Debian DSA-2873-1 : file - several vulnerabilities
2014-03-12T00:00:00
ID DEBIAN_DSA-2873.NASL Type nessus Reporter This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof. Modified 2014-03-12T00:00:00
Description
Several vulnerabilities have been found in file, a file type
classification tool.
Aaron Reffett reported a flaw in the way the file utility determined
the type of Portable Executable (PE) format files, the executable
format used on Windows. When processing a defective or intentionally
prepared PE executable which contains invalid offset information, the
file_strncmp routine will access memory that is out of bounds, causing
file to crash. The Common Vulnerabilities and Exposures project ID
CVE-2014-2270 has been assigned to identify this flaw.
Mike Frysinger reported that file's rule for detecting AWK scripts
significantly slows down file. The regular expression to detect AWK
files contained two star operators, which could be exploited to cause
excessive backtracking in the regex engine.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Debian Security Advisory DSA-2873. The text
# itself is copyright (C) Software in the Public Interest, Inc.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(72952);
script_version("1.13");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/11");
script_cve_id("CVE-2013-7345", "CVE-2014-2270");
script_bugtraq_id(66002);
script_xref(name:"DSA", value:"2873");
script_name(english:"Debian DSA-2873-1 : file - several vulnerabilities");
script_summary(english:"Checks dpkg output for the updated package");
script_set_attribute(
attribute:"synopsis",
value:"The remote Debian host is missing a security-related update."
);
script_set_attribute(
attribute:"description",
value:
"Several vulnerabilities have been found in file, a file type
classification tool.
Aaron Reffett reported a flaw in the way the file utility determined
the type of Portable Executable (PE) format files, the executable
format used on Windows. When processing a defective or intentionally
prepared PE executable which contains invalid offset information, the
file_strncmp routine will access memory that is out of bounds, causing
file to crash. The Common Vulnerabilities and Exposures project ID
CVE-2014-2270 has been assigned to identify this flaw.
Mike Frysinger reported that file's rule for detecting AWK scripts
significantly slows down file. The regular expression to detect AWK
files contained two star operators, which could be exploited to cause
excessive backtracking in the regex engine."
);
script_set_attribute(
attribute:"see_also",
value:"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=703993"
);
script_set_attribute(
attribute:"see_also",
value:"https://security-tracker.debian.org/tracker/CVE-2014-2270"
);
script_set_attribute(
attribute:"see_also",
value:"https://packages.debian.org/source/squeeze/file"
);
script_set_attribute(
attribute:"see_also",
value:"https://packages.debian.org/source/wheezy/file"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.debian.org/security/2014/dsa-2873"
);
script_set_attribute(
attribute:"solution",
value:
"Upgrade the file packages.
For the oldstable distribution (squeeze), these problems have been
fixed in version 5.04-5+squeeze4.
For the stable distribution (wheezy), these problems have been fixed
in version 5.11-2+deb7u2."
);
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:file");
script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:6.0");
script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:7.0");
script_set_attribute(attribute:"patch_publication_date", value:"2014/03/11");
script_set_attribute(attribute:"plugin_publication_date", value:"2014/03/12");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_family(english:"Debian Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l");
exit(0);
}
include("audit.inc");
include("debian_package.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian");
if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING);
flag = 0;
if (deb_check(release:"6.0", prefix:"file", reference:"5.04-5+squeeze4")) flag++;
if (deb_check(release:"6.0", prefix:"libmagic-dev", reference:"5.04-5+squeeze4")) flag++;
if (deb_check(release:"6.0", prefix:"libmagic1", reference:"5.04-5+squeeze4")) flag++;
if (deb_check(release:"6.0", prefix:"python-magic", reference:"5.04-5+squeeze4")) flag++;
if (deb_check(release:"6.0", prefix:"python-magic-dbg", reference:"5.04-5+squeeze4")) flag++;
if (deb_check(release:"7.0", prefix:"file", reference:"5.11-2+deb7u2")) flag++;
if (deb_check(release:"7.0", prefix:"libmagic-dev", reference:"5.11-2+deb7u2")) flag++;
if (deb_check(release:"7.0", prefix:"libmagic1", reference:"5.11-2+deb7u2")) flag++;
if (deb_check(release:"7.0", prefix:"python-magic", reference:"5.11-2+deb7u2")) flag++;
if (deb_check(release:"7.0", prefix:"python-magic-dbg", reference:"5.11-2+deb7u2")) flag++;
if (flag)
{
if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get());
else security_warning(0);
exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");
{"id": "DEBIAN_DSA-2873.NASL", "bulletinFamily": "scanner", "title": "Debian DSA-2873-1 : file - several vulnerabilities", "description": "Several vulnerabilities have been found in file, a file type\nclassification tool.\n\nAaron Reffett reported a flaw in the way the file utility determined\nthe type of Portable Executable (PE) format files, the executable\nformat used on Windows. When processing a defective or intentionally\nprepared PE executable which contains invalid offset information, the\nfile_strncmp routine will access memory that is out of bounds, causing\nfile to crash. The Common Vulnerabilities and Exposures project ID\nCVE-2014-2270 has been assigned to identify this flaw.\n\nMike Frysinger reported that file's rule for detecting AWK scripts\nsignificantly slows down file. The regular expression to detect AWK\nfiles contained two star operators, which could be exploited to cause\nexcessive backtracking in the regex engine.", "published": "2014-03-12T00:00:00", "modified": "2014-03-12T00:00:00", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}, "href": "https://www.tenable.com/plugins/nessus/72952", "reporter": "This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.", "references": ["https://packages.debian.org/source/wheezy/file", "https://security-tracker.debian.org/tracker/CVE-2014-2270", "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=703993", "https://packages.debian.org/source/squeeze/file", "https://www.debian.org/security/2014/dsa-2873"], "cvelist": ["CVE-2013-7345", "CVE-2014-2270"], "type": "nessus", "lastseen": "2021-01-12T09:48:22", "edition": 17, "viewCount": 3, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2013-7345", "CVE-2014-2270"]}, {"type": "f5", "idList": ["F5:K15689", "SOL15303", "SOL15689"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310120047", "OPENVAS:1361412562310868442", "OPENVAS:867641", "OPENVAS:1361412562310120475", "OPENVAS:1361412562310702873", "OPENVAS:1361412562310867641", "OPENVAS:702873", "OPENVAS:1361412562310868123", "OPENVAS:1361412562310120048", "OPENVAS:1361412562310120208"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:DOC:30351", "SECURITYVULNS:DOC:30369", "SECURITYVULNS:DOC:30549", "SECURITYVULNS:VULN:13572"]}, {"type": "fedora", "idList": ["FEDORA:DE89B60D43C9", "FEDORA:3655A220FE", "FEDORA:A66B9227B3", "FEDORA:9CAEF22111", "FEDORA:0693C22D72", "FEDORA:0B4DC2057B", "FEDORA:4D69320F06", "FEDORA:C332D21937"]}, {"type": "freebsd", "idList": ["70140F20-6007-11E6-A6C3-14DAE9D210B8", "7E61A839-B714-11E3-8195-001966155BEA"]}, {"type": "nessus", "idList": ["FEDORA_2014-4340.NASL", "FEDORA_2014-4767.NASL", "ALA_ALAS-2014-343.NASL", "FREEBSD_PKG_70140F20600711E6A6C314DAE9D210B8.NASL", "GENTOO_GLSA-201408-08.NASL", "PHP_5_4_27.NASL", "OPENSUSE-2014-270.NASL", "ALA_ALAS-2014-342.NASL", "SLACKWARE_SSA_2014-111-02.NASL", "FEDORA_2014-4735.NASL"]}, {"type": "slackware", "idList": ["SSA-2014-111-02"]}, {"type": "amazon", "idList": ["ALAS-2014-343", "ALAS-2014-313", "ALAS-2014-323", "ALAS-2014-333", "ALAS-2014-342", "ALAS-2014-314", "ALAS-2014-332"]}, {"type": "gentoo", "idList": ["GLSA-201503-08", "GLSA-201408-08"]}, {"type": "ubuntu", "idList": ["USN-2162-1", "USN-2163-1"]}, {"type": "seebug", "idList": ["SSV:61748"]}, {"type": "debian", "idList": ["DEBIAN:DSA-2943-1:EDE80", "DEBIAN:DSA-2873-1:1CEBF"]}], "modified": "2021-01-12T09:48:22", "rev": 2}, "score": {"value": 6.5, "vector": "NONE", "modified": "2021-01-12T09:48:22", "rev": 2}, "vulnersScore": 6.5}, "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-2873. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(72952);\n script_version(\"1.13\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2013-7345\", \"CVE-2014-2270\");\n script_bugtraq_id(66002);\n script_xref(name:\"DSA\", value:\"2873\");\n\n script_name(english:\"Debian DSA-2873-1 : file - several vulnerabilities\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Several vulnerabilities have been found in file, a file type\nclassification tool.\n\nAaron Reffett reported a flaw in the way the file utility determined\nthe type of Portable Executable (PE) format files, the executable\nformat used on Windows. When processing a defective or intentionally\nprepared PE executable which contains invalid offset information, the\nfile_strncmp routine will access memory that is out of bounds, causing\nfile to crash. The Common Vulnerabilities and Exposures project ID\nCVE-2014-2270 has been assigned to identify this flaw.\n\nMike Frysinger reported that file's rule for detecting AWK scripts\nsignificantly slows down file. The regular expression to detect AWK\nfiles contained two star operators, which could be exploited to cause\nexcessive backtracking in the regex engine.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=703993\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2014-2270\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/squeeze/file\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/wheezy/file\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.debian.org/security/2014/dsa-2873\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Upgrade the file packages.\n\nFor the oldstable distribution (squeeze), these problems have been\nfixed in version 5.04-5+squeeze4.\n\nFor the stable distribution (wheezy), these problems have been fixed\nin version 5.11-2+deb7u2.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:file\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:6.0\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:7.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/03/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/03/12\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"6.0\", prefix:\"file\", reference:\"5.04-5+squeeze4\")) flag++;\nif (deb_check(release:\"6.0\", prefix:\"libmagic-dev\", reference:\"5.04-5+squeeze4\")) flag++;\nif (deb_check(release:\"6.0\", prefix:\"libmagic1\", reference:\"5.04-5+squeeze4\")) flag++;\nif (deb_check(release:\"6.0\", prefix:\"python-magic\", reference:\"5.04-5+squeeze4\")) flag++;\nif (deb_check(release:\"6.0\", prefix:\"python-magic-dbg\", reference:\"5.04-5+squeeze4\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"file\", reference:\"5.11-2+deb7u2\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"libmagic-dev\", reference:\"5.11-2+deb7u2\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"libmagic1\", reference:\"5.11-2+deb7u2\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"python-magic\", reference:\"5.11-2+deb7u2\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"python-magic-dbg\", reference:\"5.11-2+deb7u2\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "naslFamily": "Debian Local Security Checks", "pluginID": "72952", "cpe": ["cpe:/o:debian:debian_linux:6.0", "cpe:/o:debian:debian_linux:7.0", "p-cpe:/a:debian:debian_linux:file"], "scheme": null}
{"cve": [{"lastseen": "2020-12-09T19:52:50", "description": "The BEGIN regular expression in the awk script detector in magic/Magdir/commands in file before 5.15 uses multiple wildcards with unlimited repetitions, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted ASCII file that triggers a large amount of backtracking, as demonstrated via a file with many newline characters.", "edition": 5, "cvss3": {}, "published": "2014-03-24T16:31:00", "title": "CVE-2013-7345", "type": "cve", "cwe": ["CWE-264"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2013-7345"], "modified": "2014-11-19T02:59:00", "cpe": ["cpe:/a:christos_zoulas:file:5.04", "cpe:/a:christos_zoulas:file:5.05", "cpe:/a:christos_zoulas:file:5.12", "cpe:/a:christos_zoulas:file:5.06", "cpe:/a:christos_zoulas:file:5.02", "cpe:/a:christos_zoulas:file:5.00", "cpe:/a:christos_zoulas:file:5.08", "cpe:/a:christos_zoulas:file:5.01", "cpe:/a:christos_zoulas:file:5.09", "cpe:/a:christos_zoulas:file:5.07", "cpe:/a:christos_zoulas:file:5.14", "cpe:/a:christos_zoulas:file:5.11", "cpe:/a:christos_zoulas:file:5.03", "cpe:/a:christos_zoulas:file:5.10", "cpe:/a:christos_zoulas:file:5.13"], "id": "CVE-2013-7345", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-7345", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}, "cpe23": ["cpe:2.3:a:christos_zoulas:file:5.10:*:*:*:*:*:*:*", "cpe:2.3:a:christos_zoulas:file:5.05:*:*:*:*:*:*:*", "cpe:2.3:a:christos_zoulas:file:5.07:*:*:*:*:*:*:*", "cpe:2.3:a:christos_zoulas:file:5.04:*:*:*:*:*:*:*", "cpe:2.3:a:christos_zoulas:file:5.06:*:*:*:*:*:*:*", "cpe:2.3:a:christos_zoulas:file:5.12:*:*:*:*:*:*:*", "cpe:2.3:a:christos_zoulas:file:5.02:*:*:*:*:*:*:*", "cpe:2.3:a:christos_zoulas:file:5.00:*:*:*:*:*:*:*", "cpe:2.3:a:christos_zoulas:file:5.14:*:*:*:*:*:*:*", "cpe:2.3:a:christos_zoulas:file:5.01:*:*:*:*:*:*:*", "cpe:2.3:a:christos_zoulas:file:5.11:*:*:*:*:*:*:*", "cpe:2.3:a:christos_zoulas:file:5.13:*:*:*:*:*:*:*", "cpe:2.3:a:christos_zoulas:file:5.03:*:*:*:*:*:*:*", "cpe:2.3:a:christos_zoulas:file:5.09:*:*:*:*:*:*:*", "cpe:2.3:a:christos_zoulas:file:5.08:*:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T19:58:22", "description": "softmagic.c in file before 5.17 and libmagic allows context-dependent attackers to cause a denial of service (out-of-bounds memory access and crash) via crafted offsets in the softmagic of a PE executable.", "edition": 5, "cvss3": {}, "published": "2014-03-14T15:55:00", "title": "CVE-2014-2270", "type": "cve", "cwe": ["CWE-119"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-2270"], "modified": "2017-07-01T01:29:00", "cpe": ["cpe:/a:christos_zoulas:file:5.16", "cpe:/a:christos_zoulas:file:5.04", "cpe:/a:christos_zoulas:file:5.05", "cpe:/a:christos_zoulas:file:5.12", "cpe:/a:christos_zoulas:file:5.06", "cpe:/a:christos_zoulas:file:5.02", "cpe:/a:christos_zoulas:file:5.00", "cpe:/a:christos_zoulas:file:5.15", "cpe:/a:christos_zoulas:file:5.08", "cpe:/a:christos_zoulas:file:5.01", "cpe:/a:christos_zoulas:file:5.09", "cpe:/a:christos_zoulas:file:5.07", "cpe:/a:christos_zoulas:file:5.14", "cpe:/a:christos_zoulas:file:5.11", "cpe:/a:christos_zoulas:file:5.03", "cpe:/a:christos_zoulas:file:5.10", "cpe:/a:christos_zoulas:file:5.13", "cpe:/a:tim_robbins:libmagic:-"], "id": "CVE-2014-2270", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-2270", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}, "cpe23": ["cpe:2.3:a:christos_zoulas:file:5.10:*:*:*:*:*:*:*", "cpe:2.3:a:christos_zoulas:file:5.05:*:*:*:*:*:*:*", "cpe:2.3:a:christos_zoulas:file:5.07:*:*:*:*:*:*:*", "cpe:2.3:a:christos_zoulas:file:5.04:*:*:*:*:*:*:*", "cpe:2.3:a:christos_zoulas:file:5.06:*:*:*:*:*:*:*", "cpe:2.3:a:christos_zoulas:file:5.12:*:*:*:*:*:*:*", "cpe:2.3:a:christos_zoulas:file:5.02:*:*:*:*:*:*:*", "cpe:2.3:a:christos_zoulas:file:5.00:*:*:*:*:*:*:*", "cpe:2.3:a:christos_zoulas:file:5.16:*:*:*:*:*:*:*", "cpe:2.3:a:christos_zoulas:file:5.14:*:*:*:*:*:*:*", "cpe:2.3:a:christos_zoulas:file:5.01:*:*:*:*:*:*:*", "cpe:2.3:a:christos_zoulas:file:5.11:*:*:*:*:*:*:*", "cpe:2.3:a:christos_zoulas:file:5.13:*:*:*:*:*:*:*", "cpe:2.3:a:tim_robbins:libmagic:-:*:*:*:*:*:*:*", "cpe:2.3:a:christos_zoulas:file:5.03:*:*:*:*:*:*:*", "cpe:2.3:a:christos_zoulas:file:5.09:*:*:*:*:*:*:*", "cpe:2.3:a:christos_zoulas:file:5.15:*:*:*:*:*:*:*", "cpe:2.3:a:christos_zoulas:file:5.08:*:*:*:*:*:*:*"]}], "f5": [{"lastseen": "2016-09-26T17:22:58", "bulletinFamily": "software", "cvelist": ["CVE-2013-7345"], "edition": 1, "description": "Recommended action\n\nNone\n\nSupplemental Information\n\n * SOL9970: Subscribing to email notifications regarding F5 products\n * SOL9957: Creating a custom RSS feed to view new and updated documents.\n * SOL4602: Overview of the F5 security vulnerability response policy\n * SOL4918: Overview of the F5 critical issue hotfix policy\n", "modified": "2014-06-05T00:00:00", "published": "2014-06-05T00:00:00", "href": "http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15303.html", "id": "SOL15303", "title": "SOL15303 - PHP vulnerability CVE-2013-7345", "type": "f5", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2017-10-12T02:11:20", "bulletinFamily": "software", "cvelist": ["CVE-2014-1943", "CVE-2014-2270"], "edition": 1, "description": " \n\n\n * [CVE-2014-1943](<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1943>)\n\nFine Free file before 5.17 allows context-dependent attackers to cause a denial of service (infinite recursion, CPU consumption, and crash) via a crafted indirect offset value in the magic of a file.\n\n * [CVE-2014-2270](<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2270>)\n\nsoftmagic.c in file before 5.17 and libmagic allows context-dependent attackers to cause a denial of service (out-of-bounds memory access and crash) via crafted offsets in the softmagic of a PE executable.\n\nImpact \n\n\nNone. No F5 products are vulnerable to this vulnerability.\n\nNone\n\n * [K9970: Subscribing to email notifications regarding F5 products](<https://support.f5.com/csp/article/K9970>)\n * [K9957: Creating a custom RSS feed to view new and updated documents.](<https://support.f5.com/csp/article/K9957>)\n * [K4602: Overview of the F5 security vulnerability response policy](<https://support.f5.com/csp/article/K4602>)\n", "modified": "2016-01-09T02:19:00", "published": "2014-10-10T02:59:00", "id": "F5:K15689", "href": "https://support.f5.com/csp/article/K15689", "title": "Fine Free file vulnerabilites CVE-2014-1943 and CVE-2014-2270", "type": "f5", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2016-09-26T17:22:55", "bulletinFamily": "software", "cvelist": ["CVE-2014-1943", "CVE-2014-2270"], "edition": 1, "description": "Recommended action\n\nNone\n\nSupplemental Information\n\n * SOL9970: Subscribing to email notifications regarding F5 products\n * SOL9957: Creating a custom RSS feed to view new and updated documents.\n * SOL4602: Overview of the F5 security vulnerability response policy\n", "modified": "2014-10-09T00:00:00", "published": "2014-10-09T00:00:00", "href": "http://support.f5.com/kb/en-us/solutions/public/15000/600/sol15689.html", "id": "SOL15689", "title": "SOL15689 - Fine Free file vulnerabilites CVE-2014-1943 and CVE-2014-2270", "type": "f5", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}], "openvas": [{"lastseen": "2017-08-01T10:48:48", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-7345", "CVE-2014-2270"], "description": "Several vulnerabilities have been found in file, a file type\nclassification tool.\n\nAaron Reffett reported a flaw in the way the file utility determined the\ntype of Portable Executable (PE) format files, the executable format\nused on Windows. When processing a defective or intentionally prepared\nPE executable which contains invalid offset information, the\nfile_strncmp routine will access memory that is out of bounds, causing\nfile to crash. The Common Vulnerabilities and Exposures project ID\nCVE-2014-2270 \nhas been assigned to identify this flaw.