^com\.apple\.pkg\.update\.security\.(2009\.00[5-9]|20[1-9][0-9]\.[0-9]+)\.bom", string:packages)) exit(0, "The host has Security Update 2009-005 or later installed and therefore is not affected."); else security_hole(0); } else exit(0, "The host is not affected.");
NASL family SuSE Local Security Checks NASL id SUSE_11_APACHE2-MOD_PHP5-090618.NASL description This update fixes the JSON parser (CVE-2009-1271) and the zip packer code (CVE-2009-1272) in php5. Both bugs can lead to a remote denial of service attack. last seen 2020-06-01 modified 2020-06-02 plugin id 41369 published 2009-09-24 reporter This script is Copyright (C) 2009-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/41369 title SuSE 11 Security Update : PHP5 (SAT Patch Number 1015) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from SuSE 11 update information. The text itself is # copyright (C) Novell, Inc. # include("compat.inc"); if (description) { script_id(41369); script_version("1.10"); script_cvs_date("Date: 2019/10/25 13:36:35"); script_cve_id("CVE-2009-1271", "CVE-2009-1272"); script_name(english:"SuSE 11 Security Update : PHP5 (SAT Patch Number 1015)"); script_summary(english:"Checks rpm output for the updated packages"); script_set_attribute( attribute:"synopsis", value:"The remote SuSE 11 host is missing one or more security updates." ); script_set_attribute( attribute:"description", value: "This update fixes the JSON parser (CVE-2009-1271) and the zip packer code (CVE-2009-1272) in php5. Both bugs can lead to a remote denial of service attack." ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.novell.com/show_bug.cgi?id=493122" ); script_set_attribute( attribute:"see_also", value:"http://support.novell.com/security/cve/CVE-2009-1271.html" ); script_set_attribute( attribute:"see_also", value:"http://support.novell.com/security/cve/CVE-2009-1272.html" ); script_set_attribute(attribute:"solution", value:"Apply SAT patch number 1015."); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P"); script_cwe_id(20); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:apache2-mod_php5"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:php5"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:php5-bcmath"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:php5-bz2"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:php5-calendar"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:php5-ctype"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:php5-curl"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:php5-dba"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:php5-dbase"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:php5-dom"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:php5-exif"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:php5-fastcgi"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:php5-ftp"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:php5-gd"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:php5-gettext"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:php5-gmp"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:php5-hash"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:php5-iconv"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:php5-json"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:php5-ldap"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:php5-mbstring"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:php5-mcrypt"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:php5-mysql"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:php5-odbc"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:php5-openssl"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:php5-pcntl"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:php5-pdo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:php5-pear"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:php5-pgsql"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:php5-pspell"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:php5-shmop"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:php5-snmp"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:php5-soap"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:php5-suhosin"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:php5-sysvmsg"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:php5-sysvsem"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:php5-sysvshm"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:php5-tokenizer"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:php5-wddx"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:php5-xmlreader"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:php5-xmlrpc"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:php5-xmlwriter"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:php5-xsl"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:php5-zip"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:php5-zlib"); script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:suse_linux:11"); script_set_attribute(attribute:"patch_publication_date", value:"2009/06/18"); script_set_attribute(attribute:"plugin_publication_date", value:"2009/09/24"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2009-2019 Tenable Network Security, Inc."); script_family(english:"SuSE Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/SuSE/release"); if (isnull(release) || release !~ "^(SLED|SLES)11") audit(AUDIT_OS_NOT, "SuSE 11"); if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if (cpu !~ "^i[3-6]86$" && "x86_64" >!< cpu && "s390x" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "SuSE 11", cpu); pl = get_kb_item("Host/SuSE/patchlevel"); if (pl) audit(AUDIT_OS_NOT, "SuSE 11.0"); flag = 0; if (rpm_check(release:"SLES11", sp:0, reference:"apache2-mod_php5-5.2.6-50.19.1")) flag++; if (rpm_check(release:"SLES11", sp:0, reference:"php5-5.2.6-50.19.1")) flag++; if (rpm_check(release:"SLES11", sp:0, reference:"php5-bcmath-5.2.6-50.19.1")) flag++; if (rpm_check(release:"SLES11", sp:0, reference:"php5-bz2-5.2.6-50.19.1")) flag++; if (rpm_check(release:"SLES11", sp:0, reference:"php5-calendar-5.2.6-50.19.1")) flag++; if (rpm_check(release:"SLES11", sp:0, reference:"php5-ctype-5.2.6-50.19.1")) flag++; if (rpm_check(release:"SLES11", sp:0, reference:"php5-curl-5.2.6-50.19.1")) flag++; if (rpm_check(release:"SLES11", sp:0, reference:"php5-dba-5.2.6-50.19.1")) flag++; if (rpm_check(release:"SLES11", sp:0, reference:"php5-dbase-5.2.6-50.19.1")) flag++; if (rpm_check(release:"SLES11", sp:0, reference:"php5-dom-5.2.6-50.19.1")) flag++; if (rpm_check(release:"SLES11", sp:0, reference:"php5-exif-5.2.6-50.19.1")) flag++; if (rpm_check(release:"SLES11", sp:0, reference:"php5-fastcgi-5.2.6-50.19.1")) flag++; if (rpm_check(release:"SLES11", sp:0, reference:"php5-ftp-5.2.6-50.19.1")) flag++; if (rpm_check(release:"SLES11", sp:0, reference:"php5-gd-5.2.6-50.19.1")) flag++; if (rpm_check(release:"SLES11", sp:0, reference:"php5-gettext-5.2.6-50.19.1")) flag++; if (rpm_check(release:"SLES11", sp:0, reference:"php5-gmp-5.2.6-50.19.1")) flag++; if (rpm_check(release:"SLES11", sp:0, reference:"php5-hash-5.2.6-50.19.1")) flag++; if (rpm_check(release:"SLES11", sp:0, reference:"php5-iconv-5.2.6-50.19.1")) flag++; if (rpm_check(release:"SLES11", sp:0, reference:"php5-json-5.2.6-50.19.1")) flag++; if (rpm_check(release:"SLES11", sp:0, reference:"php5-ldap-5.2.6-50.19.1")) flag++; if (rpm_check(release:"SLES11", sp:0, reference:"php5-mbstring-5.2.6-50.19.1")) flag++; if (rpm_check(release:"SLES11", sp:0, reference:"php5-mcrypt-5.2.6-50.19.1")) flag++; if (rpm_check(release:"SLES11", sp:0, reference:"php5-mysql-5.2.6-50.19.1")) flag++; if (rpm_check(release:"SLES11", sp:0, reference:"php5-odbc-5.2.6-50.19.1")) flag++; if (rpm_check(release:"SLES11", sp:0, reference:"php5-openssl-5.2.6-50.19.1")) flag++; if (rpm_check(release:"SLES11", sp:0, reference:"php5-pcntl-5.2.6-50.19.1")) flag++; if (rpm_check(release:"SLES11", sp:0, reference:"php5-pdo-5.2.6-50.19.1")) flag++; if (rpm_check(release:"SLES11", sp:0, reference:"php5-pear-5.2.6-50.19.1")) flag++; if (rpm_check(release:"SLES11", sp:0, reference:"php5-pgsql-5.2.6-50.19.1")) flag++; if (rpm_check(release:"SLES11", sp:0, reference:"php5-pspell-5.2.6-50.19.1")) flag++; if (rpm_check(release:"SLES11", sp:0, reference:"php5-shmop-5.2.6-50.19.1")) flag++; if (rpm_check(release:"SLES11", sp:0, reference:"php5-snmp-5.2.6-50.19.1")) flag++; if (rpm_check(release:"SLES11", sp:0, reference:"php5-soap-5.2.6-50.19.1")) flag++; if (rpm_check(release:"SLES11", sp:0, reference:"php5-suhosin-5.2.6-50.19.1")) flag++; if (rpm_check(release:"SLES11", sp:0, reference:"php5-sysvmsg-5.2.6-50.19.1")) flag++; if (rpm_check(release:"SLES11", sp:0, reference:"php5-sysvsem-5.2.6-50.19.1")) flag++; if (rpm_check(release:"SLES11", sp:0, reference:"php5-sysvshm-5.2.6-50.19.1")) flag++; if (rpm_check(release:"SLES11", sp:0, reference:"php5-tokenizer-5.2.6-50.19.1")) flag++; if (rpm_check(release:"SLES11", sp:0, reference:"php5-wddx-5.2.6-50.19.1")) flag++; if (rpm_check(release:"SLES11", sp:0, reference:"php5-xmlreader-5.2.6-50.19.1")) flag++; if (rpm_check(release:"SLES11", sp:0, reference:"php5-xmlrpc-5.2.6-50.19.1")) flag++; if (rpm_check(release:"SLES11", sp:0, reference:"php5-xmlwriter-5.2.6-50.19.1")) flag++; if (rpm_check(release:"SLES11", sp:0, reference:"php5-xsl-5.2.6-50.19.1")) flag++; if (rpm_check(release:"SLES11", sp:0, reference:"php5-zip-5.2.6-50.19.1")) flag++; if (rpm_check(release:"SLES11", sp:0, reference:"php5-zlib-5.2.6-50.19.1")) flag++; if (flag) { if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get()); else security_warning(0); exit(0); } else audit(AUDIT_HOST_NOT, "affected");
NASL family SuSE Local Security Checks NASL id SUSE_APACHE2-MOD_PHP5-6311.NASL description This update fixes the JSON parser (CVE-2009-1271) and the zip packer code (CVE-2009-1272) in php5. Both bugs can lead to a remote denial of service attack. last seen 2020-06-01 modified 2020-06-02 plugin id 41477 published 2009-09-24 reporter This script is Copyright (C) 2009-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/41477 title SuSE 10 Security Update : PHP5 (ZYPP Patch Number 6311) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The text description of this plugin is (C) Novell, Inc. # include("compat.inc"); if (description) { script_id(41477); script_version ("1.9"); script_cvs_date("Date: 2019/10/25 13:36:36"); script_cve_id("CVE-2009-1271", "CVE-2009-1272"); script_name(english:"SuSE 10 Security Update : PHP5 (ZYPP Patch Number 6311)"); script_summary(english:"Checks rpm output for the updated packages"); script_set_attribute( attribute:"synopsis", value:"The remote SuSE 10 host is missing a security-related patch." ); script_set_attribute( attribute:"description", value: "This update fixes the JSON parser (CVE-2009-1271) and the zip packer code (CVE-2009-1272) in php5. Both bugs can lead to a remote denial of service attack." ); script_set_attribute( attribute:"see_also", value:"http://support.novell.com/security/cve/CVE-2009-1271.html" ); script_set_attribute( attribute:"see_also", value:"http://support.novell.com/security/cve/CVE-2009-1272.html" ); script_set_attribute(attribute:"solution", value:"Apply ZYPP patch number 6311."); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P"); script_cwe_id(20); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/o:suse:suse_linux"); script_set_attribute(attribute:"patch_publication_date", value:"2009/06/17"); script_set_attribute(attribute:"plugin_publication_date", value:"2009/09/24"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2009-2019 Tenable Network Security, Inc."); script_family(english:"SuSE Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list"); exit(0); } include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) exit(0, "Local checks are not enabled."); if (!get_kb_item("Host/SuSE/release")) exit(0, "The host is not running SuSE."); if (!get_kb_item("Host/SuSE/rpm-list")) exit(1, "Could not obtain the list of installed packages."); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) exit(1, "Failed to determine the architecture type."); if (cpu >!< "x86_64" && cpu !~ "^i[3-6]86$") exit(1, "Local checks for SuSE 10 on the '"+cpu+"' architecture have not been implemented."); flag = 0; if (rpm_check(release:"SLES10", sp:2, reference:"apache2-mod_php5-5.2.5-9.18")) flag++; if (rpm_check(release:"SLES10", sp:2, reference:"php5-5.2.5-9.18")) flag++; if (rpm_check(release:"SLES10", sp:2, reference:"php5-bcmath-5.2.5-9.18")) flag++; if (rpm_check(release:"SLES10", sp:2, reference:"php5-bz2-5.2.5-9.18")) flag++; if (rpm_check(release:"SLES10", sp:2, reference:"php5-calendar-5.2.5-9.18")) flag++; if (rpm_check(release:"SLES10", sp:2, reference:"php5-ctype-5.2.5-9.18")) flag++; if (rpm_check(release:"SLES10", sp:2, reference:"php5-curl-5.2.5-9.18")) flag++; if (rpm_check(release:"SLES10", sp:2, reference:"php5-dba-5.2.5-9.18")) flag++; if (rpm_check(release:"SLES10", sp:2, reference:"php5-dbase-5.2.5-9.18")) flag++; if (rpm_check(release:"SLES10", sp:2, reference:"php5-devel-5.2.5-9.18")) flag++; if (rpm_check(release:"SLES10", sp:2, reference:"php5-dom-5.2.5-9.18")) flag++; if (rpm_check(release:"SLES10", sp:2, reference:"php5-exif-5.2.5-9.18")) flag++; if (rpm_check(release:"SLES10", sp:2, reference:"php5-fastcgi-5.2.5-9.18")) flag++; if (rpm_check(release:"SLES10", sp:2, reference:"php5-ftp-5.2.5-9.18")) flag++; if (rpm_check(release:"SLES10", sp:2, reference:"php5-gd-5.2.5-9.18")) flag++; if (rpm_check(release:"SLES10", sp:2, reference:"php5-gettext-5.2.5-9.18")) flag++; if (rpm_check(release:"SLES10", sp:2, reference:"php5-gmp-5.2.5-9.18")) flag++; if (rpm_check(release:"SLES10", sp:2, reference:"php5-iconv-5.2.5-9.18")) flag++; if (rpm_check(release:"SLES10", sp:2, reference:"php5-imap-5.2.5-9.18")) flag++; if (rpm_check(release:"SLES10", sp:2, reference:"php5-json-5.2.5-9.18")) flag++; if (rpm_check(release:"SLES10", sp:2, reference:"php5-ldap-5.2.5-9.18")) flag++; if (rpm_check(release:"SLES10", sp:2, reference:"php5-mbstring-5.2.5-9.18")) flag++; if (rpm_check(release:"SLES10", sp:2, reference:"php5-mcrypt-5.2.5-9.18")) flag++; if (rpm_check(release:"SLES10", sp:2, reference:"php5-mhash-5.2.5-9.18")) flag++; if (rpm_check(release:"SLES10", sp:2, reference:"php5-mysql-5.2.5-9.18")) flag++; if (rpm_check(release:"SLES10", sp:2, reference:"php5-ncurses-5.2.5-9.18")) flag++; if (rpm_check(release:"SLES10", sp:2, reference:"php5-odbc-5.2.5-9.18")) flag++; if (rpm_check(release:"SLES10", sp:2, reference:"php5-openssl-5.2.5-9.18")) flag++; if (rpm_check(release:"SLES10", sp:2, reference:"php5-pcntl-5.2.5-9.18")) flag++; if (rpm_check(release:"SLES10", sp:2, reference:"php5-pdo-5.2.5-9.18")) flag++; if (rpm_check(release:"SLES10", sp:2, reference:"php5-pear-5.2.5-9.18")) flag++; if (rpm_check(release:"SLES10", sp:2, reference:"php5-pgsql-5.2.5-9.18")) flag++; if (rpm_check(release:"SLES10", sp:2, reference:"php5-posix-5.2.5-9.18")) flag++; if (rpm_check(release:"SLES10", sp:2, reference:"php5-pspell-5.2.5-9.18")) flag++; if (rpm_check(release:"SLES10", sp:2, reference:"php5-shmop-5.2.5-9.18")) flag++; if (rpm_check(release:"SLES10", sp:2, reference:"php5-snmp-5.2.5-9.18")) flag++; if (rpm_check(release:"SLES10", sp:2, reference:"php5-soap-5.2.5-9.18")) flag++; if (rpm_check(release:"SLES10", sp:2, reference:"php5-sockets-5.2.5-9.18")) flag++; if (rpm_check(release:"SLES10", sp:2, reference:"php5-sqlite-5.2.5-9.18")) flag++; if (rpm_check(release:"SLES10", sp:2, reference:"php5-suhosin-5.2.5-9.18")) flag++; if (rpm_check(release:"SLES10", sp:2, reference:"php5-sysvmsg-5.2.5-9.18")) flag++; if (rpm_check(release:"SLES10", sp:2, reference:"php5-sysvsem-5.2.5-9.18")) flag++; if (rpm_check(release:"SLES10", sp:2, reference:"php5-sysvshm-5.2.5-9.18")) flag++; if (rpm_check(release:"SLES10", sp:2, reference:"php5-tokenizer-5.2.5-9.18")) flag++; if (rpm_check(release:"SLES10", sp:2, reference:"php5-wddx-5.2.5-9.18")) flag++; if (rpm_check(release:"SLES10", sp:2, reference:"php5-xmlreader-5.2.5-9.18")) flag++; if (rpm_check(release:"SLES10", sp:2, reference:"php5-xmlrpc-5.2.5-9.18")) flag++; if (rpm_check(release:"SLES10", sp:2, reference:"php5-xsl-5.2.5-9.18")) flag++; if (rpm_check(release:"SLES10", sp:2, reference:"php5-zlib-5.2.5-9.18")) flag++; if (flag) { if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get()); else security_warning(0); exit(0); } else exit(0, "The host is not affected.");
NASL family CGI abuses NASL id PHP_5_2_9.NASL description According to its banner, the version of PHP installed on the remote host is older than 5.2.9. Such versions may be affected by several security issues : - Background color is not correctly validated with a non true color image in function last seen 2020-06-01 modified 2020-06-02 plugin id 35750 published 2009-02-27 reporter This script is Copyright (C) 2009-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/35750 title PHP < 5.2.9 Multiple Vulnerabilities code # # (C) Tenable Network Security, Inc. # include("compat.inc"); if (description) { script_id(35750); script_version("1.13"); script_cvs_date("Date: 2018/07/24 18:56:10"); script_cve_id("CVE-2008-5498", "CVE-2009-1271", "CVE-2009-1272"); script_bugtraq_id(33002, 33927); script_xref(name:"Secunia", value:"34081"); script_name(english:"PHP < 5.2.9 Multiple Vulnerabilities"); script_summary(english:"Checks version of PHP"); script_set_attribute( attribute:"synopsis", value: "The remote web server uses a version of PHP that is affected by multiple flaws." ); script_set_attribute( attribute:"description", value: "According to its banner, the version of PHP installed on the remote host is older than 5.2.9. Such versions may be affected by several security issues : - Background color is not correctly validated with a non true color image in function 'imagerotate()'. (CVE-2008-5498) - A denial of service condition can be triggered by trying to extract zip files that contain files with relative paths in file or directory names. - Function 'explode()' is affected by an unspecified vulnerability. - It may be possible to trigger a segfault by passing a specially crafted string to function 'json_decode()'. - Function 'xml_error_string()' is affected by a flaw which results in messages being off by one." ); script_set_attribute(attribute:"see_also", value: "http://news.php.net/php.internals/42762"); script_set_attribute(attribute:"see_also", value: "http://www.php.net/releases/5_2_9.php"); script_set_attribute(attribute:"see_also", value: "http://www.php.net/ChangeLog-5.php#5.2.9"); script_set_attribute(attribute:"solution", value: "Upgrade to PHP version 5.2.9 or later."); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P"); script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required"); script_set_attribute(attribute:"exploit_available", value:"false"); script_cwe_id(20, 200); script_set_attribute(attribute:"patch_publication_date", value:"2009/02/26"); script_set_attribute(attribute:"plugin_publication_date", value:"2009/02/27"); script_set_attribute(attribute:"plugin_type", value:"remote"); script_set_attribute(attribute:"cpe", value:"cpe:/a:php:php"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_family(english:"CGI abuses"); script_copyright(english:"This script is Copyright (C) 2009-2018 Tenable Network Security, Inc."); script_dependencies("php_version.nasl"); script_require_ports("Services/www", 80); script_require_keys("www/PHP"); exit(0); } include("global_settings.inc"); include('misc_func.inc'); include("http.inc"); include("audit.inc"); include("webapp_func.inc"); port = get_http_port(default:80, php:TRUE); php = get_php_from_kb( port : port, exit_on_fail : TRUE ); version = php["ver"]; source = php["src"]; backported = get_kb_item('www/php/'+port+'/'+version+'/backported'); if (report_paranoia < 2 && backported) audit(AUDIT_BACKPORT_SERVICE, port, "PHP "+version+" install"); if (version =~ "^[0-4]\." || version =~ "^5\.[01]\." || version =~ "^5\.2\.[0-8]($|[^0-9])" ) { if (report_verbosity > 0) { report = '\n Version source : '+source + '\n Installed version : '+version+ '\n Fixed version : 5.2.9\n'; security_warning(port:port, extra:report); } else security_warning(port); exit(0); } else audit(AUDIT_LISTEN_NOT_VULN, "PHP", port, version);
NASL family Mandriva Local Security Checks NASL id MANDRIVA_MDVSA-2009-324.NASL description Multiple vulnerabilities was discovered and corrected in php : The dba_replace function in PHP 5.2.6 and 4.x allows context-dependent attackers to cause a denial of service (file truncation) via a key with the NULL byte. NOTE: this might only be a vulnerability in limited circumstances in which the attacker can modify or add database entries but does not have permissions to truncate the file (CVE-2008-7068). The JSON_parser function (ext/json/JSON_parser.c) in PHP 5.2.x before 5.2.9 allows remote attackers to cause a denial of service (segmentation fault) via a malformed string to the json_decode API function (CVE-2009-1271). - Fixed upstream bug #48378 (exif_read_data() segfaults on certain corrupted .jpeg files) (CVE-2009-2687). The php_openssl_apply_verification_policy function in PHP before 5.2.11 does not properly perform certificate validation, which has unknown impact and attack vectors, probably related to an ability to spoof certificates (CVE-2009-3291). Unspecified vulnerability in PHP before 5.2.11 has unknown impact and attack vectors related to missing sanity checks around exif processing. (CVE-2009-3292) Unspecified vulnerability in the imagecolortransparent function in PHP before 5.2.11 has unknown impact and attack vectors related to an incorrect sanity check for the color index. (CVE-2009-3293) The _gdGetColors function in gd_gd.c in PHP 5.2.11 and 5.3.0, and the GD Graphics Library 2.x, does not properly verify a certain colorsTotal structure member, which might allow remote attackers to conduct buffer overflow or buffer over-read attacks via a crafted GD file, a different vulnerability than CVE-2009-3293. NOTE: some of these details are obtained from third-party information (CVE-2009-3546). The tempnam function in ext/standard/file.c in PHP 5.2.11 and earlier, and 5.3.x before 5.3.1, allows context-dependent attackers to bypass safe_mode restrictions, and create files in group-writable or world-writable directories, via the dir and prefix arguments (CVE-2009-3557). The posix_mkfifo function in ext/posix/posix.c in PHP 5.2.11 and earlier, and 5.3.x before 5.3.1, allows context-dependent attackers to bypass open_basedir restrictions, and create FIFO files, via the