Language:
http://eindbazen.net/2012/05/php-cgi-advisory-cve-2012-1823/
https://bugs.php.net/bug.php?id=61910
Severity: High
ID: 59057
File Name: php_5_4_3.nasl
Version: 1.17
Type: remote
Family: CGI abuses
Published: 5/9/2012
Updated: 5/31/2024
Configuration: Enable thorough checks
Supported Sensors: Nessus
Enable CGI Scanning: true
Risk Factor: High
Score: 7.4
Risk Factor: High
Base Score: 8.3
Temporal Score: 6.9
Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:P/A:P
CPE: cpe:/a:php:php
Required KB Items: www/PHP
Excluded KB Items: Settings/disable_cgi_scanning
Exploit Ease: No exploit is required
Patch Publication Date: 5/8/2012
Vulnerability Publication Date: 5/6/2012
Core Impact
Metasploit (PHP apache_request_headers Function Buffer Overflow)
CVE: CVE-2012-2311, CVE-2012-2329, CVE-2012-2335, CVE-2012-2336
CERT: 520827