\n\nMike Frysinger reported that file's rule for detecting AWK scripts\nsignificantly slows down file. The regular expression to detect AWK\nfiles contained two star operators, which could be exploited to cause\nexcessive backtracking in the regex engine.", "modified": "2017-07-17T00:00:00", "published": "2014-03-11T00:00:00", "id": "OPENVAS:702873", "href": "http://plugins.openvas.org/nasl.php?oid=702873", "type": "openvas", "title": "Debian Security Advisory DSA 2873-1 (file - several vulnerabilities)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_2873.nasl 6735 2017-07-17 09:56:49Z teissa $\n# Auto-generated from advisory DSA 2873-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2014 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ntag_affected = \"file on Debian Linux\";\ntag_insight = \"File tests each argument in an attempt to classify it. There are three sets of\ntests, performed in this order: filesystem tests, magic number tests, and\nlanguage tests. The first test that succeeds causes the file type to be\nprinted.\";\ntag_solution = \"For the oldstable distribution (squeeze), these problems have been fixed\nin version 5.04-5+squeeze4.\n\nFor the stable distribution (wheezy), these problems have been fixed in\nversion 5.11-2+deb7u2.\n\nFor the testing distribution (jessie), these problems have been fixed in\nversion 1:5.17-1.\n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 1:5.17-1.\n\nWe recommend that you upgrade your file packages.\";\ntag_summary = \"Several vulnerabilities have been found in file, a file type\nclassification tool.\n\nAaron Reffett reported a flaw in the way the file utility determined the\ntype of Portable Executable (PE) format files, the executable format\nused on Windows. When processing a defective or intentionally prepared\nPE executable which contains invalid offset information, the\nfile_strncmp routine will access memory that is out of bounds, causing\nfile to crash. The Common Vulnerabilities and Exposures project ID\nCVE-2014-2270 \nhas been assigned to identify this flaw.\n\nMike Frysinger reported that file's rule for detecting AWK scripts\nsignificantly slows down file. The regular expression to detect AWK\nfiles contained two star operators, which could be exploited to cause\nexcessive backtracking in the regex engine.\";\ntag_vuldetect = \"This check tests the installed software version using the apt package manager.\";\n\nif(description)\n{\n script_id(702873);\n script_version(\"$Revision: 6735 $\");\n script_cve_id(\"CVE-2013-7345\", \"CVE-2014-2270\");\n script_name(\"Debian Security Advisory DSA 2873-1 (file - several vulnerabilities)\");\n script_tag(name: \"last_modification\", value:\"$Date: 2017-07-17 11:56:49 +0200 (Mon, 17 Jul 2017) $\");\n script_tag(name: \"creation_date\", value:\"2014-03-11 00:00:00 +0100 (Tue, 11 Mar 2014)\");\n script_tag(name: \"cvss_base\", value:\"5.0\");\n script_tag(name: \"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n\n script_xref(name: \"URL\", value: \"http://www.debian.org/security/2014/dsa-2873.html\");\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2014 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name: \"affected\", value: tag_affected);\n script_tag(name: \"insight\", value: tag_insight);\n# script_tag(name: \"impact\", value: tag_impact);\n script_tag(name: \"solution\", value: tag_solution);\n script_tag(name: \"summary\", value: tag_summary);\n script_tag(name: \"vuldetect\", value: tag_vuldetect);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"file\", ver:\"5.04-5+squeeze4\", rls:\"DEB6.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libmagic-dev\", ver:\"5.04-5+squeeze4\", rls:\"DEB6.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libmagic1\", ver:\"5.04-5+squeeze4\", rls:\"DEB6.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"python-magic\", ver:\"5.04-5+squeeze4\", rls:\"DEB6.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"python-magic-dbg\", ver:\"5.04-5+squeeze4\", rls:\"DEB6.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"file\", ver:\"5.11-2+deb7u2\", rls:\"DEB7.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libmagic-dev\", ver:\"5.11-2+deb7u2\", rls:\"DEB7.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libmagic1\", ver:\"5.11-2+deb7u2\", rls:\"DEB7.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"python-magic\", ver:\"5.11-2+deb7u2\", rls:\"DEB7.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"python-magic-dbg\", ver:\"5.11-2+deb7u2\", rls:\"DEB7.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"file\", ver:\"5.11-2+deb7u2\", rls:\"DEB7.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libmagic-dev\", ver:\"5.11-2+deb7u2\", rls:\"DEB7.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libmagic1\", ver:\"5.11-2+deb7u2\", rls:\"DEB7.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"python-magic\", ver:\"5.11-2+deb7u2\", rls:\"DEB7.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"python-magic-dbg\", ver:\"5.11-2+deb7u2\", rls:\"DEB7.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"file\", ver:\"5.11-2+deb7u2\", rls:\"DEB7.2\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libmagic-dev\", ver:\"5.11-2+deb7u2\", rls:\"DEB7.2\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libmagic1\", ver:\"5.11-2+deb7u2\", rls:\"DEB7.2\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"python-magic\", ver:\"5.11-2+deb7u2\", rls:\"DEB7.2\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"python-magic-dbg\", ver:\"5.11-2+deb7u2\", rls:\"DEB7.2\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"file\", ver:\"5.11-2+deb7u2\", rls:\"DEB7.3\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libmagic-dev\", ver:\"5.11-2+deb7u2\", rls:\"DEB7.3\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libmagic1\", ver:\"5.11-2+deb7u2\", rls:\"DEB7.3\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"python-magic\", ver:\"5.11-2+deb7u2\", rls:\"DEB7.3\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"python-magic-dbg\", ver:\"5.11-2+deb7u2\", rls:\"DEB7.3\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2019-05-29T18:37:24", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-7345", "CVE-2014-2270"], "description": "Several vulnerabilities have been found in file, a file type\nclassification tool.\n\nAaron Reffett reported a flaw in the way the file utility determined the\ntype of Portable Executable (PE) format files, the executable format\nused on Windows. When processing a defective or intentionally prepared\nPE executable which contains invalid offset information, the\nfile_strncmp routine will access memory that is out of bounds, causing\nfile to crash. The Common Vulnerabilities and Exposures project ID\nCVE-2014-2270\nhas been assigned to identify this flaw.\n\nMike Frysinger reported that file", "modified": "2019-03-19T00:00:00", "published": "2014-03-11T00:00:00", "id": "OPENVAS:1361412562310702873", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310702873", "type": "openvas", "title": "Debian Security Advisory DSA 2873-1 (file - several vulnerabilities)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_2873.nasl 14302 2019-03-19 08:28:48Z cfischer $\n# Auto-generated from advisory DSA 2873-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2014 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.702873\");\n script_version(\"$Revision: 14302 $\");\n script_cve_id(\"CVE-2013-7345\", \"CVE-2014-2270\");\n script_name(\"Debian Security Advisory DSA 2873-1 (file - several vulnerabilities)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-19 09:28:48 +0100 (Tue, 19 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2014-03-11 00:00:00 +0100 (Tue, 11 Mar 2014)\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n\n script_xref(name:\"URL\", value:\"http://www.debian.org/security/2014/dsa-2873.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2014 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\", re:\"ssh/login/release=DEB(6|7)\");\n script_tag(name:\"affected\", value:\"file on Debian Linux\");\n script_tag(name:\"solution\", value:\"For the oldstable distribution (squeeze), these problems have been fixed\nin version 5.04-5+squeeze4.\n\nFor the stable distribution (wheezy), these problems have been fixed in\nversion 5.11-2+deb7u2.\n\nFor the testing distribution (jessie), these problems have been fixed in\nversion 1:5.17-1.\n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 1:5.17-1.\n\nWe recommend that you upgrade your file packages.\");\n script_tag(name:\"summary\", value:\"Several vulnerabilities have been found in file, a file type\nclassification tool.\n\nAaron Reffett reported a flaw in the way the file utility determined the\ntype of Portable Executable (PE) format files, the executable format\nused on Windows. When processing a defective or intentionally prepared\nPE executable which contains invalid offset information, the\nfile_strncmp routine will access memory that is out of bounds, causing\nfile to crash. The Common Vulnerabilities and Exposures project ID\nCVE-2014-2270\nhas been assigned to identify this flaw.\n\nMike Frysinger reported that file's rule for detecting AWK scripts\nsignificantly slows down file. The regular expression to detect AWK\nfiles contained two star operators, which could be exploited to cause\nexcessive backtracking in the regex engine.\");\n script_tag(name:\"vuldetect\", value:\"This check tests the installed software version using the apt package manager.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif((res = isdpkgvuln(pkg:\"file\", ver:\"5.04-5+squeeze4\", rls:\"DEB6\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libmagic-dev\", ver:\"5.04-5+squeeze4\", rls:\"DEB6\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libmagic1\", ver:\"5.04-5+squeeze4\", rls:\"DEB6\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"python-magic\", ver:\"5.04-5+squeeze4\", rls:\"DEB6\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"python-magic-dbg\", ver:\"5.04-5+squeeze4\", rls:\"DEB6\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"file\", ver:\"5.11-2+deb7u2\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libmagic-dev\", ver:\"5.11-2+deb7u2\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libmagic1\", ver:\"5.11-2+deb7u2\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"python-magic\", ver:\"5.11-2+deb7u2\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"python-magic-dbg\", ver:\"5.11-2+deb7u2\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if(__pkg_match) {\n exit(99);\n}", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-05-29T18:37:30", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-7345", "CVE-2014-1943", "CVE-2014-2270"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2014-04-03T00:00:00", "id": "OPENVAS:1361412562310867641", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310867641", "type": "openvas", "title": "Fedora Update for file FEDORA-2014-4340", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for file FEDORA-2014-4340\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.867641\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2014-04-03 09:45:48 +0530 (Thu, 03 Apr 2014)\");\n script_cve_id(\"CVE-2013-7345\", \"CVE-2014-2270\", \"CVE-2014-1943\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_name(\"Fedora Update for file FEDORA-2014-4340\");\n script_tag(name:\"affected\", value:\"file on Fedora 20\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"FEDORA\", value:\"2014-4340\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/pipermail/package-announce/2014-March/130688.html\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'file'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC20\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC20\")\n{\n\n if ((res = isrpmvuln(pkg:\"file\", rpm:\"file~5.14~20.fc20\", rls:\"FC20\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2017-07-25T10:48:33", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-7345", "CVE-2014-1943", "CVE-2014-2270"], "description": "Check for the Version of file", "modified": "2017-07-10T00:00:00", "published": "2014-04-03T00:00:00", "id": "OPENVAS:867641", "href": "http://plugins.openvas.org/nasl.php?oid=867641", "type": "openvas", "title": "Fedora Update for file FEDORA-2014-4340", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for file FEDORA-2014-4340\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\n\nif(description)\n{\n script_id(867641);\n script_version(\"$Revision: 6629 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 08:33:41 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2014-04-03 09:45:48 +0530 (Thu, 03 Apr 2014)\");\n script_cve_id(\"CVE-2013-7345\", \"CVE-2014-2270\", \"CVE-2014-1943\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_name(\"Fedora Update for file FEDORA-2014-4340\");\n\n tag_insight = \"The file command is used to identify a particular file according to the\ntype of data contained by the file. File can identify many different\nfile types, including ELF binaries, system libraries, RPM packages, and\ndifferent graphics formats.\n\";\n\n tag_affected = \"file on Fedora 20\";\n\n tag_solution = \"Please Install the Updated Packages.\";\n\n\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name: \"FEDORA\", value: \"2014-4340\");\n script_xref(name: \"URL\" , value: \"https://lists.fedoraproject.org/pipermail/package-announce/2014-March/130688.html\");\n script_summary(\"Check for the Version of file\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC20\")\n{\n\n if ((res = isrpmvuln(pkg:\"file\", rpm:\"file~5.14~20.fc20\", rls:\"FC20\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2019-05-29T18:37:30", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-7345", "CVE-2014-1943", "CVE-2014-3587", "CVE-2014-3710", "CVE-2014-2270"], "description": "Check the version of file", "modified": "2019-03-15T00:00:00", "published": "2014-10-30T00:00:00", "id": "OPENVAS:1361412562310868442", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310868442", "type": "openvas", "title": "Fedora Update for file FEDORA-2014-13571", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for file FEDORA-2014-13571\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.868442\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2014-10-30 05:44:33 +0100 (Thu, 30 Oct 2014)\");\n script_cve_id(\"CVE-2014-3710\", \"CVE-2014-3587\", \"CVE-2013-7345\", \"CVE-2014-2270\", \"CVE-2014-1943\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_name(\"Fedora Update for file FEDORA-2014-13571\");\n script_tag(name:\"summary\", value:\"Check the version of file\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"affected\", value:\"file on Fedora 20\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"FEDORA\", value:\"2014-13571\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/pipermail/package-announce/2014-October/141536.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC20\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC20\")\n{\n\n if ((res = isrpmvuln(pkg:\"file\", rpm:\"file~5.19~7.fc20\", rls:\"FC20\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-05-29T18:37:45", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-7345", "CVE-2014-1943", "CVE-2014-3587", "CVE-2012-1571", "CVE-2014-2270"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2014-08-24T00:00:00", "id": "OPENVAS:1361412562310868123", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310868123", "type": "openvas", "title": "Fedora Update for file FEDORA-2014-9712", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for file FEDORA-2014-9712\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.868123\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2014-08-24 06:05:26 +0200 (Sun, 24 Aug 2014)\");\n script_cve_id(\"CVE-2014-3587\", \"CVE-2013-7345\", \"CVE-2014-2270\", \"CVE-2014-1943\", \"CVE-2012-1571\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_name(\"Fedora Update for file FEDORA-2014-9712\");\n script_tag(name:\"affected\", value:\"file on Fedora 20\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"FEDORA\", value:\"2014-9712\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/pipermail/package-announce/2014-August/136989.html\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'file'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC20\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC20\")\n{\n\n if ((res = isrpmvuln(pkg:\"file\", rpm:\"file~5.19~4.fc20\", rls:\"FC20\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2020-03-17T23:00:33", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-7345"], "description": "The remote host is missing an update announced via the referenced Security Advisory.", "modified": "2020-03-13T00:00:00", "published": "2015-09-08T00:00:00", "id": "OPENVAS:1361412562310120208", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310120208", "type": "openvas", "title": "Amazon Linux: Security Advisory (ALAS-2014-323)", "sourceData": "# Copyright (C) 2015 Eero Volotinen\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) of their respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.120208\");\n script_version(\"2020-03-13T13:19:50+0000\");\n script_tag(name:\"creation_date\", value:\"2015-09-08 13:20:12 +0200 (Tue, 08 Sep 2015)\");\n script_tag(name:\"last_modification\", value:\"2020-03-13 13:19:50 +0000 (Fri, 13 Mar 2020)\");\n script_name(\"Amazon Linux: Security Advisory (ALAS-2014-323)\");\n script_tag(name:\"insight\", value:\"The BEGIN regular expression in the awk script detector in magic/Magdir/commands in file before 5.15 uses multiple wildcards with unlimited repetitions, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted ASCII file that triggers a large amount of backtracking, as demonstrated via a file with many newline characters.\");\n script_tag(name:\"solution\", value:\"Run yum update file to update your system.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"URL\", value:\"https://alas.aws.amazon.com/ALAS-2014-323.html\");\n script_cve_id(\"CVE-2013-7345\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/amazon_linux\", \"ssh/login/release\");\n script_category(ACT_GATHER_INFO);\n script_tag(name:\"summary\", value:\"The remote host is missing an update announced via the referenced Security Advisory.\");\n script_copyright(\"Copyright (C) 2015 Eero Volotinen\");\n script_family(\"Amazon Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"AMAZON\") {\n if(!isnull(res = isrpmvuln(pkg:\"file-static\", rpm:\"file-static~5.11~13.16.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"file-libs\", rpm:\"file-libs~5.11~13.16.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"file-debuginfo\", rpm:\"file-debuginfo~5.11~13.16.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"file\", rpm:\"file~5.11~13.16.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"python-magic\", rpm:\"python-magic~5.11~13.16.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2020-03-17T23:00:52", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-7345"], "description": "The remote host is missing an update announced via the referenced Security Advisory.", "modified": "2020-03-13T00:00:00", "published": "2015-09-08T00:00:00", "id": "OPENVAS:1361412562310120048", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310120048", "type": "openvas", "title": "Amazon Linux: Security Advisory (ALAS-2014-332)", "sourceData": "# Copyright (C) 2015 Eero Volotinen\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) of their respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.120048\");\n script_version(\"2020-03-13T13:19:50+0000\");\n script_tag(name:\"creation_date\", value:\"2015-09-08 13:16:16 +0200 (Tue, 08 Sep 2015)\");\n script_tag(name:\"last_modification\", value:\"2020-03-13 13:19:50 +0000 (Fri, 13 Mar 2020)\");\n script_name(\"Amazon Linux: Security Advisory (ALAS-2014-332)\");\n script_tag(name:\"insight\", value:\"The BEGIN regular expression in the awk script detector in magic/Magdir/commands in file before 5.15 uses multiple wildcards with unlimited repetitions, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted ASCII file that triggers a large amount of backtracking, as demonstrated via a file with many newline characters.