pathname and mode arguments, as demonstrated by creating a .htaccess file (CVE-2009-3558). PHP 5.2.11, and 5.3.x before 5.3.1, does not restrict the number of temporary files created when handling a multipart/form-data POST request, which allows remote attackers to cause a denial of service (resource exhaustion), and makes it easier for remote attackers to exploit local file inclusion vulnerabilities, via multiple requests, related to lack of support for the max_file_uploads directive (CVE-2009-4017). The proc_open function in ext/standard/proc_open.c in PHP before 5.2.11 and 5.3.x before 5.3.1 does not enforce the (1) safe_mode_allowed_env_vars and (2) safe_mode_protected_env_vars directives, which allows context-dependent attackers to execute programs with an arbitrary environment via the env parameter, as demonstrated by a crafted value of the LD_LIBRARY_PATH environment variable (CVE-2009-4018). The dba_replace function in PHP 5.2.6 and 4.x allows context-dependent attackers to cause a denial of service (file truncation) via a key with the NULL byte. NOTE: this might only be a vulnerability in limited circumstances in which the attacker can modify or add database entries but does not have permissions to truncate the file (CVE-2008-7068). The php_openssl_apply_verification_policy function in PHP before 5.2.11 does not properly perform certificate validation, which has unknown impact and attack vectors, probably related to an ability to spoof certificates (CVE-2009-3291). Unspecified vulnerability in PHP before 5.2.11 has unknown impact and attack vectors related to missing sanity checks around exif processing. (CVE-2009-3292) Unspecified vulnerability in the imagecolortransparent function in PHP before 5.2.11 has unknown impact and attack vectors related to an incorrect sanity check for the color index. (CVE-2009-3293). However in Mandriva we don last seen 2020-06-01 modified 2020-06-02 plugin id 43043 published 2009-12-08 reporter This script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/43043 title Mandriva Linux Security Advisory : php (MDVSA-2009:324) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Mandriva Linux Security Advisory MDVSA-2009:324. # The text itself is copyright (C) Mandriva S.A. # if (NASL_LEVEL < 3000) exit(0); include("compat.inc"); if (description) { script_id(43043); script_version("1.19"); script_cvs_date("Date: 2019/08/02 13:32:52"); script_cve_id("CVE-2008-7068", "CVE-2009-1271", "CVE-2009-2687", "CVE-2009-3291", "CVE-2009-3292", "CVE-2009-3293", "CVE-2009-3546", "CVE-2009-3557", "CVE-2009-3558", "CVE-2009-4017", "CVE-2009-4018"); script_bugtraq_id(35440, 36449, 36712, 37079, 37138); script_xref(name:"MDVSA", value:"2009:324"); script_name(english:"Mandriva Linux Security Advisory : php (MDVSA-2009:324)"); script_summary(english:"Checks rpm output for the updated packages"); script_set_attribute( attribute:"synopsis", value: "The remote Mandriva Linux host is missing one or more security updates." ); script_set_attribute( attribute:"description", value: "Multiple vulnerabilities was discovered and corrected in php : The dba_replace function in PHP 5.2.6 and 4.x allows context-dependent attackers to cause a denial of service (file truncation) via a key with the NULL byte. NOTE: this might only be a vulnerability in limited circumstances in which the attacker can modify or add database entries but does not have permissions to truncate the file (CVE-2008-7068). The JSON_parser function (ext/json/JSON_parser.c) in PHP 5.2.x before 5.2.9 allows remote attackers to cause a denial of service (segmentation fault) via a malformed string to the json_decode API function (CVE-2009-1271). - Fixed upstream bug #48378 (exif_read_data() segfaults on certain corrupted .jpeg files) (CVE-2009-2687). The php_openssl_apply_verification_policy function in PHP before 5.2.11 does not properly perform certificate validation, which has unknown impact and attack vectors, probably related to an ability to spoof certificates (CVE-2009-3291). Unspecified vulnerability in PHP before 5.2.11 has unknown impact and attack vectors related to missing sanity checks around exif processing. (CVE-2009-3292) Unspecified vulnerability in the imagecolortransparent function in PHP before 5.2.11 has unknown impact and attack vectors related to an incorrect sanity check for the color index. (CVE-2009-3293) The _gdGetColors function in gd_gd.c in PHP 5.2.11 and 5.3.0, and the GD Graphics Library 2.x, does not properly verify a certain colorsTotal structure member, which might allow remote attackers to conduct buffer overflow or buffer over-read attacks via a crafted GD file, a different vulnerability than CVE-2009-3293. NOTE: some of these details are obtained from third-party information (CVE-2009-3546). The tempnam function in ext/standard/file.c in PHP 5.2.11 and earlier, and 5.3.x before 5.3.1, allows context-dependent attackers to bypass safe_mode restrictions, and create files in group-writable or world-writable directories, via the dir and prefix arguments (CVE-2009-3557). The posix_mkfifo function in ext/posix/posix.c in PHP 5.2.11 and earlier, and 5.3.x before 5.3.1, allows context-dependent attackers to bypass open_basedir restrictions, and create FIFO files, via the pathname and mode arguments, as demonstrated by creating a .htaccess file (CVE-2009-3558). PHP 5.2.11, and 5.3.x before 5.3.1, does not restrict the number of temporary files created when handling a multipart/form-data POST request, which allows remote attackers to cause a denial of service (resource exhaustion), and makes it easier for remote attackers to exploit local file inclusion vulnerabilities, via multiple requests, related to lack of support for the max_file_uploads directive (CVE-2009-4017). The proc_open function in ext/standard/proc_open.c in PHP before 5.2.11 and 5.3.x before 5.3.1 does not enforce the (1) safe_mode_allowed_env_vars and (2) safe_mode_protected_env_vars directives, which allows context-dependent attackers to execute programs with an arbitrary environment via the env parameter, as demonstrated by a crafted value of the LD_LIBRARY_PATH environment variable (CVE-2009-4018). The dba_replace function in PHP 5.2.6 and 4.x allows context-dependent attackers to cause a denial of service (file truncation) via a key with the NULL byte. NOTE: this might only be a vulnerability in limited circumstances in which the attacker can modify or add database entries but does not have permissions to truncate the file (CVE-2008-7068). The php_openssl_apply_verification_policy function in PHP before 5.2.11 does not properly perform certificate validation, which has unknown impact and attack vectors, probably related to an ability to spoof certificates (CVE-2009-3291). Unspecified vulnerability in PHP before 5.2.11 has unknown impact and attack vectors related to missing sanity checks around exif processing. (CVE-2009-3292) Unspecified vulnerability in the imagecolortransparent function in PHP before 5.2.11 has unknown impact and attack vectors related to an incorrect sanity check for the color index. (CVE-2009-3293). However in Mandriva we don't use the bundled libgd source in php per default, there is a unsupported package in contrib named php-gd-bundled that eventually will get updated to pickup these fixes. The php-suhosin package has been upgraded to 0.9.22 which has better support for apache vhosts. Packages for 2008.0 are provided for Corporate Desktop 2008.0 customers This update provides a solution to these