openSUSE 10 Security Update : apache2-mod_php5 (apache2-mod_php5-5787)

medium Nessus Plugin ID 35004

Synopsis

The remote openSUSE host is missing a security update.

Description

This update fixes a buffer overflow in php_imap.c that uses an old IMAP API. This bug can be exploited to execute arbitrary code remotely via long IMAP requests. (CVE-2008-2829)

Solution

Update the affected apache2-mod_php5 packages.

Plugin Details

Severity: Medium

ID: 35004

File Name: suse_apache2-mod_php5-5787.nasl

Version: 1.9

Type: local

Agent: unix

Published: 12/2/2008

Updated: 1/14/2021

Supported Sensors: Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:php5-hash, p-cpe:/a:novell:opensuse:php5-tidy, p-cpe:/a:novell:opensuse:php5-mcrypt, cpe:/o:novell:opensuse:10.2, p-cpe:/a:novell:opensuse:php5-curl, cpe:/o:novell:opensuse:10.3, p-cpe:/a:novell:opensuse:php5-mbstring, p-cpe:/a:novell:opensuse:php5-snmp, p-cpe:/a:novell:opensuse:php5-soap, p-cpe:/a:novell:opensuse:php5-dbase, p-cpe:/a:novell:opensuse:php5-zlib, p-cpe:/a:novell:opensuse:php5-iconv, p-cpe:/a:novell:opensuse:php5-devel, p-cpe:/a:novell:opensuse:php5-calendar, p-cpe:/a:novell:opensuse:php5-xmlwriter, p-cpe:/a:novell:opensuse:php5-xsl, p-cpe:/a:novell:opensuse:apache2-mod_php5, p-cpe:/a:novell:opensuse:php5-json, p-cpe:/a:novell:opensuse:php5-ldap, p-cpe:/a:novell:opensuse:php5-dom, p-cpe:/a:novell:opensuse:php5-openssl, p-cpe:/a:novell:opensuse:php5-readline, p-cpe:/a:novell:opensuse:php5-shmop, p-cpe:/a:novell:opensuse:php5-sockets, p-cpe:/a:novell:opensuse:php5-mhash, p-cpe:/a:novell:opensuse:php5-gettext, p-cpe:/a:novell:opensuse:php5-gmp, p-cpe:/a:novell:opensuse:php5-posix, p-cpe:/a:novell:opensuse:php5-suhosin, p-cpe:/a:novell:opensuse:php5, p-cpe:/a:novell:opensuse:php5-sysvmsg, p-cpe:/a:novell:opensuse:php5-wddx, p-cpe:/a:novell:opensuse:php5-fastcgi, p-cpe:/a:novell:opensuse:php5-gd, p-cpe:/a:novell:opensuse:php5-ctype, p-cpe:/a:novell:opensuse:php5-dba, p-cpe:/a:novell:opensuse:php5-tokenizer, p-cpe:/a:novell:opensuse:php5-pspell, p-cpe:/a:novell:opensuse:php5-xmlreader, p-cpe:/a:novell:opensuse:php5-exif, p-cpe:/a:novell:opensuse:php5-bcmath, p-cpe:/a:novell:opensuse:php5-ftp, p-cpe:/a:novell:opensuse:php5-pear, p-cpe:/a:novell:opensuse:php5-mysql, p-cpe:/a:novell:opensuse:php5-zip, p-cpe:/a:novell:opensuse:php5-xmlrpc, p-cpe:/a:novell:opensuse:php5-pdo, p-cpe:/a:novell:opensuse:php5-pgsql, p-cpe:/a:novell:opensuse:php5-sqlite, p-cpe:/a:novell:opensuse:php5-sysvsem, p-cpe:/a:novell:opensuse:php5-bz2, p-cpe:/a:novell:opensuse:php5-odbc, p-cpe:/a:novell:opensuse:php5-imap, p-cpe:/a:novell:opensuse:php5-ncurses, p-cpe:/a:novell:opensuse:php5-pcntl, p-cpe:/a:novell:opensuse:php5-sysvshm

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Patch Publication Date: 11/14/2008

Reference Information

CVE: CVE-2008-2829

CWE: 119