\");\n script_tag(name:\"solution\", value:\"Run yum update php55 to update your system.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"URL\", value:\"https://alas.aws.amazon.com/ALAS-2014-332.html\");\n script_cve_id(\"CVE-2013-7345\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/amazon_linux\", \"ssh/login/release\");\n script_category(ACT_GATHER_INFO);\n script_tag(name:\"summary\", value:\"The remote host is missing an update announced via the referenced Security Advisory.\");\n script_copyright(\"Copyright (C) 2015 Eero Volotinen\");\n script_family(\"Amazon Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"AMAZON\") {\n if(!isnull(res = isrpmvuln(pkg:\"php55-cli\", rpm:\"php55-cli~5.5.11~1.71.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php55-soap\", rpm:\"php55-soap~5.5.11~1.71.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php55\", rpm:\"php55~5.5.11~1.71.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php55-pspell\", rpm:\"php55-pspell~5.5.11~1.71.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php55-recode\", rpm:\"php55-recode~5.5.11~1.71.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php55-fpm\", rpm:\"php55-fpm~5.5.11~1.71.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php55-mysqlnd\", rpm:\"php55-mysqlnd~5.5.11~1.71.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php55-common\", rpm:\"php55-common~5.5.11~1.71.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php55-gmp\", rpm:\"php55-gmp~5.5.11~1.71.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php55-embedded\", rpm:\"php55-embedded~5.5.11~1.71.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php55-mcrypt\", rpm:\"php55-mcrypt~5.5.11~1.71.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php55-ldap\", rpm:\"php55-ldap~5.5.11~1.71.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php55-mssql\", rpm:\"php55-mssql~5.5.11~1.71.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php55-imap\", rpm:\"php55-imap~5.5.11~1.71.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php55-intl\", rpm:\"php55-intl~5.5.11~1.71.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php55-dba\", rpm:\"php55-dba~5.5.11~1.71.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php55-xml\", rpm:\"php55-xml~5.5.11~1.71.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php55-bcmath\", rpm:\"php55-bcmath~5.5.11~1.71.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php55-devel\", rpm:\"php55-devel~5.5.11~1.71.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php55-enchant\", rpm:\"php55-enchant~5.5.11~1.71.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php55-odbc\", rpm:\"php55-odbc~5.5.11~1.71.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php55-process\", rpm:\"php55-process~5.5.11~1.71.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php55-mbstring\", rpm:\"php55-mbstring~5.5.11~1.71.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php55-debuginfo\", rpm:\"php55-debuginfo~5.5.11~1.71.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php55-xmlrpc\", rpm:\"php55-xmlrpc~5.5.11~1.71.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php55-pgsql\", rpm:\"php55-pgsql~5.5.11~1.71.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php55-pdo\", rpm:\"php55-pdo~5.5.11~1.71.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php55-tidy\", rpm:\"php55-tidy~5.5.11~1.71.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php55-opcache\", rpm:\"php55-opcache~5.5.11~1.71.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php55-snmp\", rpm:\"php55-snmp~5.5.11~1.71.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php55-gd\", rpm:\"php55-gd~5.5.11~1.71.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2020-03-17T23:00:30", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-7345"], "description": "The remote host is missing an update announced via the referenced Security Advisory.", "modified": "2020-03-13T00:00:00", "published": "2015-09-08T00:00:00", "id": "OPENVAS:1361412562310120047", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310120047", "type": "openvas", "title": "Amazon Linux: Security Advisory (ALAS-2014-333)", "sourceData": "# Copyright (C) 2015 Eero Volotinen\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) of their respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.120047\");\n script_version(\"2020-03-13T13:19:50+0000\");\n script_tag(name:\"creation_date\", value:\"2015-09-08 13:16:16 +0200 (Tue, 08 Sep 2015)\");\n script_tag(name:\"last_modification\", value:\"2020-03-13 13:19:50 +0000 (Fri, 13 Mar 2020)\");\n script_name(\"Amazon Linux: Security Advisory (ALAS-2014-333)\");\n script_tag(name:\"insight\", value:\"The BEGIN regular expression in the awk script detector in magic/Magdir/commands in file before 5.15 uses multiple wildcards with unlimited repetitions, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted ASCII file that triggers a large amount of backtracking, as demonstrated via a file with many newline characters.\");\n script_tag(name:\"solution\", value:\"Run yum update php54 to update your system.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"URL\", value:\"https://alas.aws.amazon.com/ALAS-2014-333.html\");\n script_cve_id(\"CVE-2013-7345\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/amazon_linux\", \"ssh/login/release\");\n script_category(ACT_GATHER_INFO);\n script_tag(name:\"summary\", value:\"The remote host is missing an update announced via the referenced Security Advisory.\");\n script_copyright(\"Copyright (C) 2015 Eero Volotinen\");\n script_family(\"Amazon Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"AMAZON\") {\n if(!isnull(res = isrpmvuln(pkg:\"php54-ldap\", rpm:\"php54-ldap~5.4.27~1.53.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php54-mssql\", rpm:\"php54-mssql~5.4.27~1.53.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php54-process\", rpm:\"php54-process~5.4.27~1.53.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php54-gd\", rpm:\"php54-gd~5.4.27~1.53.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php54-xml\", rpm:\"php54-xml~5.4.27~1.53.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php54-common\", rpm:\"php54-common~5.4.27~1.53.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php54-recode\", rpm:\"php54-recode~5.4.27~1.53.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php54-cli\", rpm:\"php54-cli~5.4.27~1.53.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php54-mcrypt\", rpm:\"php54-mcrypt~5.4.27~1.53.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php54-pgsql\", rpm:\"php54-pgsql~5.4.27~1.53.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php54-xmlrpc\", rpm:\"php54-xmlrpc~5.4.27~1.53.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php54\", rpm:\"php54~5.4.27~1.53.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php54-soap\", rpm:\"php54-soap~5.4.27~1.53.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php54-intl\", rpm:\"php54-intl~5.4.27~1.53.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php54-odbc\", rpm:\"php54-odbc~5.4.27~1.53.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php54-imap\", rpm:\"php54-imap~5.4.27~1.53.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php54-bcmath\", rpm:\"php54-bcmath~5.4.27~1.53.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php54-pdo\", rpm:\"php54-pdo~5.4.27~1.53.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php54-mysql\", rpm:\"php54-mysql~5.4.27~1.53.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php54-snmp\", rpm:\"php54-snmp~5.4.27~1.53.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php54-devel\", rpm:\"php54-devel~5.4.27~1.53.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php54-pspell\", rpm:\"php54-pspell~5.4.27~1.53.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php54-mysqlnd\", rpm:\"php54-mysqlnd~5.4.27~1.53.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php54-embedded\", rpm:\"php54-embedded~5.4.27~1.53.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php54-dba\", rpm:\"php54-dba~5.4.27~1.53.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php54-debuginfo\", rpm:\"php54-debuginfo~5.4.27~1.53.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php54-mbstring\", rpm:\"php54-mbstring~5.4.27~1.53.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php54-fpm\", rpm:\"php54-fpm~5.4.27~1.53.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php54-enchant\", rpm:\"php54-enchant~5.4.27~1.53.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php54-tidy\", rpm:\"php54-tidy~5.4.27~1.53.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2020-03-17T23:01:15", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-7345"], "description": "The remote host is missing an update announced via the referenced Security Advisory.", "modified": "2020-03-13T00:00:00", "published": "2015-09-08T00:00:00", "id": "OPENVAS:1361412562310120475", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310120475", "type": "openvas", "title": "Amazon Linux: Security Advisory (ALAS-2014-342)", "sourceData": "# Copyright (C) 2015 Eero Volotinen\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) of their respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.120475\");\n script_version(\"2020-03-13T13:19:50+0000\");\n script_tag(name:\"creation_date\", value:\"2015-09-08 13:27:16 +0200 (Tue, 08 Sep 2015)\");\n script_tag(name:\"last_modification\", value:\"2020-03-13 13:19:50 +0000 (Fri, 13 Mar 2020)\");\n script_name(\"Amazon Linux: Security Advisory (ALAS-2014-342)\");\n script_tag(name:\"insight\", value:\"The BEGIN regular expression in the awk script detector in magic/Magdir/commands in file before 5.15 uses multiple wildcards with unlimited repetitions, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted ASCII file that triggers a large amount of backtracking, as demonstrated via a file with many newline characters.\");\n script_tag(name:\"solution\", value:\"Run yum update php55 to update your system.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"URL\", value:\"https://alas.aws.amazon.com/ALAS-2014-342.html\");\n script_cve_id(\"CVE-2013-7345\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/amazon_linux\", \"ssh/login/release\");\n script_category(ACT_GATHER_INFO);\n script_tag(name:\"summary\", value:\"The remote host is missing an update announced via the referenced Security Advisory.\");\n script_copyright(\"Copyright (C) 2015 Eero Volotinen\");\n script_family(\"Amazon Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"AMAZON\") {\n if(!isnull(res = isrpmvuln(pkg:\"php55-recode\", rpm:\"php55-recode~5.5.12~1.71.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php55-xml\", rpm:\"php55-xml~5.5.12~1.71.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php55-gmp\", rpm:\"php55-gmp~5.5.12~1.71.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php55-tidy\", rpm:\"php55-tidy~5.5.12~1.71.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php55-cli\", rpm:\"php55-cli~5.5.12~1.71.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php55-process\", rpm:\"php55-process~5.5.12~1.71.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php55-pgsql\", rpm:\"php55-pgsql~5.5.12~1.71.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php55-devel\", rpm:\"php55-devel~5.5.12~1.71.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php55-snmp\", rpm:\"php55-snmp~5.5.12~1.71.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php55-ldap\", rpm:\"php55-ldap~5.5.12~1.71.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php55-soap\", rpm:\"php55-soap~5.5.12~1.71.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php55-xmlrpc\", rpm:\"php55-xmlrpc~5.5.12~1.71.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php55-gd\", rpm:\"php55-gd~5.5.12~1.71.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php55\", rpm:\"php55~5.5.12~1.71.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php55-debuginfo\", rpm:\"php55-debuginfo~5.5.12~1.71.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php55-fpm\", rpm:\"php55-fpm~5.5.12~1.71.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php55-enchant\", rpm:\"php55-enchant~5.5.12~1.71.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php55-common\", rpm:\"php55-common~5.5.12~1.71.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php55-mcrypt\", rpm:\"php55-mcrypt~5.5.12~1.71.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php55-opcache\", rpm:\"php55-opcache~5.5.12~1.71.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php55-odbc\", rpm:\"php55-odbc~5.5.12~1.71.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php55-intl\", rpm:\"php55-intl~5.5.12~1.71.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php55-dba\", rpm:\"php55-dba~5.5.12~1.71.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php55-mysqlnd\", rpm:\"php55-mysqlnd~5.5.12~1.71.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php55-imap\", rpm:\"php55-imap~5.5.12~1.71.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php55-pspell\", rpm:\"php55-pspell~5.5.12~1.71.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php55-mbstring\", rpm:\"php55-mbstring~5.5.12~1.71.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php55-bcmath\", rpm:\"php55-bcmath~5.5.12~1.71.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php55-pdo\", rpm:\"php55-pdo~5.5.12~1.71.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php55-embedded\", rpm:\"php55-embedded~5.5.12~1.71.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"php55-mssql\", rpm:\"php55-mssql~5.5.12~1.71.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}], "securityvulns": [{"lastseen": "2018-08-31T11:09:54", "bulletinFamily": "software", "cvelist": ["CVE-2013-7345", "CVE-2014-1943", "CVE-2014-2270"], "description": "Infinite recursion on some file types detection, buffer overread, CPU exhaustion.", "edition": 1, "modified": "2014-05-04T00:00:00", "published": "2014-05-04T00:00:00", "id": "SECURITYVULNS:VULN:13572", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:13572", "title": "file utility / libmagic / PHP DoS", "type": "securityvulns", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2018-08-31T11:10:51", "bulletinFamily": "software", "cvelist": ["CVE-2013-7345"], "description": "\r\n\r\n\r\n-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA1\r\n\r\n[slackware-security] php (SSA:2014-111-02)\r\n\r\nNew php packages are available for Slackware 14.0, 14.1, and -current to\r\nfix a security issue.\r\n\r\n\r\nHere are the details from the Slackware 14.1 ChangeLog:\r\n+--------------------------+\r\npatches/packages/php-5.4.27-i486-1_slack14.1.txz: Upgraded.\r\n This update fixes a security issue in the in the awk script detector\r\n which allows context-dependent attackers to cause a denial of service\r\n (CPU consumption) via a crafted ASCII file that triggers a large amount\r\n of backtracking.\r\n For more information, see:\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7345\r\n (* Security fix *)\r\n+--------------------------+\r\n\r\n\r\nWhere to find the new packages:\r\n+-----------------------------+\r\n\r\nThanks to the friendly folks at the OSU Open Source Lab\r\n(http://osuosl.org) for donating FTP and rsync hosting\r\nto the Slackware project! \r\n\r\nAlso see the "Get Slack" section on http://slackware.com for\r\nadditional mirror sites near you.\r\n\r\nUpdated package for Slackware 14.0:\r\nftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/php-5.4.27-i486-1_slack14.0.txz\r\n\r\nUpdated package for Slackware x86_64 14.0:\r\nftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/php-5.4.27-x86_64-1_slack14.0.txz\r\n\r\nUpdated package for Slackware 14.1:\r\nftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/php-5.4.27-i486-1_slack14.1.txz\r\n\r\nUpdated package for Slackware x86_64 14.1:\r\nftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/php-5.4.27-x86_64-1_slack14.1.txz\r\n\r\nUpdated package for Slackware -current:\r\nftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/php-5.4.27-i486-1.txz\r\n\r\nUpdated package for Slackware x86_64 -current:\r\nftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/php-5.4.27-x86_64-1.txz\r\n\r\n\r\nMD5 signatures:\r\n+-------------+\r\n\r\nSlackware 14.0 package:\r\n4b2cf92d4630552eb1d5d2ffe43e3e85 php-5.4.27-i486-1_slack14.0.txz\r\n\r\nSlackware x86_64 14.0 package:\r\n7f1c76279a73ece133fa0f0b3e3afaca php-5.4.27-x86_64-1_slack14.0.txz\r\n\r\nSlackware 14.1 package:\r\nc2f2a8a0077b94cbb725389de802ad20 php-5.4.27-i486-1_slack14.1.txz\r\n\r\nSlackware x86_64 14.1 package:\r\n62ad0a4511e91f2d7ce94c5b9caffa7a php-5.4.27-x86_64-1_slack14.1.txz\r\n\r\nSlackware -current package:\r\n647463455eec2306f36eafd1ea61dd31 n/php-5.4.27-i486-1.txz\r\n\r\nSlackware x86_64 -current package:\r\n966c42fc092a8d4c2b7d6113ed8cbfcf n/php-5.4.27-x86_64-1.txz\r\n\r\n\r\nInstallation instructions:\r\n+------------------------+\r\n\r\nUpgrade the package as root:\r\n# upgradepkg php-5.4.27-i486-1_slack14.1.txz\r\n\r\nThen, restart Apache httpd:\r\n# /etc/rc.d/rc.httpd stop\r\n# /etc/rc.d/rc.httpd start\r\n\r\n\r\n+-----+\r\n\r\nSlackware Linux Security Team\r\nhttp://slackware.com/gpg-key\r\nsecurity@slackware.com\r\n\r\n+------------------------------------------------------------------------+\r\n| To leave the slackware-security mailing list: |\r\n+------------------------------------------------------------------------+\r\n| Send an email to majordomo@slackware.com with this text in the body of |\r\n| the email message: |\r\n| |\r\n| unsubscribe slackware-security |\r\n| |\r\n| You will get a confirmation message back containing instructions to |\r\n| complete the process. Please do not reply to this email address. |\r\n+------------------------------------------------------------------------+\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG v1\r\n\r\niEYEARECAAYFAlNVgj0ACgkQakRjwEAQIjMTkQCfRToFksXPg7ij7xnGORA1qHjq\r\nn3UAmgJvKYZZmjlB4zlYyLsmP9r69o7A\r\n=lFln\r\n-----END PGP SIGNATURE-----\r\n\r\n", "edition": 1, "modified": "2014-05-04T00:00:00", "published": "2014-05-04T00:00:00", "id": "SECURITYVULNS:DOC:30549", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:30549", "title": "[slackware-security] php (SSA:2014-111-02)", "type": "securityvulns", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2018-08-31T11:10:50", "bulletinFamily": "software", "cvelist": ["CVE-2014-2270"], "description": "\r\n\r\n-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA512\r\n\r\n- -------------------------------------------------------------------------\r\nDebian Security Advisory DSA-2873-1 security@debian.org\r\nhttp://www.debian.org/security/ Salvatore Bonaccorso\r\nMarch 11, 2014 http://www.debian.org/security/faq\r\n- -------------------------------------------------------------------------\r\n\r\nPackage : file\r\nVulnerability : several\r\nCVE ID : CVE-2014-2270\r\nDebian Bug : 703993\r\n\r\nSeveral vulnerabilities have been found in file, a file type\r\nclassification tool.\r\n\r\nAaron Reffett reported a flaw in the way the file utility determined the\r\ntype of Portable Executable (PE) format files, the executable format\r\nused on Windows. When processing a defective or intentionally prepared\r\nPE executable which contains invalid offset information, the\r\nfile_strncmp routine will access memory that is out of bounds, causing\r\nfile to crash. The Common Vulnerabilities and Exposures project ID\r\nCVE-2014-2270 has been assigned to identify this flaw.