vulnerabilities." ); script_set_attribute(attribute:"solution", value:"Update the affected packages."); script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C"); script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available"); script_set_attribute(attribute:"exploit_available", value:"true"); script_cwe_id(20, 264); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64php5_common5"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libphp5_common5"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-bcmath"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-bz2"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-calendar"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-cgi"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-cli"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-ctype"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-curl"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-dba"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-dbase"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-dom"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-exif"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-fcgi"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-filter"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-ftp"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-gd"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-gettext"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-gmp"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-hash"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-iconv"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-imap"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-ini"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-json"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-ldap"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-mbstring"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-mcrypt"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-mhash"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-mime_magic"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-ming"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-mssql"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-mysql"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-mysqli"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-ncurses"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-odbc"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-openssl"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-pcntl"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-pdo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-pdo_dblib"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-pdo_mysql"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-pdo_odbc"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-pdo_pgsql"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-pdo_sqlite"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-pgsql"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-posix"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-pspell"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-readline"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-recode"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-session"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-shmop"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-simplexml"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-snmp"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-soap"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-sockets"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-sqlite"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-suhosin"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-sysvmsg"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-sysvsem"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-sysvshm"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-tidy"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-tokenizer"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-wddx"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-xml"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-xmlreader"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-xmlrpc"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-xmlwriter"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-xsl"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-zlib"); script_set_attribute(attribute:"cpe", value:"cpe:/o:mandriva:linux:2008.0"); script_set_attribute(attribute:"patch_publication_date", value:"2009/12/07"); script_set_attribute(attribute:"plugin_publication_date", value:"2009/12/08"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"Mandriva Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/Mandrake/release", "Host/Mandrake/rpm-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/Mandrake/release")) audit(AUDIT_OS_NOT, "Mandriva / Mandake Linux"); if (!get_kb_item("Host/Mandrake/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if (cpu !~ "^(amd64|i[3-6]86|x86_64)$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Mandriva / Mandrake Linux", cpu); flag = 0; if (rpm_check(release:"MDK2008.0", cpu:"x86_64", reference:"lib64php5_common5-5.2.4-3.6mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.0", cpu:"i386", reference:"libphp5_common5-5.2.4-3.6mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.0", reference:"php-bcmath-5.2.4-3.6mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.0", reference:"php-bz2-5.2.4-3.6mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.0", reference:"php-calendar-5.2.4-3.6mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.0", reference:"php-cgi-5.2.4-3.6mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.0", reference:"php-cli-5.2.4-3.6mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.0", reference:"php-ctype-5.2.4-3.6mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.0", reference:"php-curl-5.2.4-3.6mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.0", reference:"php-dba-5.2.4-3.6mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.0", reference:"php-dbase-5.2.4-3.6mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.0", reference:"php-devel-5.2.4-3.6mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.0", reference:"php-dom-5.2.4-3.6mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.0", reference:"php-exif-5.2.4-3.6mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.0", reference:"php-fcgi-5.2.4-3.6mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.0", reference:"php-filter-5.2.4-3.6mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.0", reference:"php-ftp-5.2.4-3.6mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.0", reference:"php-gd-5.2.4-3.6mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.0", reference:"php-gettext-5.2.4-3.6mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.0", reference:"php-gmp-5.2.4-3.6mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.0", reference:"php-hash-5.2.4-3.6mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.0", reference:"php-iconv-5.2.4-3.6mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.0", reference:"php-imap-5.2.4-3.6mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.0", reference:"php-ini-5.2.4-1.1mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.0", reference:"php-json-5.2.4-3.6mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.0", reference:"php-ldap-5.2.4-3.6mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.0", reference:"php-mbstring-5.2.4-3