Debian DSA-115-1 : php - broken boundary check and more

high Nessus Plugin ID 14952

Synopsis

The remote Debian host is missing a security-related update.

Description

Stefan Esser, who is also a member of the PHP team, found several flawsin the way PHP handles multipart/form-data POST requests (as described in RFC1867) known as POST fileuploads. Each of the flaws could allow an attacker to execute arbitrary code on the victim's system.

For PHP3 flaws contain a broken boundary check and an arbitrary heap overflow. For PHP4 they consist of a broken boundary check and a heap off by one error.

For the stable release of Debian these problems are fixed in version 3.0.18-0potato1.1 of PHP3 and version 4.0.3pl1-0potato3 of PHP4.

For the unstable and testing release of Debian these problems are fixed in version 3.0.18-22 of PHP3 and version 4.1.2-1 of PHP4.

There is no PHP4 in the stable and unstable distribution for the arm architecture due to a compiler error.

Solution

Upgrade the PHP packages immediately.

See Also

http://security.e-matters.de/advisories/012002.html

http://www.debian.org/security/2002/dsa-115

Plugin Details

Severity: High

ID: 14952

File Name: debian_DSA-115.nasl

Version: 1.22

Type: local

Agent: unix

Published: 9/29/2004

Updated: 1/4/2021

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.3

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.2

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:php4, p-cpe:/a:debian:debian_linux:php3, cpe:/o:debian:debian_linux:2.2

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 3/2/2002

Vulnerability Publication Date: 2/27/2002

Exploitable With

Core Impact

Reference Information

CVE: CVE-2002-0081

BID: 4183

CERT: 297363

DSA: 115