\r\n\r\nMike Frysinger reported that file's rule for detecting AWK scripts\r\nsignificantly slows down file. The regular expression to detect AWK\r\nfiles contained two star operators, which could be exploited to cause\r\nexcessive backtracking in the regex engine.\r\n\r\nFor the oldstable distribution (squeeze), these problems have been fixed\r\nin version 5.04-5+squeeze4.\r\n\r\nFor the stable distribution (wheezy), these problems have been fixed in\r\nversion 5.11-2+deb7u2.\r\n\r\nFor the testing distribution (jessie), these problems have been fixed in\r\nversion 1:5.17-1.\r\n\r\nFor the unstable distribution (sid), these problems have been fixed in\r\nversion 1:5.17-1.\r\n\r\nWe recommend that you upgrade your file packages.\r\n\r\nFurther information about Debian Security Advisories, how to apply\r\nthese updates to your system and frequently asked questions can be\r\nfound at: http://www.debian.org/security/\r\n\r\nMailing list: debian-security-announce@lists.debian.org\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG v1\r\n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\r\n1MZF2p4X9YDoBVTtek+n\r\n=Wumm\r\n-----END PGP SIGNATURE-----\r\n", "edition": 1, "modified": "2014-03-13T00:00:00", "published": "2014-03-13T00:00:00", "id": "SECURITYVULNS:DOC:30351", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:30351", "title": "[SECURITY] [DSA 2873-1] file security update", "type": "securityvulns", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2018-08-31T11:10:50", "bulletinFamily": "software", "cvelist": ["CVE-2013-7327", "CVE-2014-1943", "CVE-2014-2270"], "description": "\r\n\r\n-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA1\r\n\r\n _______________________________________________________________________\r\n\r\n Mandriva Linux Security Advisory MDVSA-2014:059\r\n http://www.mandriva.com/en/support/security/\r\n _______________________________________________________________________\r\n\r\n Package : php\r\n Date : March 14, 2014\r\n Affected: Business Server 1.0\r\n _______________________________________________________________________\r\n\r\n Problem Description:\r\n\r\n Multiple vulnerabilities has been discovered and corrected in php:\r\n \r\n Fixed bug #66731 (file: infinite recursion (CVE-2014-1943)).\r\n \r\n Fixed bug #66820 (out-of-bounds memory access in fileinfo\r\n (CVE-2014-2270)).\r\n \r\n Fixed bug #66815 (imagecrop(): insufficient fix for NULL defer\r\n (CVE-2013-7327)).\r\n \r\n The updated php packages have been upgraded to the 5.5.10 version\r\n which is not vulnerable to these issues.\r\n \r\n The php-xdebug packages has been upgraded to the latest 2.2.4 version\r\n that resolves numerous upstream bugs.\r\n \r\n Additionally, the PECL packages which requires so has been rebuilt\r\n for php-5.5.10.\r\n _______________________________________________________________________\r\n\r\n References:\r\n\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1943\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2270\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7327\r\n http://www.php.net/ChangeLog-5.php#5.5.10\r\n https://bugs.php.net/bug.php?id=66731\r\n https://bugs.php.net/bug.php?id=66820\r\n https://bugs.php.net/bug.php?id=66815\r\n http://pecl.php.net/package-changelog.php?package=xdebug&release=2.2.4\r\n _______________________________________________________________________\r\n\r\n Updated Packages:\r\n\r\n Mandriva Business Server 1/X86_64:\r\n 24737449ee336d5e9824e2f2ae543292 mbs1/x86_64/apache-mod_php-5.5.10-1.1.mbs1.x86_64.rpm\r\n 0b922c54fa9223fecc8d35a5c7c8599e mbs1/x86_64/lib64php5_common5-5.5.10-1.1.mbs1.x86_64.rpm\r\n 7ee561479c57d59fd98a5501e9586500 mbs1/x86_64/php-apc-3.1.15-1.4.mbs1.x86_64.rpm\r\n eb7de5759296f86517f5edfd9d4436ca mbs1/x86_64/php-apc-admin-3.1.15-1.4.mbs1.x86_64.rpm\r\n a1d9c94696da01a54ef8fdc514e87eeb mbs1/x86_64/php-bcmath-5.5.10-1.1.mbs1.x86_64.rpm\r\n 1b2cd506955bff2be731071a094c722f mbs1/x86_64/php-bz2-5.5.10-1.1.mbs1.x86_64.rpm\r\n 8960e53771c38895428275376133ad80 mbs1/x86_64/php-calendar-5.5.10-1.1.mbs1.x86_64.rpm\r\n 76ae075f4cb8bbd735289a6c1d06fd7a mbs1/x86_64/php-cgi-5.5.10-1.1.mbs1.x86_64.rpm\r\n 12b695df15e1f8cb7b0a4dfe6c9aa088 mbs1/x86_64/php-cli-5.5.10-1.1.mbs1.x86_64.rpm\r\n f8f5f6b8ed7afaffe4893ee713198f96 mbs1/x86_64/php-ctype-5.5.10-1.1.mbs1.x86_64.rpm\r\n 1950d33f015eefc8014070526758ee8e mbs1/x86_64/php-curl-5.5.10-1.1.mbs1.x86_64.rpm\r\n 9497d5da046377151644e93733cb074e mbs1/x86_64/php-dba-5.5.10-1.1.mbs1.x86_64.rpm\r\n ac662e5ef7059d81cccb62c7bbe97901 mbs1/x86_64/php-devel-5.5.10-1.1.mbs1.x86_64.rpm\r\n 87a743ba4947af120c24da6115c7e6db mbs1/x86_64/php-doc-5.5.10-1.1.mbs1.noarch.rpm\r\n b941027ff5051dc2811b4263f6bf20b1 mbs1/x86_64/php-dom-5.5.10-1.1.mbs1.x86_64.rpm\r\n 77c456007f9d6e330bfa514dc7e2c71c mbs1/x86_64/php-enchant-5.5.10-1.1.mbs1.x86_64.rpm\r\n e14bbbfe6cbd0027eb92f2de676bda2b mbs1/x86_64/php-exif-5.5.10-1.1.mbs1.x86_64.rpm\r\n 016db3c40dafc614f69ed163870d0ba9 mbs1/x86_64/php-fileinfo-5.5.10-1.1.mbs1.x86_64.rpm\r\n 800722c1127bf7f835fed88d5805612a mbs1/x86_64/php-filter-5.5.10-1.1.mbs1.x86_64.rpm\r\n c25709c616879f64ca095493a250e49a mbs1/x86_64/php-fpm-5.5.10-1.1.mbs1.x86_64.rpm\r\n dd3b14133c3e5e299976709acaba36f1 mbs1/x86_64/php-ftp-5.5.10-1.1.mbs1.x86_64.rpm\r\n 33285cc7d2f89640c84a89c2d78d4c1c mbs1/x86_64/php-gd-5.5.10-1.1.mbs1.x86_64.rpm\r\n 98815ed19f6a439995c257c86d3fd8e7 mbs1/x86_64/php-gettext-5.5.10-1.1.mbs1.x86_64.rpm\r\n 2c34c8d28d2bcf105deced29a743ce10 mbs1/x86_64/php-gmp-5.5.10-1.1.mbs1.x86_64.rpm\r\n 66f17761f797c9ba5b9f64359df0e444 mbs1/x86_64/php-hash-5.5.10-1.1.mbs1.x86_64.rpm\r\n a9679cf58298c91fe11e9065888f3ecf mbs1/x86_64/php-iconv-5.5.10-1.1.mbs1.x86_64.rpm\r\n 44c8fd8cbd7a749ce405eafcb5cfaba0 mbs1/x86_64/php-imap-5.5.10-1.1.mbs1.x86_64.rpm\r\n de60f25c3e3da02a1ed96ea3c6b7d146 mbs1/x86_64/php-ini-5.5.10-1.1.mbs1.x86_64.rpm\r\n 674171b2daf508b7709ec0fa39f3dadb mbs1/x86_64/php-intl-5.5.10-1.1.mbs1.x86_64.rpm\r\n b4b75e252c03be45e1ea42d93cbb559d mbs1/x86_64/php-json-5.5.10-1.1.mbs1.x86_64.rpm\r\n 10071e1f44d3ec6500559211168c3b4a mbs1/x86_64/php-ldap-5.5.10-1.1.mbs1.x86_64.rpm\r\n 4b7e7d0a0b6adcca257a2fd124e62c58 mbs1/x86_64/php-mbstring-5.5.10-1.1.mbs1.x86_64.rpm\r\n 19345fe51062884bd7c9ff80f49dcbdb mbs1/x86_64/php-mcrypt-5.5.10-1.1.mbs1.x86_64.rpm\r\n e2a844b656f9ab03b731ad2f272b5d2b mbs1/x86_64/php-mssql-5.5.10-1.1.mbs1.x86_64.rpm\r\n 4fcf706c941176818fdfc995fba8209c mbs1/x86_64/php-mysql-5.5.10-1.1.mbs1.x86_64.rpm\r\n 46c3635f1e79e351b2d63d7be993557b mbs1/x86_64/php-mysqli-5.5.10-1.1.mbs1.x86_64.rpm\r\n 6b652b39093992140614a97e4633ee52 mbs1/x86_64/php-mysqlnd-5.5.10-1.1.mbs1.x86_64.rpm\r\n d8712b4ec5533dd53c3e1a6854a41612 mbs1/x86_64/php-odbc-5.5.10-1.1.mbs1.x86_64.rpm\r\n 58da4457f76d98468fbc2216a82a6210 mbs1/x86_64/php-opcache-5.5.10-1.1.mbs1.x86_64.rpm\r\n 67847c07b4d21ef262864d25a633d70a mbs1/x86_64/php-openssl-5.5.10-1.1.mbs1.x86_64.rpm\r\n daf97d8271493a2ecbd18ad20a857bcf mbs1/x86_64/php-pcntl-5.5.10-1.1.mbs1.x86_64.rpm\r\n 4a6aed5d64de832c986caa41d4a99919 mbs1/x86_64/php-pdo-5.5.10-1.1.mbs1.x86_64.rpm\r\n 38358c84106e4f5c86704c92f09a4852 mbs1/x86_64/php-pdo_dblib-5.5.10-1.1.mbs1.x86_64.rpm\r\n f5f013d46693b257672a53333c1d2aef mbs1/x86_64/php-pdo_mysql-5.5.10-1.1.mbs1.x86_64.rpm\r\n a052eca4ad1c2fa1aa2cc5a492864959 mbs1/x86_64/php-pdo_odbc-5.5.10-1.1.mbs1.x86_64.rpm\r\n e5e592546df1d334c3bd8e26be14784e mbs1/x86_64/php-pdo_pgsql-5.5.10-1.1.mbs1.x86_64.rpm\r\n bfe91133e7dd8ecd326d033f09156fd5 mbs1/x86_64/php-pdo_sqlite-5.5.10-1.1.mbs1.x86_64.rpm\r\n cec3e2d7281150e42c138375c7047392 mbs1/x86_64/php-pgsql-5.5.10-1.1.mbs1.x86_64.rpm\r\n 45a7eefb527a69d733e121d6814e4294 mbs1/x86_64/php-phar-5.5.10-1.1.mbs1.x86_64.rpm\r\n 093b385f0d0b46e3f6fd33f914548a0a mbs1/x86_64/php-posix-5.5.10-1.1.mbs1.x86_64.rpm\r\n 5864c26cd75dbe4f3c78b369081f0438 mbs1/x86_64/php-readline-5.5.10-1.1.mbs1.x86_64.rpm\r\n d0f41537a40bd91a5f1f3a8ca5fde200 mbs1/x86_64/php-recode-5.5.10-1.1.mbs1.x86_64.rpm\r\n ad5ab348291e6b2e5a4eb3bb33ce8a2f mbs1/x86_64/php-session-5.5.10-1.1.mbs1.x86_64.rpm\r\n cf9882756cfc5ca36ceffe23a148bb47 mbs1/x86_64/php-shmop-5.5.10-1.1.mbs1.x86_64.rpm\r\n 74b1621ca81142e93046925bed22a5e8 mbs1/x86_64/php-snmp-5.5.10-1.1.mbs1.x86_64.rpm\r\n 80e3ba9497626214b3bcc2712f60ac5f mbs1/x86_64/php-soap-5.5.10-1.1.mbs1.x86_64.rpm\r\n 9de06a2dee1e54d7f42a33a17ca8205b mbs1/x86_64/php-sockets-5.5.10-1.1.mbs1.x86_64.rpm\r\n c030bff618bbcb037e812ddb94649eb5 mbs1/x86_64/php-sqlite3-5.5.10-1.1.mbs1.x86_64.rpm\r\n b65a0c3e62630b815656e80da43a2480 mbs1/x86_64/php-sybase_ct-5.5.10-1.1.mbs1.x86_64.rpm\r\n be0694c255784a0a4f35f0e8d15f201b mbs1/x86_64/php-sysvmsg-5.5.10-1.1.mbs1.x86_64.rpm\r\n 80ad06376f143a770cfb5cba1d848af2 mbs1/x86_64/php-sysvsem-5.5.10-1.1.mbs1.x86_64.rpm\r\n 20ee2f4ab2344649920c7ea75d251229 mbs1/x86_64/php-sysvshm-5.5.10-1.1.mbs1.x86_64.rpm\r\n 756a95f3f9caf872ca3e656ae2c8f6e1 mbs1/x86_64/php-tidy-5.5.10-1.1.mbs1.x86_64.rpm\r\n ea69b8f0630a5016589c5340e9f8cb08 mbs1/x86_64/php-tokenizer-5.5.10-1.1.mbs1.x86_64.rpm\r\n 9120358796e07a057bcb49b3f7a3287a mbs1/x86_64/php-wddx-5.5.10-1.1.mbs1.x86_64.rpm\r\n 140204bf0eb22cbaa71392c87217730b mbs1/x86_64/php-xdebug-2.2.4-1.mbs1.x86_64.rpm\r\n d8f2b85bd082332a608612deeee0a527 mbs1/x86_64/php-xml-5.5.10-1.1.mbs1.x86_64.rpm\r\n 1373b28914b0e1fc52d98e8599ab5286 mbs1/x86_64/php-xmlreader-5.5.10-1.1.mbs1.x86_64.rpm\r\n 24767241f254b25cf40f22c5b42009d4 mbs1/x86_64/php-xmlrpc-5.5.10-1.1.mbs1.x86_64.rpm\r\n ebe5805c7fc2ba228019f461f666d53f mbs1/x86_64/php-xmlwriter-5.5.10-1.1.mbs1.x86_64.rpm\r\n d8e5137af8780fb2aa1588d926ea5214 mbs1/x86_64/php-xsl-5.5.10-1.1.mbs1.x86_64.rpm\r\n 8e7ec6219aa8ec67b7e34752266fd0c3 mbs1/x86_64/php-zip-5.5.10-1.1.mbs1.x86_64.rpm\r\n 02eaebe931a02fa3b7aeee6f90078b59 mbs1/x86_64/php-zlib-5.5.10-1.1.mbs1.x86_64.rpm \r\n d32d95daec74ca968d0143f9bb4c39aa mbs1/SRPMS/php-5.5.10-1.1.mbs1.src.rpm\r\n cef70e625abea16578f7234743896bae mbs1/SRPMS/php-apc-3.1.15-1.4.mbs1.src.rpm\r\n 015ce9f2892ee94a3a73a8a15bdc58fd mbs1/SRPMS/php-xdebug-2.2.4-1.mbs1.src.rpm\r\n _______________________________________________________________________\r\n\r\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\r\n of md5 checksums and GPG signatures is performed automatically for you.\r\n\r\n All packages are signed by Mandriva for security. You can obtain the\r\n GPG public key of the Mandriva Security Team by executing:\r\n\r\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\r\n\r\n You can view other update advisories for Mandriva Linux at:\r\n\r\n http://www.mandriva.com/en/support/security/advisories/\r\n\r\n If you want to report vulnerabilities, please contact\r\n\r\n security_(at)_mandriva.com\r\n _______________________________________________________________________\r\n\r\n Type Bits/KeyID Date User ID\r\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\r\n <security*mandriva.com>\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG v1.4.12 (GNU/Linux)\r\n\r\niD8DBQFTIsvKmqjQ0CJFipgRApfjAKDHpy/8XvFn1A9/+/8RG+R6WCKbiwCfdgcv\r\nHD1vXz3eegn3ApmAVUKBfiE=\r\n=+nza\r\n-----END PGP SIGNATURE-----\r\n", "edition": 1, "modified": "2014-03-18T00:00:00", "published": "2014-03-18T00:00:00", "id": "SECURITYVULNS:DOC:30369", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:30369", "title": "[ MDVSA-2014:059 ] php", "type": "securityvulns", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "fedora": [{"lastseen": "2020-12-21T08:17:52", "bulletinFamily": "unix", "cvelist": ["CVE-2013-7345", "CVE-2014-1943", "CVE-2014-2270"], "description": "The file command is used to identify a particular file according to the type of data contained by the file. File can identify many different file types, including ELF binaries, system libraries, RPM packages, and different graphics formats. ", "modified": "2014-03-27T04:52:02", "published": "2014-03-27T04:52:02", "id": "FEDORA:3655A220FE", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 20 Update: file-5.14-20.fc20", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2020-12-21T08:17:52", "bulletinFamily": "unix", "cvelist": ["CVE-2012-1571", "CVE-2013-7345", "CVE-2014-1943", "CVE-2014-2270", "CVE-2014-3587"], "description": "The file command is used to identify a particular file according to the type of data contained by the file. File can identify many different file types, including ELF binaries, system libraries, RPM packages, and different graphics formats. ", "modified": "2014-08-24T02:55:59", "published": "2014-08-24T02:55:59", "id": "FEDORA:0693C22D72", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 20 Update: file-5.19-4.fc20", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2020-12-21T08:17:52", "bulletinFamily": "unix", "cvelist": ["CVE-2013-7345", "CVE-2014-1943", "CVE-2014-2270", "CVE-2014-3587", "CVE-2014-3710"], "description": "The file command is used to identify a particular file according to the type of data contained by the file. File can identify many different file types, including ELF binaries, system libraries, RPM packages, and different graphics formats. ", "modified": "2014-10-29T11:03:54", "published": "2014-10-29T11:03:54", "id": "FEDORA:DE89B60D43C9", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 20 Update: file-5.19-7.fc20", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2020-12-21T08:17:52", "bulletinFamily": "unix", "cvelist": ["CVE-2013-6420", "CVE-2013-7345"], "description": "PHP is an HTML-embedded scripting language. PHP attempts to make it easy for developers to write dynamically generated web pages. PHP also offers built-in database integration for several commercial and non-commercial database management systems, so writing a database-enabled webpage with PHP is fairly simple. The most common use of PHP coding is probably as a replacement for CGI scripts. The php package contains the module (often referred to as mod_php) which adds support for the PHP language to Apache HTTP Server. ", "modified": "2014-04-15T15:57:56", "published": "2014-04-15T15:57:56", "id": "FEDORA:A66B9227B3", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 20 Update: php-5.5.11-1.fc20", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-12-21T08:17:52", "bulletinFamily": "unix", "cvelist": ["CVE-2014-1943", "CVE-2014-2270"], "description": "The file command is used to identify a particular file according to the type of data contained by the file. File can identify many different file types, including ELF binaries, system libraries, RPM packages, and different graphics formats. ", "modified": "2014-03-12T12:31:06", "published": "2014-03-12T12:31:06", "id": "FEDORA:9CAEF22111", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 20 Update: file-5.14-17.fc20", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2020-12-21T08:17:52", "bulletinFamily": "unix", "cvelist": ["CVE-2014-1943", "CVE-2014-2270"], "description": "The file command is used to identify a particular file according to the type of data contained by the file. File can identify many different file types, including ELF binaries, system libraries, RPM packages, and different graphics formats. ", "modified": "2014-03-27T04:47:52", "published": "2014-03-27T04:47:52", "id": "FEDORA:0B4DC2057B", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 19 Update: file-5.11-13.fc19", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2020-12-21T08:17:52", "bulletinFamily": "unix", "cvelist": ["CVE-2013-6420", "CVE-2014-1943", "CVE-2014-2270"], "description": "PHP is an HTML-embedded scripting language. PHP attempts to make it easy for developers to write dynamically generated web pages. PHP also offers built-in database integration for several commercial and non-commercial database management systems, so writing a database-enabled webpage with PHP is fairly simple. The most common use of PHP coding is probably as a replacement for CGI scripts. The php package contains the module (often referred to as mod_php) which adds support for the PHP language to Apache HTTP Server. ", "modified": "2014-03-09T04:40:51", "published": "2014-03-09T04:40:51", "id": "FEDORA:4D69320F06", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 20 Update: php-5.5.10-1.fc20", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-12-21T08:17:52", "bulletinFamily": "unix", "cvelist": ["CVE-2012-1571", "CVE-2013-7345", "CVE-2014-0207", "CVE-2014-0237", "CVE-2014-1943", "CVE-2014-2270", "CVE-2014-3478", "CVE-2014-3479", "CVE-2014-3480", "CVE-2014-3487", "CVE-2014-3538"], "description": "The file command is used to identify a particular file according to the type of data contained by the file. File can identify many different file types, including ELF binaries, system libraries, RPM packages, and different graphics formats. ", "modified": "2014-07-05T14:54:09", "published": "2014-07-05T14:54:09", "id": "FEDORA:C332D21937", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 20 Update: file-5.19-1.fc20", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}], "freebsd": [{"lastseen": "2019-05-29T18:32:35", "bulletinFamily": "unix", "cvelist": ["CVE-2013-7345", "CVE-2014-1943", "CVE-2012-1571", "CVE-2014-2270"], "description": "\nProblem Description:\nA specifically crafted Composite Document File (CDF)\n\tfile can trigger an out-of-bounds read or an invalid pointer\n\tdereference. [CVE-2012-1571]\nA flaw in regular expression in the awk script detector\n\tmakes use of multiple wildcards with unlimited repetitions.\n\t[CVE-2013-7345]\nA malicious input file could trigger infinite recursion\n\tin libmagic(3). [CVE-2014-1943]\nA specifically crafted Portable Executable (PE) can\n\ttrigger out-of-bounds read. [CVE-2014-2270]\nImpact:\nAn attacker who can cause file(1) or any other applications\n\tusing the libmagic(3) library to be run on a maliciously\n\tconstructed input can the application to crash or consume\n\texcessive CPU resources, resulting in a denial-of-service.\n", "edition": 4, "modified": "2014-06-24T00:00:00", "published": "2014-06-24T00:00:00", "id": "70140F20-6007-11E6-A6C3-14DAE9D210B8", "href": "https://vuxml.freebsd.org/freebsd/70140f20-6007-11e6-a6c3-14dae9d210b8.html", "title": "FreeBSD -- Multiple vulnerabilities in file(1) and libmagic(3)", "type": "freebsd", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-05-29T18:33:29", "bulletinFamily": "unix", "cvelist": ["CVE-2014-2270"], "description": "\nAaron Reffett reports:\n\nsoftmagic.c in file ... and libmagic allows context-dependent\n\t attackers to cause a denial of service (out-of-bounds memory access and\n\t crash) via crafted offsets in the softmagic of a PE executable.\n\n", "edition": 4, "modified": "2013-12-20T00:00:00", "published": "2013-12-20T00:00:00", "id": "7E61A839-B714-11E3-8195-001966155BEA", "href": "https://vuxml.freebsd.org/freebsd/7e61a839-b714-11e3-8195-001966155bea.html", "title": "file -- out-of-bounds access in search rules with offsets from input file", "type": "freebsd", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}], "nessus": [{"lastseen": "2021-01-06T10:53:21", "description": "A specifically crafted Composite Document File (CDF) file can trigger\nan out-of-bounds read or an invalid pointer dereference.