PHP < 5.3.26 / 5.4.x < 5.4.16 Heap Based Buffer Overflow

medium Nessus Network Monitor Plugin ID 6866

Synopsis

The remote web server uses a version of PHP that is affected by a heap-based buffer overflow vulnerability.

Description

PHP versions earlier than 5.4.16 and 5.3.26 are affected by a heap based buffer overflow vulnerability due to lack of user input sanitation when parsing strings. (An additional security vulnerability exists while parsing 'mimetype' for MP3 files, which can be exploited to cause a crash in version 5.4.15.)

Solution

Upgrade to PHP version 5.4.16 or 5.3.26, or later.

See Also

http://www.php.net/ChangeLog-5.php

http://www.php.net

Plugin Details

Severity: Medium

ID: 6866

Family: Web Servers

Published: 6/7/2013

Updated: 3/6/2019

Nessus ID: 66842, 66843

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: Medium

Base Score: 5.6

Temporal Score: 4.9

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:php:php

Patch Publication Date: 6/7/2013

Vulnerability Publication Date: 6/7/2013

Reference Information

CVE: CVE-2013-2110, CVE-2013-4635, CVE-2013-4636

BID: 60411, 60728, 60731