.6mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.0", reference:"php-mcrypt-5.2.4-3.6mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.0", reference:"php-mhash-5.2.4-3.6mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.0", reference:"php-mime_magic-5.2.4-3.6mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.0", reference:"php-ming-5.2.4-3.6mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.0", reference:"php-mssql-5.2.4-3.6mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.0", reference:"php-mysql-5.2.4-3.6mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.0", reference:"php-mysqli-5.2.4-3.6mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.0", reference:"php-ncurses-5.2.4-3.6mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.0", reference:"php-odbc-5.2.4-3.6mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.0", reference:"php-openssl-5.2.4-3.6mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.0", reference:"php-pcntl-5.2.4-3.6mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.0", reference:"php-pdo-5.2.4-3.6mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.0", reference:"php-pdo_dblib-5.2.4-3.6mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.0", reference:"php-pdo_mysql-5.2.4-3.6mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.0", reference:"php-pdo_odbc-5.2.4-3.6mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.0", reference:"php-pdo_pgsql-5.2.4-3.6mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.0", reference:"php-pdo_sqlite-5.2.4-3.6mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.0", reference:"php-pgsql-5.2.4-3.6mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.0", reference:"php-posix-5.2.4-3.6mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.0", reference:"php-pspell-5.2.4-3.6mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.0", reference:"php-readline-5.2.4-3.6mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.0", reference:"php-recode-5.2.4-3.6mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.0", reference:"php-session-5.2.4-3.6mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.0", reference:"php-shmop-5.2.4-3.6mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.0", reference:"php-simplexml-5.2.4-3.6mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.0", reference:"php-snmp-5.2.4-3.6mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.0", reference:"php-soap-5.2.4-3.6mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.0", reference:"php-sockets-5.2.4-3.6mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.0", reference:"php-sqlite-5.2.4-3.6mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.0", reference:"php-suhosin-0.9.22-1.1mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.0", reference:"php-sysvmsg-5.2.4-3.6mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.0", reference:"php-sysvsem-5.2.4-3.6mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.0", reference:"php-sysvshm-5.2.4-3.6mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.0", reference:"php-tidy-5.2.4-3.6mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.0", reference:"php-tokenizer-5.2.4-3.6mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.0", reference:"php-wddx-5.2.4-3.6mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.0", reference:"php-xml-5.2.4-3.6mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.0", reference:"php-xmlreader-5.2.4-3.6mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.0", reference:"php-xmlrpc-5.2.4-3.6mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.0", reference:"php-xmlwriter-5.2.4-3.6mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.0", reference:"php-xsl-5.2.4-3.6mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.0", reference:"php-zlib-5.2.4-3.6mdv2008.0", yank:"mdv")) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get()); else security_hole(0); exit(0); } else audit(AUDIT_HOST_NOT, "affected");
NASL family Debian Local Security Checks NASL id DEBIAN_DSA-1789.NASL description Several remote vulnerabilities have been discovered in the PHP 5 hypertext preprocessor. The Common Vulnerabilities and Exposures project identifies the following problems. The following four vulnerabilities have already been fixed in the stable (lenny) version of php5 prior to the release of lenny. This update now addresses them for etch (oldstable) as well : - CVE-2008-2107 / CVE-2008-2108 The GENERATE_SEED macro has several problems that make predicting generated random numbers easier, facilitating attacks against measures that use rand() or mt_rand() as part of a protection. - CVE-2008-5557 A buffer overflow in the mbstring extension allows attackers to execute arbitrary code via a crafted string containing an HTML entity. - CVE-2008-5624 The page_uid and page_gid variables are not correctly set, allowing use of some functionality intended to be restricted to root. - CVE-2008-5658 Directory traversal vulnerability in the ZipArchive::extractTo function allows attackers to write arbitrary files via a ZIP file with a file whose name contains .. (dot dot) sequences. This update also addresses the following three vulnerabilities for both oldstable (etch) and stable (lenny) : - CVE-2008-5814 Cross-site scripting (XSS) vulnerability, when display_errors is enabled, allows remote attackers to inject arbitrary web script or HTML. - CVE-2009-0754 When running on Apache, PHP allows local users to modify behavior of other sites hosted on the same web server by modifying the mbstring.func_overload setting within .htaccess, which causes this setting to be applied to other virtual hosts on the same server. - CVE-2009-1271 The JSON_parser function allows a denial of service (segmentation fault) via a malformed string to the json_decode API function. Furthermore, two updates originally scheduled for the next point update for oldstable are included in the etch package : - Let PHP use the system timezone database instead of the embedded timezone database which is out of date. - From the source tarball, the unused last seen 2020-06-01 modified 2020-06-02 plugin id 38691 published 2009-05-06 reporter This script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/38691 title Debian DSA-1789-1 : php5 - several vulnerabilities code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Debian Security Advisory DSA-1789. The text # itself is copyright (C) Software in the Public Interest, Inc. # include("compat.inc"); if (description) { script_id(38691); script_version("1.16"); script_cvs_date("Date: 2019/08/02 13:32:22"); script_cve_id("CVE-2008-2107", "CVE-2008-2108", "CVE-2008-5557", "CVE-2008-5624", "CVE-2008-5658", "CVE-2008-5814", "CVE-2009-0754", "CVE-2009-1271"); script_bugtraq_id(29009, 32625, 32948, 33542); script_xref(name:"DSA", value:"1789"); script_name(english:"Debian DSA-1789-1 : php5 - several vulnerabilities"); script_summary(english:"Checks dpkg output for the updated package"); script_set_attribute( attribute:"synopsis", value:"The remote Debian host is missing a security-related update." ); script_set_attribute( attribute:"description", value: "Several remote vulnerabilities have been discovered in the PHP 5 hypertext preprocessor. The Common Vulnerabilities and Exposures project identifies the following problems. The following four vulnerabilities have already been fixed in the stable (lenny) version of php5 prior to the release of lenny. This update now addresses them for etch (oldstable) as well : - CVE-2008-2107 / CVE-2008-2108 The GENERATE_SEED macro has