openSUSE Security Update : apache2-mod_php5 (openSUSE-SU-2011:1137-1)

critical Nessus Plugin ID 75433

Synopsis

The remote openSUSE host is missing a security update.

Description

The blowfish password hashing implementation did not properly handle 8-characters in passwords, which made it easier for attackers to crack the hash (CVE-2011-2483). After this update existing hashes with id '$2a$' for passwords that contain 8-bit characters will no longer be compatible with newly generated hashes. Affected users will either have to change their password to store a new hash or the id of the existing hash has to be manually changed to '$2x$' in order to activate a compat mode. Please see the description of the CVE-2011-2483 glibc update for details.

File uploads could potentially overwrite files owned by the user running php (CVE-2011-2202).

A long salt argument to the crypt function could cause a buffer overflow (CVE-2011-3268)

Solution

Update the affected apache2-mod_php5 packages.

See Also

https://bugzilla.novell.com/show_bug.cgi?id=699711

https://bugzilla.novell.com/show_bug.cgi?id=701491

https://bugzilla.novell.com/show_bug.cgi?id=709549

https://bugzilla.novell.com/show_bug.cgi?id=715646

https://lists.opensuse.org/opensuse-updates/2011-10/msg00014.html

Plugin Details

Severity: Critical

ID: 75433

File Name: suse_11_3_apache2-mod_php5-110907.nasl

Version: 1.7

Type: local

Agent: unix

Published: 6/13/2014

Updated: 1/14/2021

Supported Sensors: Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.3

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:php5-enchant, p-cpe:/a:novell:opensuse:php5-gettext, p-cpe:/a:novell:opensuse:php5-gmp, p-cpe:/a:novell:opensuse:php5-posix, p-cpe:/a:novell:opensuse:php5-suhosin, p-cpe:/a:novell:opensuse:php5-intl, p-cpe:/a:novell:opensuse:php5, p-cpe:/a:novell:opensuse:php5-fileinfo, p-cpe:/a:novell:opensuse:php5-sysvmsg, p-cpe:/a:novell:opensuse:php5-wddx, p-cpe:/a:novell:opensuse:php5-fastcgi, p-cpe:/a:novell:opensuse:php5-gd, p-cpe:/a:novell:opensuse:php5-ctype, p-cpe:/a:novell:opensuse:php5-dba, p-cpe:/a:novell:opensuse:php5-tokenizer, p-cpe:/a:novell:opensuse:php5-pspell, p-cpe:/a:novell:opensuse:php5-xmlreader, p-cpe:/a:novell:opensuse:php5-exif, p-cpe:/a:novell:opensuse:php5-bcmath, p-cpe:/a:novell:opensuse:php5-ftp, p-cpe:/a:novell:opensuse:php5-pear, p-cpe:/a:novell:opensuse:php5-mysql, p-cpe:/a:novell:opensuse:php5-zip, cpe:/o:novell:opensuse:11.3, p-cpe:/a:novell:opensuse:php5-xmlrpc, p-cpe:/a:novell:opensuse:php5-pdo, p-cpe:/a:novell:opensuse:php5-pgsql, p-cpe:/a:novell:opensuse:php5-sqlite, p-cpe:/a:novell:opensuse:php5-sysvsem, p-cpe:/a:novell:opensuse:php5-bz2, p-cpe:/a:novell:opensuse:php5-odbc, p-cpe:/a:novell:opensuse:php5-imap, p-cpe:/a:novell:opensuse:php5-pcntl, p-cpe:/a:novell:opensuse:php5-sysvshm, p-cpe:/a:novell:opensuse:php5-mcrypt, p-cpe:/a:novell:opensuse:php5-curl, p-cpe:/a:novell:opensuse:php5-mbstring, p-cpe:/a:novell:opensuse:php5-snmp, p-cpe:/a:novell:opensuse:php5-soap, p-cpe:/a:novell:opensuse:php5-zlib, p-cpe:/a:novell:opensuse:php5-iconv, p-cpe:/a:novell:opensuse:php5-devel, p-cpe:/a:novell:opensuse:php5-calendar, p-cpe:/a:novell:opensuse:php5-xmlwriter, p-cpe:/a:novell:opensuse:php5-xsl, p-cpe:/a:novell:opensuse:apache2-mod_php5, p-cpe:/a:novell:opensuse:php5-json, p-cpe:/a:novell:opensuse:php5-ldap, p-cpe:/a:novell:opensuse:php5-dom, p-cpe:/a:novell:opensuse:php5-openssl, p-cpe:/a:novell:opensuse:php5-readline, p-cpe:/a:novell:opensuse:php5-phar, p-cpe:/a:novell:opensuse:php5-shmop, p-cpe:/a:novell:opensuse:php5-sockets, p-cpe:/a:novell:opensuse:php5-hash, p-cpe:/a:novell:opensuse:php5-tidy

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 9/7/2011

Reference Information

CVE: CVE-2011-2202, CVE-2011-2483, CVE-2011-3268