Synopsis
The remote Fedora host is missing a security update.
Description
14 May 2015, **PHP 5.5.25**
**Core:**
- Fixed bug #69364 (PHP Multipart/form-data remote dos Vulnerability). (Stas)
- Fixed bug #69403 (str_repeat() sign mismatch based memory corruption). (Stas)
- Fixed bug #69418 (CVE-2006-7243 fix regressions in 5.4+). (Stas)
- Fixed bug #69522 (heap buffer overflow in unpack()).
(Stas)
- Fixed bug #69467 (Wrong checked for the interface by using Trait). (Laruence)
- Fixed bug #69420 (Invalid read in zend_std_get_method). (Laruence)
- Fixed bug #60022 ('use statement [...] has no effect' depends on leading backslash). (Nikita)
- Fixed bug #67314 (Segmentation fault in gc_remove_zval_from_buffer). (Dmitry)
- Fixed bug #68652 (segmentation fault in destructor).
(Dmitry)
- Fixed bug #69419 (Returning compatible sub generator produces a warning). (Nikita)
- Fixed bug #69472 (php_sys_readlink ignores misc errors from GetFinalPathNameByHandleA). (Jan Starke)
**FTP:**
- Fixed bug #69545 (Integer overflow in ftp_genlist() resulting in heap overflow). (Stas)
**ODBC:**
- Fixed bug #69474 (ODBC: Query with same field name from two tables returns incorrect result). (Anatol)
- Fixed bug #69381 (out of memory with sage odbc driver). (Frederic Marchall, Anatol Belski)
**OpenSSL:**
- Fixed bug #69402 (Reading empty SSL stream hangs until timeout). (Daniel Lowrey)
**PCNTL:**
- Fixed bug #68598 (pcntl_exec() should not allow null char). (Stas)
**Phar:**
- Fixed bug #69453 (Memory Corruption in phar_parse_tarfile when entry filename starts with null). (Stas)
Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
Solution
Update the affected php package.
Plugin Details
File Name: fedora_2015-8370.nasl
Agent: unix
Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus
Risk Information
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P
Vulnerability Information
CPE: p-cpe:/a:fedoraproject:fedora:php, cpe:/o:fedoraproject:fedora:20
Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list
Patch Publication Date: 5/17/2015