several problems that make predicting generated random numbers easier, facilitating attacks against measures that use rand() or mt_rand() as part of a protection. - CVE-2008-5557 A buffer overflow in the mbstring extension allows attackers to execute arbitrary code via a crafted string containing an HTML entity. - CVE-2008-5624 The page_uid and page_gid variables are not correctly set, allowing use of some functionality intended to be restricted to root. - CVE-2008-5658 Directory traversal vulnerability in the ZipArchive::extractTo function allows attackers to write arbitrary files via a ZIP file with a file whose name contains .. (dot dot) sequences. This update also addresses the following three vulnerabilities for both oldstable (etch) and stable (lenny) : - CVE-2008-5814 Cross-site scripting (XSS) vulnerability, when display_errors is enabled, allows remote attackers to inject arbitrary web script or HTML. - CVE-2009-0754 When running on Apache, PHP allows local users to modify behavior of other sites hosted on the same web server by modifying the mbstring.func_overload setting within .htaccess, which causes this setting to be applied to other virtual hosts on the same server. - CVE-2009-1271 The JSON_parser function allows a denial of service (segmentation fault) via a malformed string to the json_decode API function. Furthermore, two updates originally scheduled for the next point update for oldstable are included in the etch package : - Let PHP use the system timezone database instead of the embedded timezone database which is out of date. - From the source tarball, the unused 'dbase' module has been removed which contained licensing problems." ); script_set_attribute( attribute:"see_also", value:"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=507101" ); script_set_attribute( attribute:"see_also", value:"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=507857" ); script_set_attribute( attribute:"see_also", value:"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=508021" ); script_set_attribute( attribute:"see_also", value:"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=511493" ); script_set_attribute( attribute:"see_also", value:"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=523028" ); script_set_attribute( attribute:"see_also", value:"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=523049" ); script_set_attribute( attribute:"see_also", value:"https://security-tracker.debian.org/tracker/CVE-2008-2107" ); script_set_attribute( attribute:"see_also", value:"https://security-tracker.debian.org/tracker/CVE-2008-2108" ); script_set_attribute( attribute:"see_also", value:"https://security-tracker.debian.org/tracker/CVE-2008-5557" ); script_set_attribute( attribute:"see_also", value:"https://security-tracker.debian.org/tracker/CVE-2008-5624" ); script_set_attribute( attribute:"see_also", value:"https://security-tracker.debian.org/tracker/CVE-2008-5658" ); script_set_attribute( attribute:"see_also", value:"https://security-tracker.debian.org/tracker/CVE-2008-5814" ); script_set_attribute( attribute:"see_also", value:"https://security-tracker.debian.org/tracker/CVE-2009-0754" ); script_set_attribute( attribute:"see_also", value:"https://security-tracker.debian.org/tracker/CVE-2009-1271" ); script_set_attribute( attribute:"see_also", value:"https://www.debian.org/security/2009/dsa-1789" ); script_set_attribute( attribute:"solution", value: "Upgrade the php5 package. For the old stable distribution (etch), these problems have been fixed in version 5.2.0+dfsg-8+etch15. For the stable distribution (lenny), these problems have been fixed in version 5.2.6.dfsg.1-1+lenny3." ); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C"); script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available"); script_set_attribute(attribute:"exploit_available", value:"true"); script_cwe_id(22, 79, 119, 134, 189, 264); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:php5"); script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:4.0"); script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:5.0"); script_set_attribute(attribute:"patch_publication_date", value:"2009/05/04"); script_set_attribute(attribute:"plugin_publication_date", value:"2009/05/06"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"Debian Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l"); exit(0); } include("audit.inc"); include("debian_package.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian"); if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING); flag = 0; if (deb_check(release:"4.0", prefix:"libapache-mod-php5", reference:"5.2.0+dfsg-8+etch15")) flag++; if (deb_check(release:"4.0", prefix:"libapache2-mod-php5", reference:"5.2.0+dfsg-8+etch15")) flag++; if (deb_check(release:"4.0", prefix:"php-pear", reference:"5.2.0+dfsg-8+etch15")) flag++; if (deb_check(release:"4.0", prefix:"php5", reference:"5.2.0+dfsg-8+etch15")) flag++; if (deb_check(release:"4.0", prefix:"php5-cgi", reference:"5.2.0+dfsg-8+etch15")) flag++; if (deb_check(release:"4.0", prefix:"php5-cli", reference:"5.2.0+dfsg-8+etch15")) flag++; if (deb_check(release:"4.0", prefix:"php5-common", reference:"5.2.0+dfsg-8+etch15")) flag++; if (deb_check(release:"4.0", prefix:"php5-curl", reference:"5.2.0+dfsg-8+etch15")) flag++; if (deb_check(release:"4.0", prefix:"php5-dev", reference:"5.2.0+dfsg-8+etch15")) flag++; if (deb_check(release:"4.0", prefix:"php5-gd", reference:"5.2.0+dfsg-8+etch15")) flag++; if (deb_check(release:"4.0", prefix:"php5-imap", reference:"5.2.0+dfsg-8+etch15")) flag++; if (deb_check(release:"4.0", prefix:"php5-interbase", reference:"5.2.0+dfsg-8+etch15")) flag++; if (deb_check(release:"4.0", prefix:"php5-ldap", reference:"5.2.0+dfsg-8+etch15")) flag++; if (deb_check(release:"4.0", prefix:"php5-mcrypt", reference:"5.2.0+dfsg-8+etch15")) flag++; if (deb_check(release:"4.0", prefix:"php5-mhash", reference:"5.2.0+dfsg-8+etch15")) flag++; if (deb_check(release:"4.0", prefix:"php5-mysql", reference:"5.2.0+dfsg-8+etch15")) flag++; if (deb_check(release:"4.0", prefix:"php5-odbc", reference:"5.2.0+dfsg-8+etch15")) flag++; if (deb_check(release:"4.0", prefix:"php5-pgsql", reference:"5.2.0+dfsg-8+etch15")) flag++; if (deb_check(release:"4.0", prefix:"php5-pspell", reference:"5.2.0+dfsg-8+etch15")) flag++; if (deb_check(release:"4.0", prefix:"php5-recode", reference:"5.2.0+dfsg-8+etch15")) flag++; if (deb_check(release:"4.0", prefix:"php5-snmp", reference:"5.2.0+dfsg-8+etch15")) flag++; if (deb_check(release:"4.0", prefix:"php5-sqlite", reference:"5.2.0+dfsg-8+etch15")) flag++; if (deb_check(release:"4.0", prefix:"php5-sybase", reference:"5.2.0+dfsg-8+etch15")) flag++; if (deb_check(release:"4.0", prefix:"php5-tidy", reference:"5.2.0+dfsg-8+etch15")) flag++; if (deb_check(release:"4.0", prefix:"php5-xmlrpc", reference:"5.2.0+dfsg-8+etch15")) flag++; if (deb_check(release:"4.0", prefix:"php5-xsl", reference:"5.2.0+dfsg-8+etch15")) flag++; if (deb_check(release:"5.0", prefix:"libapache2-mod-php5", reference:"5.2.6.dfsg.1-1+lenny3")) flag++; if (deb_check(release:"5.0", prefix:"libapache2-mod-php5filter", reference:"5.2.6.dfsg.1-1+lenny3")) flag++; if (deb_check(release:"5.0", prefix:"php-pear", reference:"5.2.6.dfsg.1-1+lenny3")) flag++; if (deb_check(release:"5.0", prefix:"php5", reference:"5.2.6.dfsg.1-1+lenny3")) flag++; if (deb_check(release:"5.0", prefix:"php5-cgi", reference:"5.2.6.dfsg.1-1+lenny3")) flag++; if (deb_check(release:"5.0", prefix:"php5-cli", reference:"5.2.6.dfsg.1-1+lenny3")) flag++; if (deb_check(release:"5.0", prefix:"php5-common", reference:"5.2.6.dfsg.1-1+lenny3")) flag++; if (deb_check(release:"5.0", prefix:"php5-curl", reference:"5.2.6.dfsg.1-1+lenny3")) flag++; if (deb_check(release:"5.0", prefix:"php5-dbg", reference:"5.2.6.dfsg.1-1+lenny3")) flag++; if (deb_check(release:"5.0", prefix:"php5-dev", reference:"5.2.6.dfsg.1-1+lenny3")) flag++; if (deb_check(release:"5.0", prefix:"php5-gd", reference:"5.2.6.dfsg.1-1+lenny3")) flag++; if (deb_check(release:"5.0", prefix:"php5-gmp", reference:"5.2.6.dfsg.1-1+lenny3")) flag++; if (deb_check(release:"5.0", prefix:"php5-imap", reference:"5.2.6.dfsg.1-1+lenny3")) flag++; if (deb_check(release:"5.0", prefix:"php5-interbase", reference:"5.2.6.dfsg.1-1+lenny3")) flag++; if (deb_check(release:"5.0", prefix:"php5-ldap", reference:"5.2.6.dfsg.1-1+lenny3")) flag++; if (deb_check(release:"5.0", prefix:"php5-mcrypt", reference:"5.2.6.dfsg.1-1+lenny3")) flag++; if (deb_check(release:"5.0", prefix:"php5-mhash", reference:"5.2.6.dfsg.1-1+lenny3")) flag++; if (deb_check(release:"5.0", prefix:"php5-mysql", reference:"5.2.6.dfsg.1-1+lenny3")) flag++; if (deb_check(release:"5.0", prefix:"php5-odbc", reference:"5.2.6.dfsg.1-1+lenny3")) flag++; if (deb_check(release:"5.0", prefix:"php5-pgsql", reference:"5.2.6.dfsg.1-1+lenny3")) flag++; if (deb_check(release:"5.0", prefix:"php5-pspell", reference:"5.2.6.dfsg.1-1+lenny3")) flag++; if (deb_check(release:"5.0", prefix:"php5-recode", reference:"5.2.6.dfsg.1-1+lenny3")) flag++; if (deb_check(release:"5.0", prefix:"php5-snmp", reference:"5.2.6.dfsg.1-1+lenny3")) flag++; if (deb_check(release:"5.0", prefix:"php5-sqlite", reference:"5.2.6.dfsg.1-1+lenny3")) flag++; if (deb_check(release:"5.0", prefix:"php5-sybase", reference:"5.2.6.dfsg.1-1+lenny3")) flag++; if (deb_check(release:"5.0", prefix:"php5-tidy", reference:"5.2.6.dfsg.1-1+lenny3")) flag++; if (deb_check(release:"5.0", prefix:"php5-xmlrpc", reference:"5.2.6.dfsg.1-1+lenny3")) flag++; if (deb_check(release:"5.0", prefix:"php5-xsl", reference:"5.2.6.dfsg.1-1+lenny3")) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get()); else security_hole(0); exit(0); } else audit(AUDIT_HOST_NOT, "affected");
NASL family Fedora Local Security Checks NASL id FEDORA_2009-3848.NASL description Update to PHP 5.2.9 A heap-based buffer overflow flaw was found in PHP last seen 2020-06-01 modified 2020-06-02 plugin id 38957 published 2009-06-01 reporter This script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/38957 title Fedora 9 : maniadrive-1.2-13.fc9 / php-5.2.9-2.fc9 (2009-3848) NASL family Ubuntu Local Security Checks NASL id UBUNTU_USN-761-1.NASL description It was discovered that PHP did not sanitize certain error messages when display_errors is enabled, which could result in browsers becoming vulnerable to cross-site scripting attacks when processing the output. With cross-site scripting vulnerabilities, if a user were tricked into viewing server output during a crafted server request, a remote attacker could exploit this to modify the contents, or steal confidential data (such as passwords), within the same domain. (CVE-2008-5814) It was discovered that PHP did not properly handle the mbstring.func_overload setting within .htaccess files when using virtual hosts. A virtual host administrator could use this flaw to cause settings to be applied to other virtual hosts on the same server. (CVE-2009-0754) It was discovered that PHP did not properly handle certain malformed strings when being parsed by the json_decode function. A remote attacker could exploit this flaw and cause the PHP server to crash, resulting in a denial of service. This issue only affected Ubuntu 8.04 and 8.10. (CVE-2009-1271). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 37849 published 2009-04-23 reporter Ubuntu Security Notice (C) 2009-2019 Canonical, Inc. / NASL script (C) 2009-2018 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/37849 title Ubuntu 6.06 LTS / 8.04 LTS / 8.10 : php5 vulnerabilities (USN-761-1) NASL family Fedora Local Security Checks NASL id FEDORA_2009-3768.NASL description Update to PHP 5.2.9 A heap-based buffer overflow flaw was found in PHP last seen 2020-06-01 modified 2020-06-02 plugin id 38956 published 2009-06-01 reporter This script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/38956 title Fedora 10 : maniadrive-1.2-13.fc10 / php-5.2.9-2.fc10 (2009-3768) NASL family Debian Local Security Checks NASL id DEBIAN_DSA-1775.NASL description It was discovered that php-json-ext, a JSON serialiser for PHP, is prone to a denial of service attack, when receiving a malformed string via the json_decode function. last seen 2020-06-01 modified 2020-06-02 plugin id 36189 published 2009-04-21 reporter This script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/36189 title Debian DSA-1775-1 : php-json-ext - denial of service NASL family Ubuntu Local Security Checks NASL id UBUNTU_USN-761-2.NASL description USN-761-1 fixed vulnerabilities in PHP. This update provides the corresponding updates for Ubuntu 9.04. It was discovered that PHP did not sanitize certain error messages when display_errors is enabled, which could result in browsers becoming vulnerable to cross-site scripting attacks when processing the output. With cross-site scripting vulnerabilities, if a user were tricked into viewing server output during a crafted server request, a remote attacker could exploit this to modify the contents, or steal confidential data (such as passwords), within the same domain. (CVE-2008-5814) It was discovered that PHP did not properly handle certain malformed strings when being parsed by the json_decode function. A remote attacker could exploit this flaw and cause the PHP server to crash, resulting in a denial of service. This issue only affected Ubuntu 8.04 and 8.10. (CVE-2009-1271). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 38194 published 2009-04-28 reporter Ubuntu Security Notice (C) 2009-2019 Canonical, Inc. / NASL script (C) 2009-2018 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/38194 title Ubuntu 9.04 : php5 vulnerabilities (USN-761-2)
Redhat
advisories |
| ||||
rpms |
|
Statements
contributor | Tomas Hoger |
lastmodified | 2009-04-15 |
organization | Red Hat |
statement | This issue did not affect PHP versions as shipped in Red Hat Enterprise Linux 2.1, 3, 4, and 5, and Red Hat Application Stack v1. PHP version in Red Hat Application Stack v2 was fixed via: https://rhn.redhat.com/errata/RHSA-2009-0350.html |
References
- http://cvs.php.net/viewvc.cgi/php-src/ext/json/JSON_parser.c?r1=1.1.2.14&r2=1.1.2.15
- http://lists.apple.com/archives/security-announce/2009/Sep/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html
- http://secunia.com/advisories/34770
- http://secunia.com/advisories/34830
- http://secunia.com/advisories/34933
- http://secunia.com/advisories/35003
- http://secunia.com/advisories/35007
- http://secunia.com/advisories/35306
- http://secunia.com/advisories/35685
- http://secunia.com/advisories/36701
- http://support.apple.com/kb/HT3865
- http://www.debian.org/security/2009/dsa-1775
- http://www.debian.org/security/2009/dsa-1789
- http://www.mandriva.com/security/advisories?name=MDVSA-2009:090
- http://www.openwall.com/lists/oss-security/2009/04/01/9
- http://www.php.net/releases/5_2_9.php
- http://www.redhat.com/support/errata/RHSA-2009-0350.html
- http://www.ubuntu.com/usn/USN-761-2
- https://usn.ubuntu.com/761-1/
- https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01451.html
- https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01465.html