\n[CVE-2012-1571]\n\nA flaw in regular expression in the awk script detector makes use of\nmultiple wildcards with unlimited repetitions. [CVE-2013-7345]\n\nA malicious input file could trigger infinite recursion in\nlibmagic(3). [CVE-2014-1943]\n\nA specifically crafted Portable Executable (PE) can trigger\nout-of-bounds read. [CVE-2014-2270] Impact : An attacker who can cause\nfile(1) or any other applications using the libmagic(3) library to be\nrun on a maliciously constructed input can the application to crash or\nconsume excessive CPU resources, resulting in a denial-of-service.", "edition": 25, "published": "2016-08-12T00:00:00", "title": "FreeBSD : FreeBSD -- Multiple vulnerabilities in file(1) and libmagic(3) (70140f20-6007-11e6-a6c3-14dae9d210b8)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-7345", "CVE-2014-1943", "CVE-2012-1571", "CVE-2014-2270"], "modified": "2016-08-12T00:00:00", "cpe": ["cpe:/o:freebsd:freebsd", "p-cpe:/a:freebsd:freebsd:FreeBSD"], "id": "FREEBSD_PKG_70140F20600711E6A6C314DAE9D210B8.NASL", "href": "https://www.tenable.com/plugins/nessus/92905", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2018 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(92905);\n script_version(\"2.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2012-1571\", \"CVE-2013-7345\", \"CVE-2014-1943\", \"CVE-2014-2270\");\n script_bugtraq_id(52225, 65596, 66002, 66406);\n script_xref(name:\"FreeBSD\", value:\"SA-14:16.file\");\n\n script_name(english:\"FreeBSD : FreeBSD -- Multiple vulnerabilities in file(1) and libmagic(3) (70140f20-6007-11e6-a6c3-14dae9d210b8)\");\n script_summary(english:\"Checks for updated packages in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote FreeBSD host is missing one or more security-related\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"A specifically crafted Composite Document File (CDF) file can trigger\nan out-of-bounds read or an invalid pointer dereference.\n[CVE-2012-1571]\n\nA flaw in regular expression in the awk script detector makes use of\nmultiple wildcards with unlimited repetitions. [CVE-2013-7345]\n\nA malicious input file could trigger infinite recursion in\nlibmagic(3). [CVE-2014-1943]\n\nA specifically crafted Portable Executable (PE) can trigger\nout-of-bounds read. [CVE-2014-2270] Impact : An attacker who can cause\nfile(1) or any other applications using the libmagic(3) library to be\nrun on a maliciously constructed input can the application to crash or\nconsume excessive CPU resources, resulting in a denial-of-service.\"\n );\n # https://vuxml.freebsd.org/freebsd/70140f20-6007-11e6-a6c3-14dae9d210b8.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?904617ed\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:FreeBSD\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/06/24\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/08/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/08/12\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\", \"Settings/ParanoidReport\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nif (report_paranoia < 2) audit(AUDIT_PARANOID);\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"FreeBSD>=10.0<10.0_6\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"FreeBSD>=9.2<9.2_9\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"FreeBSD>=9.1<9.1_16\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"FreeBSD>=8.4<8.4_13\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:pkg_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-01-01T04:54:29", "description": "According to its banner, the version of PHP 5.4.x installed on the\nremote host is a version prior to 5.4.27. It is, therefore,\npotentially affected by a denial of service vulnerability.\n\nA flaw exists in the awk script detector within magic/Magdir/commands\nwhere multiple wildcards with unlimited repetitions are used. This\ncould allow a context dependent attacker to cause a denial of service\nwith a specially crafted ASCII file.\n\nNote that this plugin has not attempted to exploit this issue, but\ninstead relied only on PHP's self-reported version number.", "edition": 25, "published": "2014-04-04T00:00:00", "title": "PHP 5.4.x < 5.4.27 awk Magic Parsing BEGIN DoS", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-7345"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/a:php:php"], "id": "PHP_5_4_27.NASL", "href": "https://www.tenable.com/plugins/nessus/73338", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(73338);\n script_version(\"1.5\");\n script_cvs_date(\"Date: 2019/11/26\");\n\n script_cve_id(\"CVE-2013-7345\");\n script_bugtraq_id(66406);\n\n script_name(english:\"PHP 5.4.x < 5.4.27 awk Magic Parsing BEGIN DoS\");\n script_summary(english:\"Checks version of PHP\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote web server uses a version of PHP that is potentially\naffected by a denial of service vulnerability.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to its banner, the version of PHP 5.4.x installed on the\nremote host is a version prior to 5.4.27. It is, therefore,\npotentially affected by a denial of service vulnerability.\n\nA flaw exists in the awk script detector within magic/Magdir/commands\nwhere multiple wildcards with unlimited repetitions are used. This\ncould allow a context dependent attacker to cause a denial of service\nwith a specially crafted ASCII file.\n\nNote that this plugin has not attempted to exploit this issue, but\ninstead relied only on PHP's self-reported version number.\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.php.net/ChangeLog-5.php#5.4.27\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to PHP version 5.4.27 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2013-7345\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No exploit is required\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2011/12/31\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/04/03\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/04/04\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"remote\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:php:php\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"CGI abuses\");\n\n script_copyright(english:\"This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"php_version.nasl\");\n script_require_keys(\"www/PHP\");\n script_require_ports(\"Services/www\", 80);\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"http.inc\");\ninclude(\"webapp_func.inc\");\n\nport = get_http_port(default:80, php:TRUE);\n\nphp = get_php_from_kb(\n port : port,\n exit_on_fail : TRUE\n);\n\nversion = php[\"ver\"];\nsource = php[\"src\"];\n\nbackported = get_kb_item('www/php/'+port+'/'+version+'/backported');\n\nif (report_paranoia < 2 && backported) audit(AUDIT_BACKPORT_SERVICE, port, \"PHP \"+version+\" install\");\n\n# Check that it is the correct version of PHP\nif (version =~ \"^5(\\.4)?$\") audit(AUDIT_VER_NOT_GRANULAR, \"PHP\", port, version);\nif (version !~ \"^5\\.4\\.\") audit(AUDIT_NOT_DETECT, \"PHP version 5.4.x\", port);\n\nif (version =~ \"^5\\.4\\.([0-9]|1[0-9]|2[0-6])($|[^0-9])\")\n{\n if (report_verbosity > 0)\n {\n report =\n '\\n Version source : '+source +\n '\\n Installed version : '+version+\n '\\n Fixed version : 5.4.27\\n';\n security_warning(port:port, extra:report);\n }\n else security_warning(port);\n exit(0);\n}\nelse audit(AUDIT_LISTEN_NOT_VULN, \"PHP\", port, version);\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2020-06-05T11:12:16", "description": "file was updated to fix extensive backtracking in awk rule regular\nexpression which could lead to a CPU consumption denial of service.", "edition": 17, "published": "2014-06-13T00:00:00", "title": "openSUSE Security Update : file (openSUSE-SU-2014:0481-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-7345"], "modified": "2014-06-13T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:libmagic-data", "p-cpe:/a:novell:opensuse:libmagic1", "cpe:/o:novell:opensuse:12.3", "p-cpe:/a:novell:opensuse:file-devel", "p-cpe:/a:novell:opensuse:libmagic1-debuginfo", "p-cpe:/a:novell:opensuse:libmagic1-debuginfo-32bit", "p-cpe:/a:novell:opensuse:python-magic", "p-cpe:/a:novell:opensuse:file-debugsource", "p-cpe:/a:novell:opensuse:file", "p-cpe:/a:novell:opensuse:libmagic1-32bit", "p-cpe:/a:novell:opensuse:file-debuginfo"], "id": "OPENSUSE-2014-270.NASL", "href": "https://www.tenable.com/plugins/nessus/75311", "sourceData": "#%NASL_MIN_LEVEL 80502\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2014-270.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(75311);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/06/04\");\n\n script_cve_id(\"CVE-2013-7345\");\n\n script_name(english:\"openSUSE Security Update : file (openSUSE-SU-2014:0481-1)\");\n script_summary(english:\"Check for the openSUSE-2014-270 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"file was updated to fix extensive backtracking in awk rule regular\nexpression which could lead to a CPU consumption denial of service.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=869906\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://lists.opensuse.org/opensuse-updates/2014-04/msg00008.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected file packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:file\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:file-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:file-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:file-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libmagic-data\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libmagic1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libmagic1-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libmagic1-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libmagic1-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:python-magic\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:12.3\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/03/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/06/13\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE12\\.3)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"12.3\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE12.3\", reference:\"file-5.11-12.23.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", reference:\"file-debuginfo-5.11-12.23.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", reference:\"file-debugsource-5.11-12.23.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", reference:\"file-devel-5.11-12.23.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", reference:\"libmagic-data-5.11-12.23.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", reference:\"libmagic1-5.11-12.23.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", reference:\"libmagic1-debuginfo-5.11-12.23.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", reference:\"python-magic-5.11-12.23.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", cpu:\"x86_64\", reference:\"libmagic1-32bit-5.11-12.23.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", cpu:\"x86_64\", reference:\"libmagic1-debuginfo-32bit-5.11-12.23.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"file\");\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-01-01T01:10:01", "description": "New php packages are available for Slackware 14.0, 14.1, and -current\nto fix a security issue.", "edition": 23, "published": "2014-04-22T00:00:00", "title": "Slackware 14.0 / 14.1 / current : php (SSA:2014-111-02)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-7345"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/o:slackware:slackware_linux:14.1", "cpe:/o:slackware:slackware_linux:14.0", "p-cpe:/a:slackware:slackware_linux:php", "cpe:/o:slackware:slackware_linux"], "id": "SLACKWARE_SSA_2014-111-02.NASL", "href": "https://www.tenable.com/plugins/nessus/73638", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Slackware Security Advisory 2014-111-02. The text \n# itself is copyright (C) Slackware Linux, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(73638);\n script_version(\"1.3\");\n script_cvs_date(\"Date: 2019/01/02 16:37:56\");\n\n script_cve_id(\"CVE-2013-7345\");\n script_bugtraq_id(66406);\n script_xref(name:\"SSA\", value:\"2014-111-02\");\n\n script_name(english:\"Slackware 14.0 / 14.1 / current : php (SSA:2014-111-02)\");\n script_summary(english:\"Checks for updated package in /var/log/packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Slackware host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"New php packages are available for Slackware 14.0, 14.1, and -current\nto fix a security issue.\"\n );\n # http://www.slackware.com/security/viewer.php?l=slackware-security&y=2014&m=slackware-security.395776\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?5bc8dfda\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected php package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:slackware:slackware_linux:php\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:slackware:slackware_linux\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:slackware:slackware_linux:14.0\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:slackware:slackware_linux:14.1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/04/21\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/04/22\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Slackware Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Slackware/release\", \"Host/Slackware/packages\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"slackware.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Slackware/release\")) audit(AUDIT_OS_NOT, \"Slackware\");\nif (!get_kb_item(\"Host/Slackware/packages\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Slackware\", cpu);\n\n\nflag = 0;\nif (slackware_check(osver:\"14.0\", pkgname:\"php\", pkgver:\"5.4.27\", pkgarch:\"i486\", pkgnum:\"1_slack14.0\")) flag++;\nif (slackware_check(osver:\"14.0\", arch:\"x86_64\", pkgname:\"php\", pkgver:\"5.4.27\", pkgarch:\"x86_64\", pkgnum:\"1_slack14.0\")) flag++;\n\nif (slackware_check(osver:\"14.1\", pkgname:\"php\", pkgver:\"5.4.27\", pkgarch:\"i486\", pkgnum:\"1_slack14.1\")) flag++;\nif (slackware_check(osver:\"14.1\", arch:\"x86_64\", pkgname:\"php\", pkgver:\"5.4.27\", pkgarch:\"x86_64\", pkgnum:\"1_slack14.1\")) flag++;\n\nif (slackware_check(osver:\"current\", pkgname:\"php\", pkgver:\"5.4.27\", pkgarch:\"i486\", pkgnum:\"1\")) flag++;\nif (slackware_check(osver:\"current\", arch:\"x86_64\", pkgname:\"php\", pkgver:\"5.4.27\", pkgarch:\"x86_64\", pkgnum:\"1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:slackware_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-01-01T01:18:46", "description": "The BEGIN regular expression in the awk script detector in\nmagic/Magdir/commands in file before 5.15 uses multiple wildcards with\nunlimited repetitions, which allows context-dependent attackers to\ncause a denial of service (CPU consumption) via a crafted ASCII file\nthat triggers a large amount of backtracking, as demonstrated via a\nfile with many newline characters.", "edition": 23, "published": "2014-04-23T00:00:00", "title": "Amazon Linux AMI : file (ALAS-2014-323)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-7345"], "modified": "2021-01-02T00:00:00", "cpe": ["p-cpe:/a:amazon:linux:file-devel", "p-cpe:/a:amazon:linux:file", "p-cpe:/a:amazon:linux:file-static", "p-cpe:/a:amazon:linux:file-debuginfo", "p-cpe:/a:amazon:linux:file-libs", "p-cpe:/a:amazon:linux:python-magic", "cpe:/o:amazon:linux"], "id": "ALA_ALAS-2014-323.NASL", "href": "https://www.tenable.com/plugins/nessus/73651", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Amazon Linux AMI Security Advisory ALAS-2014-323.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(73651);\n script_version(\"1.5\");\n script_cvs_date(\"Date: 2018/04/18 15:09:35\");\n\n script_cve_id(\"CVE-2013-7345\");\n script_xref(name:\"ALAS\", value:\"2014-323\");\n\n script_name(english:\"Amazon Linux AMI : file (ALAS-2014-323)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Amazon Linux AMI host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The BEGIN regular expression in the awk script detector in\nmagic/Magdir/commands in file before 5.15 uses multiple wildcards with\nunlimited repetitions, which allows context-dependent attackers to\ncause a denial of service (CPU consumption) via a crafted ASCII file\nthat triggers a large amount of backtracking, as demonstrated via a\nfile with many newline characters.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://alas.aws.amazon.com/ALAS-2014-323.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Run 'yum update file' to update your system.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:file\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:file-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:file-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:file-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:file-static\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:python-magic\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:amazon:linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/04/10\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/04/23\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2018 Tenable Network Security, Inc.\");\n script_family(english:\"Amazon Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/AmazonLinux/release\", \"Host/AmazonLinux/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/AmazonLinux/release\");\nif (isnull(release) || !strlen(release)) audit(AUDIT_OS_NOT, \"Amazon Linux\");\nos_ver = pregmatch(pattern: \"^AL(A|\\d)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Amazon Linux\");\nos_ver = os_ver[1];\nif (os_ver != \"A\")\n{\n if (os_ver == 'A') os_ver = 'AMI';\n audit(AUDIT_OS_NOT, \"Amazon Linux AMI\", \"Amazon Linux \" + os_ver);\n}\n\nif (!get_kb_item(\"Host/AmazonLinux/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (rpm_check(release:\"ALA\", reference:\"file-5.11-13.16.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"file-debuginfo-5.11-13.16.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"file-devel-5.11-13.16.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"file-libs-5.11-13.16.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"file-static-5.11-13.16.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"python-magic-5.11-13.16.amzn1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"file / file-debuginfo / file-devel / file-libs / file-static / etc\");\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-01-07T11:54:35", "description": "A vulnerability has been discovered and corrected in php :\n\nThe BEGIN regular expression in the awk script detector in\nmagic/Magdir/commands in file before 5.15 uses multiple wildcards with\nunlimited repetitions, which allows context-dependent attackers to\ncause a denial of service (CPU consumption) via a crafted ASCII file\nthat triggers a large amount of backtracking, as demonstrated via a\nfile with many newline characters (CVE-2013-7345).\n\nThe updated php packages have been upgraded to the 5.5.11 version\nwhich is not vulnerable to this issue.\n\nAlso, the timezonedb PHP PECL module has been updated to the latest\n2014.2 version.\n\nAdditionally, the PECL packages which requires so has been rebuilt for\nphp-5.5.11.", "edition": 25, "published": "2014-04-11T00:00:00", "title": "Mandriva Linux Security Advisory : php (MDVSA-2014:075)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-7345"], "modified": "2014-04-11T00:00:00", "cpe": ["p-cpe:/a:mandriva:linux:php-xmlwriter", "p-cpe:/a:mandriva:linux:php-json", "p-cpe:/a:mandriva:linux:php-bcmath", "p-cpe:/a:mandriva:linux:php-gd", "p-cpe:/a:mandriva:linux:php-pdo", "cpe:/o:mandriva:business_server:1", "p-cpe:/a:mandriva:linux:php-calendar", "p-cpe:/a:mandriva:linux:php-mbstring", "p-cpe:/a:mandriva:linux:php-sqlite3", "p-cpe:/a:mandriva:linux:php-sysvmsg", "p-cpe:/a:mandriva:linux:php-ini", "p-cpe:/a:mandriva:linux:php-posix", "p-cpe:/a:mandriva:linux:php-cgi", "p-cpe:/a:mandriva:linux:php-pcntl", "p-cpe:/a:mandriva:linux:php-hash", "p-cpe:/a:mandriva:linux:php-zlib", "p-cpe:/a:mandriva:linux:php-openssl", "p-cpe:/a:mandriva:linux:php-soap", "p-cpe:/a:mandriva:linux:php-sybase_ct", "p-cpe:/a:mandriva:linux:php-xml", "p-cpe:/a:mandriva:linux:php-ftp", "p-cpe:/a:mandriva:linux:php-dom", "p-cpe:/a:mandriva:linux:php-apc", "p-cpe:/a:mandriva:linux:php-curl", "p-cpe:/a:mandriva:linux:php-sysvsem", "p-cpe:/a:mandriva:linux:php-opcache", "p-cpe:/a:mandriva:linux:php-ctype", "p-cpe:/a:mandriva:linux:php-sockets", "p-cpe:/a:mandriva:linux:php-gmp", "p-cpe:/a:mandriva:linux:php-sysvshm", "p-cpe:/a:mandriva:linux:php-pdo_pgsql", "p-cpe:/a:mandriva:linux:php-pdo_mysql", "p-cpe:/a:mandriva:linux:php-xmlrpc", "p-cpe:/a:mandriva:linux:php-bz2", "p-cpe:/a:mandriva:linux:php-ldap", "p-cpe:/a:mandriva:linux:php-xsl", "p-cpe:/a:mandriva:linux:php-tidy", "p-cpe:/a:mandriva:linux:php-fileinfo", "p-cpe:/a:mandriva:linux:php-fpm", "p-cpe:/a:mandriva:linux:lib64php5_common5", "p-cpe:/a:mandriva:linux:php-xmlreader", "p-cpe:/a:mandriva:linux:php-cli", "p-cpe:/a:mandriva:linux:php-mssql", "p-cpe:/a:mandriva:linux:apache-mod_php", "p-cpe:/a:mandriva:linux:php-session", "p-cpe:/a:mandriva:linux:php-readline", "p-cpe:/a:mandriva:linux:php-phar", "p-cpe:/a:mandriva:linux:php-pdo_sqlite", "p-cpe:/a:mandriva:linux:php-tokenizer", "p-cpe:/a:mandriva:linux:php-doc", "p-cpe:/a:mandriva:linux:php-enchant", "p-cpe:/a:mandriva:linux:php-pgsql", "p-cpe:/a:mandriva:linux:php-recode", "p-cpe:/a:mandriva:linux:php-gettext", "p-cpe:/a:mandriva:linux:php-imap", "p-cpe:/a:mandriva:linux:php-iconv", "p-cpe:/a:mandriva:linux:php-devel", "p-cpe:/a:mandriva:linux:php-mysqlnd", "p-cpe:/a:mandriva:linux:php-timezonedb", "p-cpe:/a:mandriva:linux:php-pdo_dblib", "p-cpe:/a:mandriva:linux:php-exif", "p-cpe:/a:mandriva:linux:php-odbc", "p-cpe:/a:mandriva:linux:php-pdo_odbc", "p-cpe:/a:mandriva:linux:php-snmp", "p-cpe:/a:mandriva:linux:php-mysql", "p-cpe:/a:mandriva:linux:php-apc-admin", "p-cpe:/a:mandriva:linux:php-intl", "p-cpe:/a:mandriva:linux:php-filter", "p-cpe:/a:mandriva:linux:php-wddx", "p-cpe:/a:mandriva:linux:php-dba", "p-cpe:/a:mandriva:linux:php-mcrypt", "p-cpe:/a:mandriva:linux:php-shmop", "p-cpe:/a:mandriva:linux:php-mysqli", "p-cpe:/a:mandriva:linux:php-zip"], "id": "MANDRIVA_MDVSA-2014-075.NASL", "href": "https://www.tenable.com/plugins/nessus/73466", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Mandriva Linux Security Advisory MDVSA-2014:075. \n# The text itself is copyright (C) Mandriva S.A.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(73466);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2013-7345\");\n script_bugtraq_id(66406);\n script_xref(name:\"MDVSA\", value:\"2014:075\");\n\n script_name(english:\"Mandriva Linux Security Advisory : php (MDVSA-2014:075)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Mandriva Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"A vulnerability has been discovered and corrected in php :\n\nThe BEGIN regular expression in the awk script detector in\nmagic/Magdir/commands in file before 5.15 uses multiple wildcards with\nunlimited repetitions, which allows context-dependent attackers to\ncause a denial of service (CPU consumption) via a crafted ASCII file\nthat triggers a large amount of backtracking, as demonstrated via a\nfile with many newline characters (CVE-2013-7345).\n\nThe updated php packages have been upgraded to the 5.5.11 version\nwhich is not vulnerable to this issue.\n\nAlso, the timezonedb PHP PECL module has been updated to the latest\n2014.2 version.\n\nAdditionally, the PECL packages which requires so has been rebuilt for\nphp-5.5.11.\"\n );\n # http://pecl.php.net/package-info.php?package=timezonedb&version=2014.2\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?14fdab57\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.php.net/ChangeLog-5.php#5.5.11\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugs.php.net/bug.php?id=66946\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:apache-mod_php\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64php5_common5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:php-apc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:php-apc-admin\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:php-bcmath\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:php-bz2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:php-calendar\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:php-cgi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:php-cli\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:php-ctype\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:php-curl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:php-dba\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:php-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:php-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:php-dom\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:php-enchant\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:php-exif\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:php-fileinfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:php-filter\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:php-fpm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:php-ftp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:php-gd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:php-gettext\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:php-gmp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:php-hash\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:php-iconv\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:php-imap\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:php-ini\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:php-intl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:php-json\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:php-ldap\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:php-mbstring\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:php-mcrypt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:php-mssql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:php-mysql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:php-mysqli\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:php-mysqlnd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:php-odbc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:php-opcache\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:php-openssl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:php-pcntl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:php-pdo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:php-pdo_dblib\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:php-pdo_mysql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:php-pdo_odbc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:php-pdo_pgsql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:php-pdo_sqlite\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:php-pgsql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:php-phar\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:php-posix\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:php-readline\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:php-recode\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:php-session\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:php-shmop\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:php-snmp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:php-soap\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:php-sockets\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:php-sqlite3\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:php-sybase_ct\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:php-sysvmsg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:php-sysvsem\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:php-sysvshm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:php-tidy\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:php-timezonedb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:php-tokenizer\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:php-wddx\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:php-xml\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:php-xmlreader\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:php-xmlrpc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:php-xmlwriter\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:php-xsl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:php-zip\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:php-zlib\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:business_server:1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/04/10\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/04/11\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Mandriva Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/Mandrake/release\", \"Host/Mandrake/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Mandrake/release\")) audit(AUDIT_OS_NOT, \"Mandriva / Mandake Linux\");\nif (!get_kb_item(\"Host/Mandrake/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^(amd64|i[3-6]86|x86_64)$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Mandriva / Mandrake Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"apache-mod_php-5.5.11-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"lib64php5_common5-5.5.11-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"php-apc-3.1.15-1.5.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"php-apc-admin-3.1.15-1.5.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"php-bcmath-5.5.11-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"php-bz2-5.5.11-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"php-calendar-5.5.11-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"php-cgi-5.5.11-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"php-cli-5.5.11-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"php-ctype-5.5.11-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"php-curl-5.5.11-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"php-dba-5.5.11-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"php-devel-5.5.11-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", reference:\"php-doc-5.5.11-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"php-dom-5.5.11-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"php-enchant-5.5.11-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"php-exif-5.5.11-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"php-fileinfo-5.5.11-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"php-filter-5.5.11-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"php-fpm-5.5.11-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"php-ftp-5.5.11-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"php-gd-5.5.11-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"php-gettext-5.5.11-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"php-gmp-5.5.11-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"php-hash-5.5.11-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"php-iconv-5.5.11-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"php-imap-5.5.11-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"php-ini-5.5.11-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"php-intl-5.5.11-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"php-json-5.5.11-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"php-ldap-5.5.11-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"php-mbstring-5.5.11-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"php-mcrypt-5.5.11-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"php-mssql-5.5.11-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"php-mysql-5.5.11-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"php-mysqli-5.5.11-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"php-mysqlnd-5.5.11-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"php-odbc-5.5.11-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"php-opcache-5.5.11-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"php-openssl-5.5.11-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"php-pcntl-5.5.11-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"php-pdo-5.5.11-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"php-pdo_dblib-5.5.11-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"php-pdo_mysql-5.5.11-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"php-pdo_odbc-5.5.11-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"php-pdo_pgsql-5.5.11-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"php-pdo_sqlite-5.5.11-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"php-pgsql-5.5.11-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"php-phar-5.5.11-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"php-posix-5.5.11-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"php-readline-5.5.11-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"php-recode-5.5.11-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"php-session-5.5.11-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"php-shmop-5.5.11-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"php-snmp-5.5.11-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"php-soap-5.5.11-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"php-sockets-5.5.11-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"php-sqlite3-5.5.11-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"php-sybase_ct-5.5.11-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"php-sysvmsg-5.5.11-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"php-sysvsem-5.5.11-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"php-sysvshm-5.5.11-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"php-tidy-5.5.11-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"php-timezonedb-2014.2-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"php-tokenizer-5.5.11-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"php-wddx-5.5.11-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"php-xml-5.5.11-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"php-xmlreader-5.5.11-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"php-xmlrpc-5.5.11-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"php-xmlwriter-5.5.11-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"php-xsl-5.5.11-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"php-zip-5.5.11-1.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"php-zlib-5.5.11-1.mbs1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-01-12T10:12:39", "description": "03 Apr 2014, PHP 5.5.11\n\nCore :\n\n - Allow zero length comparison in substr_compare() (Tjerk)\n\n - Fixed bug #60602 (proc_open() changes environment\n array) (Tjerk)\n\nSPL :\n\n - Added feature #65545 (SplFileObject::fread()) (Tjerk)\n\ncURL :\n\n - Fixed bug #66109 (Can't reset CURLOPT_CUSTOMREQUEST to\n default behaviour) (Tjerk)\n\n - Fix compilation on libcurl versions between 7.10.5 and\n 7.12.2, inclusive. (Adam)\n\nFPM :\n\n - Added clear_env configuration directive to disable\n clearenv() call. (Github PR# 598, Paul Annesley)\n\nFileinfo :\n\n - Fixed bug #66946 (fileinfo: extensive backtracking in\n awk rule regular expression). (CVE-2013-7345) (Remi)\n\nGD :\n\n - Fixed bug #66714 (imageconvolution breakage). (Brad\n Daily)\n\n - Fixed bug #66869 (Invalid 2nd argument crashes\n imageaffinematrixget) (Pierre)\n\n - Fixed bug #66887 (imagescale - poor quality of scaled\n image). (Remi)\n\n - Fixed bug #66890 (imagescale segfault). (Remi)\n\n - Fixed bug #66893 (imagescale ignore method argument).\n (Remi)\n\nHash :\n\n - hash_pbkdf2() now works correctly if the $length\n argument is not specified. (Nikita)\n\nIntl :\n\n - Fixed bug #66873 (A reproductible crash in UConverter\n when given invalid encoding) (Stas)\n\nMail :\n\n - Fixed bug #66535 (Don't add newline after\n X-PHP-Originating-Script) (Tjerk)\n\nMySQLi :\n\n - Fixed bug #66762 (Segfault in mysqli_stmt::bind_result()\n when link closed) (Remi)\n\nOPCache :\n\n - Added function opcache_is_script_cached(). (Danack)\n\n - Added information about interned strings usage.\n (Terry, Julien, Dmitry)\n\nOpenssl :\n\n - Fixed bug #66833 (Default disgest algo is still MD5,\n switch to SHA1). (Remi)\n\nGMP :\n\n - Fixed bug #66872 (invalid argument crashes gmp_testbit)\n (Pierre)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 15, "published": "2014-04-16T00:00:00", "title": "Fedora 19 : php-5.5.11-1.fc19 (2014-4735)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-7345"], "modified": "2014-04-16T00:00:00", "cpe": ["cpe:/o:fedoraproject:fedora:19", "p-cpe:/a:fedoraproject:fedora:php"], "id": "FEDORA_2014-4735.NASL", "href": "https://www.tenable.com/plugins/nessus/73540", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2014-4735.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(73540);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2013-7345\");\n script_bugtraq_id(66406);\n script_xref(name:\"FEDORA\", value:\"2014-4735\");\n\n script_name(english:\"Fedora 19 : php-5.5.11-1.fc19 (2014-4735)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"03 Apr 2014, PHP 5.5.11\n\nCore :\n\n - Allow zero length comparison in substr_compare() (Tjerk)\n\n - Fixed bug #60602 (proc_open() changes environment\n array) (Tjerk)\n\nSPL :\n\n - Added feature #65545 (SplFileObject::fread()) (Tjerk)\n\ncURL :\n\n - Fixed bug #66109 (Can't reset CURLOPT_CUSTOMREQUEST to\n default behaviour) (Tjerk)\n\n - Fix compilation on libcurl versions between 7.10.5 and\n 7.12.2, inclusive. (Adam)\n\nFPM :\n\n - Added clear_env configuration directive to disable\n clearenv() call. (Github PR# 598, Paul Annesley)\n\nFileinfo :\n\n - Fixed bug #66946 (fileinfo: extensive backtracking in\n awk rule regular expression). (CVE-2013-7345) (Remi)\n\nGD :\n\n - Fixed bug #66714 (imageconvolution breakage). (Brad\n Daily)\n\n - Fixed bug #66869 (Invalid 2nd argument crashes\n imageaffinematrixget) (Pierre)\n\n - Fixed bug #66887 (imagescale - poor quality of scaled\n image). (Remi)\n\n - Fixed bug #66890 (imagescale segfault). (Remi)\n\n - Fixed bug #66893 (imagescale ignore method argument).\n (Remi)\n\nHash :\n\n - hash_pbkdf2() now works correctly if the $length\n argument is not specified. (Nikita)\n\nIntl :\n\n - Fixed bug #66873 (A reproductible crash in UConverter\n when given invalid encoding) (Stas)\n\nMail :\n\n - Fixed bug #66535 (Don't add newline after\n X-PHP-Originating-Script) (Tjerk)\n\nMySQLi :\n\n - Fixed bug #66762 (Segfault in mysqli_stmt::bind_result()\n when link closed) (Remi)\n\nOPCache :\n\n - Added function opcache_is_script_cached(). (Danack)\n\n - Added information about interned strings usage.\n (Terry, Julien, Dmitry)\n\nOpenssl :\n\n - Fixed bug #66833 (Default disgest algo is still MD5,\n switch to SHA1). (Remi)\n\nGMP :\n\n - Fixed bug #66872 (invalid argument crashes gmp_testbit)\n (Pierre)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=1079846\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-April/131524.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?893cfbe4\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected php package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:php\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:19\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/04/04\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/04/16\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^19([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 19.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC19\", reference:\"php-5.5.11-1.fc19\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"php\");\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-01-01T01:18:48", "description": "The BEGIN regular expression in the awk script detector in\nmagic/Magdir/commands in file before 5.15 uses multiple wildcards with\nunlimited repetitions, which allows context-dependent attackers to\ncause a denial of service (CPU consumption) via a crafted ASCII file\nthat triggers a large amount of backtracking, as demonstrated via a\nfile with many newline characters.", "edition": 23, "published": "2014-10-12T00:00:00", "title": "Amazon Linux AMI : php55 (ALAS-2014-342)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-7345"], "modified": "2021-01-02T00:00:00", "cpe": ["p-cpe:/a:amazon:linux:php55-debuginfo", "p-cpe:/a:amazon:linux:php55-mssql", "p-cpe:/a:amazon:linux:php55-fpm", "p-cpe:/a:amazon:linux:php55-pspell", "p-cpe:/a:amazon:linux:php55", "p-cpe:/a:amazon:linux:php55-tidy", "p-cpe:/a:amazon:linux:php55-opcache", "p-cpe:/a:amazon:linux:php55-gd", "p-cpe:/a:amazon:linux:php55-odbc", "p-cpe:/a:amazon:linux:php55-mcrypt", "p-cpe:/a:amazon:linux:php55-recode", "p-cpe:/a:amazon:linux:php55-embedded", "p-cpe:/a:amazon:linux:php55-gmp", "p-cpe:/a:amazon:linux:php55-mbstring", "p-cpe:/a:amazon:linux:php55-pdo", "p-cpe:/a:amazon:linux:php55-cli", "p-cpe:/a:amazon:linux:php55-soap", "p-cpe:/a:amazon:linux:php55-imap", "p-cpe:/a:amazon:linux:php55-dba", "p-cpe:/a:amazon:linux:php55-xml", "p-cpe:/a:amazon:linux:php55-devel", "p-cpe:/a:amazon:linux:php55-intl", "p-cpe:/a:amazon:linux:php55-common", "p-cpe:/a:amazon:linux:php55-enchant", "p-cpe:/a:amazon:linux:php55-pgsql", "p-cpe:/a:amazon:linux:php55-process", "p-cpe:/a:amazon:linux:php55-snmp", "p-cpe:/a:amazon:linux:php55-xmlrpc", "p-cpe:/a:amazon:linux:php55-ldap", "p-cpe:/a:amazon:linux:php55-bcmath", "cpe:/o:amazon:linux", "p-cpe:/a:amazon:linux:php55-mysqlnd"], "id": "ALA_ALAS-2014-342.NASL", "href": "https://www.tenable.com/plugins/nessus/78285", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Amazon Linux AMI Security Advisory ALAS-2014-342.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(78285);\n script_version(\"1.3\");\n script_cvs_date(\"Date: 2018/04/18 15:09:35\");\n\n script_cve_id(\"CVE-2013-7345\");\n script_xref(name:\"ALAS\", value:\"2014-342\");\n\n script_name(english:\"Amazon Linux AMI : php55 (ALAS-2014-342)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Amazon Linux AMI host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The BEGIN regular expression in the awk script detector in\nmagic/Magdir/commands in file before 5.15 uses multiple wildcards with\nunlimited repetitions, which allows context-dependent attackers to\ncause a denial of service (CPU consumption) via a crafted ASCII file\nthat triggers a large amount of backtracking, as demonstrated via a\nfile with many newline characters.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://alas.aws.amazon.com/ALAS-2014-342.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Run 'yum update php55' to update your system.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php55\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php55-bcmath\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php55-cli\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php55-common\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php55-dba\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php55-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php55-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php55-embedded\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php55-enchant\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php55-fpm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php55-gd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php55-gmp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php55-imap\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php55-intl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php55-ldap\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php55-mbstring\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php55-mcrypt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php55-mssql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php55-mysqlnd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php55-odbc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php55-opcache\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php55-pdo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php55-pgsql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php55-process\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php55-pspell\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php55-recode\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php55-snmp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php55-soap\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php55-tidy\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php55-xml\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php55-xmlrpc\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:amazon:linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/05/21\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/10/12\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2018 Tenable Network Security, Inc.\");\n script_family(english:\"Amazon Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/AmazonLinux/release\", \"Host/AmazonLinux/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/AmazonLinux/release\");\nif (isnull(release) || !strlen(release)) audit(AUDIT_OS_NOT, \"Amazon Linux\");\nos_ver = pregmatch(pattern: \"^AL(A|\\d)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Amazon Linux\");\nos_ver = os_ver[1];\nif (os_ver != \"A\")\n{\n if (os_ver == 'A') os_ver = 'AMI';\n audit(AUDIT_OS_NOT, \"Amazon Linux AMI\", \"Amazon Linux \" + os_ver);\n}\n\nif (!get_kb_item(\"Host/AmazonLinux/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (rpm_check(release:\"ALA\", reference:\"php55-5.5.12-1.71.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php55-bcmath-5.5.12-1.71.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php55-cli-5.5.12-1.71.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php55-common-5.5.12-1.71.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php55-dba-5.5.12-1.71.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php55-debuginfo-5.5.12-1.71.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php55-devel-5.5.12-1.71.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php55-embedded-5.5.12-1.71.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php55-enchant-5.5.12-1.71.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php55-fpm-5.5.12-1.71.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php55-gd-5.5.12-1.71.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php55-gmp-5.5.12-1.71.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php55-imap-5.5.12-1.71.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php55-intl-5.5.12-1.71.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php55-ldap-5.5.12-1.71.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php55-mbstring-5.5.12-1.71.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php55-mcrypt-5.5.12-1.71.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php55-mssql-5.5.12-1.71.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php55-mysqlnd-5.5.12-1.71.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php55-odbc-5.5.12-1.71.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php55-opcache-5.5.12-1.71.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php55-pdo-5.5.12-1.71.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php55-pgsql-5.5.12-1.71.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php55-process-5.5.12-1.71.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php55-pspell-5.5.12-1.71.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php55-recode-5.5.12-1.71.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php55-snmp-5.5.12-1.71.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php55-soap-5.5.12-1.71.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php55-tidy-5.5.12-1.71.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php55-xml-5.5.12-1.71.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php55-xmlrpc-5.5.12-1.71.amzn1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"php55 / php55-bcmath / php55-cli / php55-common / php55-dba / etc\");\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-01-01T01:18:48", "description": "The BEGIN regular expression in the awk script detector in\nmagic/Magdir/commands in file before 5.15 uses multiple wildcards with\nunlimited repetitions, which allows context-dependent attackers to\ncause a denial of service (CPU consumption) via a crafted ASCII file\nthat triggers a large amount of backtracking, as demonstrated via a\nfile with many newline characters.", "edition": 23, "published": "2014-10-12T00:00:00", "title": "Amazon Linux AMI : php54 (ALAS-2014-333)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-7345"], "modified": "2021-01-02T00:00:00", "cpe": ["p-cpe:/a:amazon:linux:php54-process", "p-cpe:/a:amazon:linux:php54-dba", "p-cpe:/a:amazon:linux:php54-xml", "p-cpe:/a:amazon:linux:php54-cli", "p-cpe:/a:amazon:linux:php54-mysql", "p-cpe:/a:amazon:linux:php54-mssql", "p-cpe:/a:amazon:linux:php54-soap", "p-cpe:/a:amazon:linux:php54", "p-cpe:/a:amazon:linux:php54-fpm", "p-cpe:/a:amazon:linux:php54-intl", "p-cpe:/a:amazon:linux:php54-gd", "p-cpe:/a:amazon:linux:php54-snmp", "p-cpe:/a:amazon:linux:php54-mysqlnd", "p-cpe:/a:amazon:linux:php54-recode", "p-cpe:/a:amazon:linux:php54-mbstring", "p-cpe:/a:amazon:linux:php54-odbc", "p-cpe:/a:amazon:linux:php54-bcmath", "p-cpe:/a:amazon:linux:php54-ldap", "p-cpe:/a:amazon:linux:php54-pspell", "p-cpe:/a:amazon:linux:php54-imap", "p-cpe:/a:amazon:linux:php54-pdo", "p-cpe:/a:amazon:linux:php54-pgsql", "p-cpe:/a:amazon:linux:php54-tidy", "p-cpe:/a:amazon:linux:php54-mcrypt", "p-cpe:/a:amazon:linux:php54-embedded", "p-cpe:/a:amazon:linux:php54-debuginfo", "p-cpe:/a:amazon:linux:php54-xmlrpc", "p-cpe:/a:amazon:linux:php54-devel", "p-cpe:/a:amazon:linux:php54-enchant", "cpe:/o:amazon:linux", "p-cpe:/a:amazon:linux:php54-common"], "id": "ALA_ALAS-2014-333.NASL", "href": "https://www.tenable.com/plugins/nessus/78276", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Amazon Linux AMI Security Advisory ALAS-2014-333.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(78276);\n script_version(\"1.3\");\n script_cvs_date(\"Date: 2018/04/18 15:09:35\");\n\n script_cve_id(\"CVE-2013-7345\");\n script_xref(name:\"ALAS\", value:\"2014-333\");\n\n script_name(english:\"Amazon Linux AMI : php54 (ALAS-2014-333)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Amazon Linux AMI host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The BEGIN regular expression in the awk script detector in\nmagic/Magdir/commands in file before 5.15 uses multiple wildcards with\nunlimited repetitions, which allows context-dependent attackers to\ncause a denial of service (CPU consumption) via a crafted ASCII file\nthat triggers a large amount of backtracking, as demonstrated via a\nfile with many newline characters.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://alas.aws.amazon.com/ALAS-2014-333.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Run 'yum update php54' to update your system.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php54\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php54-bcmath\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php54-cli\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php54-common\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php54-dba\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php54-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php54-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php54-embedded\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php54-enchant\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php54-fpm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php54-gd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php54-imap\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php54-intl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php54-ldap\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php54-mbstring\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php54-mcrypt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php54-mssql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php54-mysql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php54-mysqlnd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php54-odbc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php54-pdo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php54-pgsql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php54-process\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php54-pspell\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php54-recode\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php54-snmp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php54-soap\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php54-tidy\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php54-xml\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php54-xmlrpc\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:amazon:linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/04/25\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/10/12\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2018 Tenable Network Security, Inc.\");\n script_family(english:\"Amazon Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/AmazonLinux/release\", \"Host/AmazonLinux/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/AmazonLinux/release\");\nif (isnull(release) || !strlen(release)) audit(AUDIT_OS_NOT, \"Amazon Linux\");\nos_ver = pregmatch(pattern: \"^AL(A|\\d)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Amazon Linux\");\nos_ver = os_ver[1];\nif (os_ver != \"A\")\n{\n if (os_ver == 'A') os_ver = 'AMI';\n audit(AUDIT_OS_NOT, \"Amazon Linux AMI\", \"Amazon Linux \" + os_ver);\n}\n\nif (!get_kb_item(\"Host/AmazonLinux/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (rpm_check(release:\"ALA\", reference:\"php54-5.4.27-1.53.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php54-bcmath-5.4.27-1.53.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php54-cli-5.4.27-1.53.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php54-common-5.4.27-1.53.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php54-dba-5.4.27-1.53.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php54-debuginfo-5.4.27-1.53.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php54-devel-5.4.27-1.53.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php54-embedded-5.4.27-1.53.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php54-enchant-5.4.27-1.53.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php54-fpm-5.4.27-1.53.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php54-gd-5.4.27-1.53.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php54-imap-5.4.27-1.53.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php54-intl-5.4.27-1.53.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php54-ldap-5.4.27-1.53.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php54-mbstring-5.4.27-1.53.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php54-mcrypt-5.4.27-1.53.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php54-mssql-5.4.27-1.53.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php54-mysql-5.4.27-1.53.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php54-mysqlnd-5.4.27-1.53.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php54-odbc-5.4.27-1.53.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php54-pdo-5.4.27-1.53.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php54-pgsql-5.4.27-1.53.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php54-process-5.4.27-1.53.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php54-pspell-5.4.27-1.53.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php54-recode-5.4.27-1.53.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php54-snmp-5.4.27-1.53.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php54-soap-5.4.27-1.53.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php54-tidy-5.4.27-1.53.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php54-xml-5.4.27-1.53.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php54-xmlrpc-5.4.27-1.53.amzn1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"php54 / php54-bcmath / php54-cli / php54-common / php54-dba / etc\");\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-01-01T01:18:48", "description": "The BEGIN regular expression in the awk script detector in\nmagic/Magdir/commands in file before 5.15 uses multiple wildcards with\nunlimited repetitions, which allows context-dependent attackers to\ncause a denial of service (CPU consumption) via a crafted ASCII file\nthat triggers a large amount of backtracking, as demonstrated via a\nfile with many newline characters.", "edition": 23, "published": "2014-10-12T00:00:00", "title": "Amazon Linux AMI : php54 (ALAS-2014-343)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-7345"], "modified": "2021-01-02T00:00:00", "cpe": ["p-cpe:/a:amazon:linux:php54-process", "p-cpe:/a:amazon:linux:php54-dba", "p-cpe:/a:amazon:linux:php54-xml", "p-cpe:/a:amazon:linux:php54-cli", "p-cpe:/a:amazon:linux:php54-mysql", "p-cpe:/a:amazon:linux:php54-mssql", "p-cpe:/a:amazon:linux:php54-soap", "p-cpe:/a:amazon:linux:php54", "p-cpe:/a:amazon:linux:php54-fpm", "p-cpe:/a:amazon:linux:php54-intl", "p-cpe:/a:amazon:linux:php54-gd", "p-cpe:/a:amazon:linux:php54-snmp", "p-cpe:/a:amazon:linux:php54-mysqlnd", "p-cpe:/a:amazon:linux:php54-recode", "p-cpe:/a:amazon:linux:php54-mbstring", "p-cpe:/a:amazon:linux:php54-odbc", "p-cpe:/a:amazon:linux:php54-bcmath", "p-cpe:/a:amazon:linux:php54-ldap", "p-cpe:/a:amazon:linux:php54-pspell", "p-cpe:/a:amazon:linux:php54-imap", "p-cpe:/a:amazon:linux:php54-pdo", "p-cpe:/a:amazon:linux:php54-pgsql", "p-cpe:/a:amazon:linux:php54-tidy", "p-cpe:/a:amazon:linux:php54-mcrypt", "p-cpe:/a:amazon:linux:php54-embedded", "p-cpe:/a:amazon:linux:php54-debuginfo", "p-cpe:/a:amazon:linux:php54-xmlrpc", "p-cpe:/a:amazon:linux:php54-devel", "p-cpe:/a:amazon:linux:php54-enchant", "cpe:/o:amazon:linux", "p-cpe:/a:amazon:linux:php54-common"], "id": "ALA_ALAS-2014-343.NASL", "href": "https://www.tenable.com/plugins/nessus/78286", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Amazon Linux AMI Security Advisory ALAS-2014-343.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(78286);\n script_version(\"1.3\");\n script_cvs_date(\"Date: 2018/04/18 15:09:35\");\n\n script_cve_id(\"CVE-2013-7345\");\n script_xref(name:\"ALAS\", value:\"2014-343\");\n\n script_name(english:\"Amazon Linux AMI : php54 (ALAS-2014-343)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Amazon Linux AMI host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The BEGIN regular expression in the awk script detector in\nmagic/Magdir/commands in file before 5.15 uses multiple wildcards with\nunlimited repetitions, which allows context-dependent attackers to\ncause a denial of service (CPU consumption) via a crafted ASCII file\nthat triggers a large amount of backtracking, as demonstrated via a\nfile with many newline characters.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://alas.aws.amazon.com/ALAS-2014-343.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Run 'yum update php54' to update your system.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php54\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php54-bcmath\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php54-cli\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php54-common\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php54-dba\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php54-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php54-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php54-embedded\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php54-enchant\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php54-fpm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php54-gd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php54-imap\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php54-intl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php54-ldap\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php54-mbstring\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php54-mcrypt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php54-mssql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php54-mysql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php54-mysqlnd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php54-odbc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php54-pdo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php54-pgsql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php54-process\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php54-pspell\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php54-recode\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php54-snmp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php54-soap\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php54-tidy\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php54-xml\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:php54-xmlrpc\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:amazon:linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/05/21\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/10/12\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2018 Tenable Network Security, Inc.\");\n script_family(english:\"Amazon Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/AmazonLinux/release\", \"Host/AmazonLinux/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/AmazonLinux/release\");\nif (isnull(release) || !strlen(release)) audit(AUDIT_OS_NOT, \"Amazon Linux\");\nos_ver = pregmatch(pattern: \"^AL(A|\\d)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Amazon Linux\");\nos_ver = os_ver[1];\nif (os_ver != \"A\")\n{\n if (os_ver == 'A') os_ver = 'AMI';\n audit(AUDIT_OS_NOT, \"Amazon Linux AMI\", \"Amazon Linux \" + os_ver);\n}\n\nif (!get_kb_item(\"Host/AmazonLinux/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (rpm_check(release:\"ALA\", reference:\"php54-5.4.28-1.54.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php54-bcmath-5.4.28-1.54.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php54-cli-5.4.28-1.54.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php54-common-5.4.28-1.54.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php54-dba-5.4.28-1.54.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php54-debuginfo-5.4.28-1.54.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php54-devel-5.4.28-1.54.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php54-embedded-5.4.28-1.54.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php54-enchant-5.4.28-1.54.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php54-fpm-5.4.28-1.54.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php54-gd-5.4.28-1.54.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php54-imap-5.4.28-1.54.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php54-intl-5.4.28-1.54.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php54-ldap-5.4.28-1.54.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php54-mbstring-5.4.28-1.54.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php54-mcrypt-5.4.28-1.54.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php54-mssql-5.4.28-1.54.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php54-mysql-5.4.28-1.54.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php54-mysqlnd-5.4.28-1.54.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php54-odbc-5.4.28-1.54.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php54-pdo-5.4.28-1.54.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php54-pgsql-5.4.28-1.54.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php54-process-5.4.28-1.54.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php54-pspell-5.4.28-1.54.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php54-recode-5.4.28-1.54.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php54-snmp-5.4.28-1.54.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php54-soap-5.4.28-1.54.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php54-tidy-5.4.28-1.54.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php54-xml-5.4.28-1.54.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"php54-xmlrpc-5.4.28-1.54.amzn1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"php54 / php54-bcmath / php54-cli / php54-common / php54-dba / etc\");\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}], "slackware": [{"lastseen": "2020-10-25T16:36:22", "bulletinFamily": "unix", "cvelist": ["CVE-2013-7345"], "description": "New php packages are available for Slackware 14.0, 14.1, and -current to\nfix a security issue.\n\n\nHere are the details from the Slackware 14.1 ChangeLog:\n\npatches/packages/php-5.4.27-i486-1_slack14.1.txz: Upgraded.\n This update fixes a security issue in the in the awk script detector\n which allows context-dependent attackers to cause a denial of service\n (CPU consumption) via a crafted ASCII file that triggers a large amount\n of backtracking.\n For more information, see:\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7345\n (* Security fix *)\n\nWhere to find the new packages:\n\nThanks to the friendly folks at the OSU Open Source Lab\n(http://osuosl.org) for donating FTP and rsync hosting\nto the Slackware project! :-)\n\nAlso see the \"Get Slack\" section on http://slackware.com for\nadditional mirror sites near you.\n\nUpdated package for Slackware 14.0:\nftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/php-5.4.27-i486-1_slack14.0.txz\n\nUpdated package for Slackware x86_64 14.0:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/php-5.4.27-x86_64-1_slack14.0.txz\n\nUpdated package for Slackware 14.1:\nftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/php-5.4.27-i486-1_slack14.1.txz\n\nUpdated package for Slackware x86_64 14.1:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/php-5.4.27-x86_64-1_slack14.1.txz\n\nUpdated package for Slackware -current:\nftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/php-5.4.27-i486-1.txz\n\nUpdated package for Slackware x86_64 -current:\nftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/php-5.4.27-x86_64-1.txz\n\n\nMD5 signatures:\n\nSlackware 14.0 package:\n4b2cf92d4630552eb1d5d2ffe43e3e85 php-5.4.27-i486-1_slack14.0.txz\n\nSlackware x86_64 14.0 package:\n7f1c76279a73ece133fa0f0b3e3afaca php-5.4.27-x86_64-1_slack14.0.txz\n\nSlackware 14.1 package:\nc2f2a8a0077b94cbb725389de802ad20 php-5.4.27-i486-1_slack14.1.txz\n\nSlackware x86_64 14.1 package:\n62ad0a4511e91f2d7ce94c5b9caffa7a php-5.4.27-x86_64-1_slack14.1.txz\n\nSlackware -current package:\n647463455eec2306f36eafd1ea61dd31 n/php-5.4.27-i486-1.txz\n\nSlackware x86_64 -current package:\n966c42fc092a8d4c2b7d6113ed8cbfcf n/php-5.4.27-x86_64-1.txz\n\n\nInstallation instructions:\n\nUpgrade the package as root:\n > upgradepkg php-5.4.27-i486-1_slack14.1.txz\n\nThen, restart Apache httpd:\n > /etc/rc.d/rc.httpd stop\n > /etc/rc.d/rc.httpd start", "modified": "2014-04-21T21:13:00", "published": "2014-04-21T21:13:00", "id": "SSA-2014-111-02", "href": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2014&m=slackware-security.395776", "type": "slackware", "title": "[slackware-security] php", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}], "amazon": [{"lastseen": "2020-11-10T12:36:53", "bulletinFamily": "unix", "cvelist": ["CVE-2013-7345"], "description": "**Issue Overview:**\n\nThe BEGIN regular expression in the awk script detector in magic/Magdir/commands in file before 5.15 uses multiple wildcards with unlimited repetitions, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted ASCII file that triggers a large amount of backtracking, as demonstrated via a file with many newline characters.\n\n \n**Affected Packages:** \n\n\nphp55\n\n \n**Issue Correction:** \nRun _yum update php55_ to update your system.\n\n \n\n\n**New Packages:**\n \n \n i686: \n php55-recode-5.5.12-1.71.amzn1.i686 \n php55-xml-5.5.12-1.71.amzn1.i686 \n php55-gmp-5.5.12-1.71.amzn1.i686 \n php55-tidy-5.5.12-1.71.amzn1.i686 \n php55-cli-5.5.12-1.71.amzn1.i686 \n php55-process-5.5.12-1.71.amzn1.i686 \n php55-pgsql-5.5.12-1.71.amzn1.i686 \n php55-devel-5.5.12-1.71.amzn1.i686 \n php55-snmp-5.5.12-1.71.amzn1.i686 \n php55-ldap-5.5.12-1.71.amzn1.i686 \n php55-soap-5.5.12-1.71.amzn1.i686 \n php55-xmlrpc-5.5.12-1.71.amzn1.i686 \n php55-gd-5.5.12-1.71.amzn1.i686 \n php55-5.5.12-1.71.amzn1.i686 \n php55-debuginfo-5.5.12-1.71.amzn1.i686 \n php55-fpm-5.5.12-1.71.amzn1.i686 \n php55-enchant-5.5.12-1.71.amzn1.i686 \n php55-common-5.5.12-1.71.amzn1.i686 \n php55-mcrypt-5.5.12-1.71.amzn1.i686 \n php55-opcache-5.5.12-1.71.amzn1.i686 \n php55-odbc-5.5.12-1.71.amzn1.i686 \n php55-intl-5.5.12-1.71.amzn1.i686 \n php55-dba-5.5.12-1.71.amzn1.i686 \n php55-mysqlnd-5.5.12-1.71.amzn1.i686 \n php55-imap-5.5.12-1.71.amzn1.i686 \n php55-pspell-5.5.12-1.71.amzn1.i686 \n php55-mbstring-5.5.12-1.71.amzn1.i686 \n php55-bcmath-5.5.12-1.71.amzn1.i686 \n php55-pdo-5.5.12-1.71.amzn1.i686 \n php55-embedded-5.5.12-1.71.amzn1.i686 \n php55-mssql-5.5.12-1.71.amzn1.i686 \n \n src: \n php55-5.5.12-1.71.amzn1.src \n \n x86_64: \n php55-mbstring-5.5.12-1.71.amzn1.x86_64 \n php55-intl-5.5.12-1.71.amzn1.x86_64 \n php55-dba-5.5.12-1.71.amzn1.x86_64 \n php55-xml-5.5.12-1.71.amzn1.x86_64 \n php55-odbc-5.5.12-1.71.amzn1.x86_64 \n php55-common-5.5.12-1.71.amzn1.x86_64 \n php55-xmlrpc-5.5.12-1.71.amzn1.x86_64 \n php55-pdo-5.5.12-1.71.amzn1.x86_64 \n php55-tidy-5.5.12-1.71.amzn1.x86_64 \n php55-opcache-5.5.12-1.71.amzn1.x86_64 \n php55-mysqlnd-5.5.12-1.71.amzn1.x86_64 \n php55-pgsql-5.5.12-1.71.amzn1.x86_64 \n php55-fpm-5.5.12-1.71.amzn1.x86_64 \n php55-embedded-5.5.12-1.71.amzn1.x86_64 \n php55-recode-5.5.12-1.71.amzn1.x86_64 \n php55-pspell-5.5.12-1.71.amzn1.x86_64 \n php55-snmp-5.5.12-1.71.amzn1.x86_64 \n php55-imap-5.5.12-1.71.amzn1.x86_64 \n php55-gmp-5.5.12-1.71.amzn1.x86_64 \n php55-mssql-5.5.12-1.71.amzn1.x86_64 \n php55-soap-5.5.12-1.71.amzn1.x86_64 \n php55-5.5.12-1.71.amzn1.x86_64 \n php55-process-5.5.12-1.71.amzn1.x86_64 \n php55-bcmath-5.5.12-1.71.amzn1.x86_64 \n php55-enchant-5.5.12-1.71.amzn1.x86_64 \n php55-devel-5.5.12-1.71.amzn1.x86_64 \n php55-debuginfo-5.5.12-1.71.amzn1.x86_64 \n php55-mcrypt-5.5.12-1.71.amzn1.x86_64 \n php55-gd-5.5.12-1.71.amzn1.x86_64 \n php55-cli-5.5.12-1.71.amzn1.x86_64 \n php55-ldap-5.5.12-1.71.amzn1.x86_64 \n \n \n", "edition": 4, "modified": "2014-05-21T10:40:00", "published": "2014-05-21T10:40:00", "id": "ALAS-2014-342", "href": "https://alas.aws.amazon.com/ALAS-2014-342.html", "title": "Medium: php55", "type": "amazon", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2020-11-10T12:37:08", "bulletinFamily": "unix", "cvelist": ["CVE-2013-7345"], "description": "**Issue Overview:**\n\nThe BEGIN regular expression in the awk script detector in magic/Magdir/commands in file before 5.15 uses multiple wildcards with unlimited repetitions, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted ASCII file that triggers a large amount of backtracking, as demonstrated via a file with many newline characters.\n\n \n**Affected Packages:** \n\n\nphp55\n\n \n**Issue Correction:** \nRun _yum update php55_ to update your system.\n\n \n\n\n**New Packages:**\n \n \n i686: \n php55-cli-5.5.11-1.71.amzn1.i686 \n php55-soap-5.5.11-1.71.amzn1.i686 \n php55-5.5.11-1.71.amzn1.i686 \n php55-pspell-5.5.11-1.71.amzn1.i686 \n php55-recode-5.5.11-1.71.amzn1.i686 \n php55-fpm-5.5.11-1.71.amzn1.i686 \n php55-mysqlnd-5.5.11-1.71.amzn1.i686 \n php55-common-5.5.11-1.71.amzn1.i686 \n php55-gmp-5.5.11-1.71.amzn1.i686 \n php55-embedded-5.5.11-1.71.amzn1.i686 \n php55-mcrypt-5.5.11-1.71.amzn1.i686 \n php55-ldap-5.5.11-1.71.amzn1.i686 \n php55-mssql-5.5.11-1.71.amzn1.i686 \n php55-imap-5.5.11-1.71.amzn1.i686 \n php55-intl-5.5.11-1.71.amzn1.i686 \n php55-dba-5.5.11-1.71.amzn1.i686 \n php55-xml-5.5.11-1.71.amzn1.i686 \n php55-bcmath-5.5.11-1.71.amzn1.i686 \n php55-devel-5.5.11-1.71.amzn1.i686 \n php55-enchant-5.5.11-1.71.amzn1.i686 \n php55-odbc-5.5.11-1.71.amzn1.i686 \n php55-process-5.5.11-1.71.amzn1.i686 \n php55-mbstring-5.5.11-1.71.amzn1.i686 \n php55-debuginfo-5.5.11-1.71.amzn1.i686 \n php55-xmlrpc-5.5.11-1.71.amzn1.i686 \n php55-pgsql-5.5.11-1.71.amzn1.i686 \n php55-pdo-5.5.11-1.71.amzn1.i686 \n php55-tidy-5.5.11-1.71.amzn1.i686 \n php55-opcache-5.5.11-1.71.amzn1.i686 \n php55-snmp-5.5.11-1.71.amzn1.i686 \n php55-gd-5.5.11-1.71.amzn1.i686 \n \n src: \n php55-5.5.11-1.71.amzn1.src \n \n x86_64: \n php55-mbstring-5.5.11-1.71.amzn1.x86_64 \n php55-dba-5.5.11-1.71.amzn1.x86_64 \n php55-opcache-5.5.11-1.71.amzn1.x86_64 \n php55-intl-5.5.11-1.71.amzn1.x86_64 \n php55-process-5.5.11-1.71.amzn1.x86_64 \n php55-cli-5.5.11-1.71.amzn1.x86_64 \n php55-odbc-5.5.11-1.71.amzn1.x86_64 \n php55-mysqlnd-5.5.11-1.71.amzn1.x86_64 \n php55-imap-5.5.11-1.71.amzn1.x86_64 \n php55-gd-5.5.11-1.71.amzn1.x86_64 \n php55-fpm-5.5.11-1.71.amzn1.x86_64 \n php55-xml-5.5.11-1.71.amzn1.x86_64 \n php55-embedded-5.5.11-1.71.amzn1.x86_64 \n php55-mcrypt-5.5.11-1.71.amzn1.x86_64 \n php55-mssql-5.5.11-1.71.amzn1.x86_64 \n php55-bcmath-5.5.11-1.71.amzn1.x86_64 \n php55-common-5.5.11-1.71.amzn1.x86_64 \n php55-devel-5.5.11-1.71.amzn1.x86_64 \n php55-ldap-5.5.11-1.71.amzn1.x86_64 \n php55-snmp-5.5.11-1.71.amzn1.x86_64 \n php55-pdo-5.5.11-1.71.amzn1.x86_64 \n php55-xmlrpc-5.5.11-1.71.amzn1.x86_64 \n php55-tidy-5.5.11-1.71.amzn1.x86_64 \n php55-gmp-5.5.11-1.71.amzn1.x86_64 \n php55-debuginfo-5.5.11-1.71.amzn1.x86_64 \n php55-recode-5.5.11-1.71.amzn1.x86_64 \n php55-pgsql-5.5.11-1.71.amzn1.x86_64 \n php55-enchant-5.5.11-1.71.amzn1.x86_64 \n php55-soap-5.5.11-1.71.amzn1.x86_64 \n php55-5.5.11-1.71.amzn1.x86_64 \n php55-pspell-5.5.11-1.71.amzn1.x86_64 \n \n \n", "edition": 4, "modified": "2014-04-25T16:01:00", "published": "2014-04-25T16:01:00", "id": "ALAS-2014-332", "href": "https://alas.aws.amazon.com/ALAS-2014-332.html", "title": "Medium: php55", "type": "amazon", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2020-11-10T12:36:04", "bulletinFamily": "unix", "cvelist": ["CVE-2013-7345"], "description": "**Issue Overview:**\n\nThe BEGIN regular expression in the awk script detector in magic/Magdir/commands in file before 5.15 uses multiple wildcards with unlimited repetitions, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted ASCII file that triggers a large amount of backtracking, as demonstrated via a file with many newline characters.\n\n \n**Affected Packages:** \n\n\nphp54\n\n \n**Issue Correction:** \nRun _yum update php54_ to update your system.\n\n \n\n\n**New Packages:**\n \n \n i686: \n php54-ldap-5.4.27-1.53.amzn1.i686 \n php54-mssql-5.4.27-1.53.amzn1.i686 \n php54-process-5.4.27-1.53.amzn1.i686 \n php54-gd-5.4.27-1.53.amzn1.i686 \n php54-xml-5.4.27-1.53.amzn1.i686 \n php54-common-5.4.27-1.53.amzn1.i686 \n php54-recode-5.4.27-1.53.amzn1.i686 \n php54-cli-5.4.27-1.53.amzn1.i686 \n php54-mcrypt-5.4.27-1.53.amzn1.i686 \n php54-pgsql-5.4.27-1.53.amzn1.i686 \n php54-xmlrpc-5.4.27-1.53.amzn1.i686 \n php54-5.4.27-1.53.amzn1.i686 \n php54-soap-5.4.27-1.53.amzn1.i686 \n php54-intl-5.4.27-1.53.amzn1.i686 \n php54-odbc-5.4.27-1.53.amzn1.i686 \n php54-imap-5.4.27-1.53.amzn1.i686 \n php54-bcmath-5.4.27-1.53.amzn1.i686 \n php54-pdo-5.4.27-1.53.amzn1.i686 \n php54-mysql-5.4.27-1.53.amzn1.i686 \n php54-snmp-5.4.27-1.53.amzn1.i686 \n php54-devel-5.4.27-1.53.amzn1.i686 \n php54-pspell-5.4.27-1.53.amzn1.i686 \n php54-mysqlnd-5.4.27-1.53.amzn1.i686 \n php54-embedded-5.4.27-1.53.amzn1.i686 \n php54-dba-5.4.27-1.53.amzn1.i686 \n php54-debuginfo-5.4.27-1.53.amzn1.i686 \n php54-mbstring-5.4.27-1.53.amzn1.i686 \n php54-fpm-5.4.27-1.53.amzn1.i686 \n php54-enchant-5.4.27-1.53.amzn1.i686 \n php54-tidy-5.4.27-1.53.amzn1.i686 \n \n src: \n php54-5.4.27-1.53.amzn1.src \n \n x86_64: \n php54-odbc-5.4.27-1.53.amzn1.x86_64 \n php54-pspell-5.4.27-1.53.amzn1.x86_64 \n php54-imap-5.4.27-1.53.amzn1.x86_64 \n php54-mysqlnd-5.4.27-1.53.amzn1.x86_64 \n php54-debuginfo-5.4.27-1.53.amzn1.x86_64 \n php54-recode-5.4.27-1.53.amzn1.x86_64 \n php54-5.4.27-1.53.amzn1.x86_64 \n php54-enchant-5.4.27-1.53.amzn1.x86_64 \n php54-pgsql-5.4.27-1.53.amzn1.x86_64 \n php54-tidy-5.4.27-1.53.amzn1.x86_64 \n php54-gd-5.4.27-1.53.amzn1.x86_64 \n php54-mssql-5.4.27-1.53.amzn1.x86_64 \n php54-intl-5.4.27-1.53.amzn1.x86_64 \n php54-xml-5.4.27-1.53.amzn1.x86_64 \n php54-soap-5.4.27-1.53.amzn1.x86_64 \n php54-mbstring-5.4.27-1.53.amzn1.x86_64 \n php54-pdo-5.4.27-1.53.amzn1.x86_64 \n php54-embedded-5.4.27-1.53.amzn1.x86_64 \n php54-fpm-5.4.27-1.53.amzn1.x86_64 \n php54-mysql-5.4.27-1.53.amzn1.x86_64 \n php54-process-5.4.27-1.53.amzn1.x86_64 \n php54-cli-5.4.27-1.53.amzn1.x86_64 \n php54-common-5.4.27-1.53.amzn1.x86_64 \n php54-ldap-5.4.27-1.53.amzn1.x86_64 \n php54-dba-5.4.27-1.53.amzn1.x86_64 \n php54-bcmath-5.4.27-1.53.amzn1.x86_64 \n php54-devel-5.4.27-1.53.amzn1.x86_64 \n php54-mcrypt-5.4.27-1.53.amzn1.x86_64 \n php54-xmlrpc-5.4.27-1.53.amzn1.x86_64 \n php54-snmp-5.4.27-1.53.amzn1.x86_64 \n \n \n", "edition": 4, "modified": "2014-04-25T16:04:00", "published": "2014-04-25T16:04:00", "id": "ALAS-2014-333", "href": "https://alas.aws.amazon.com/ALAS-2014-333.html", "title": "Medium: php54", "type": "amazon", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2020-11-10T12:36:17", "bulletinFamily": "unix", "cvelist": ["CVE-2013-7345"], "description": "**Issue Overview:**\n\nThe BEGIN regular expression in the awk script detector in magic/Magdir/commands in file before 5.15 uses multiple wildcards with unlimited repetitions, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted ASCII file that triggers a large amount of backtracking, as demonstrated via a file with many newline characters.\n\n \n**Affected Packages:** \n\n\nfile\n\n \n**Issue Correction:** \nRun _yum update file_ to update your system.\n\n \n\n\n**New Packages:**\n \n \n i686: \n file-static-5.11-13.16.amzn1.i686 \n file-libs-5.11-13.16.amzn1.i686 \n file-debuginfo-5.11-13.16.amzn1.i686 \n file-5.11-13.16.amzn1.i686 \n file-devel-5.11-13.16.amzn1.i686 \n \n noarch: \n python-magic-5.11-13.16.amzn1.noarch \n \n src: \n file-5.11-13.16.amzn1.src \n \n x86_64: \n file-libs-5.11-13.16.amzn1.x86_64 \n file-static-5.11-13.16.amzn1.x86_64 \n file-5.11-13.16.amzn1.x86_64 \n file-debuginfo-5.11-13.16.amzn1.x86_64 \n file-devel-5.11-13.16.amzn1.x86_64 \n \n \n", "edition": 4, "modified": "2014-04-10T23:55:00", "published": "2014-04-10T23:55:00", "id": "ALAS-2014-323", "href": "https://alas.aws.amazon.com/ALAS-2014-323.html", "title": "Medium: file", "type": "amazon", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2020-11-10T12:34:56", "bulletinFamily": "unix", "cvelist": ["CVE-2013-7345"], "description": "**Issue Overview:**\n\nThe BEGIN regular expression in the awk script detector in magic/Magdir/commands in file before 5.15 uses multiple wildcards with unlimited repetitions, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted ASCII file that triggers a large amount of backtracking, as demonstrated via a file with many newline characters.\n\n \n**Affected Packages:** \n\n\nphp54\n\n \n**Issue Correction:** \nRun _yum update php54_ to update your system.\n\n \n\n\n**New Packages:**\n \n \n i686: \n php54-tidy-5.4.28-1.54.amzn1.i686 \n php54-recode-5.4.28-1.54.amzn1.i686 \n php54-snmp-5.4.28-1.54.amzn1.i686 \n php54-mysqlnd-5.4.28-1.54.amzn1.i686 \n php54-cli-5.4.28-1.54.amzn1.i686 \n php54-gd-5.4.28-1.54.amzn1.i686 \n php54-pdo-5.4.28-1.54.amzn1.i686 \n php54-odbc-5.4.28-1.54.amzn1.i686 \n php54-5.4.28-1.54.amzn1.i686 \n php54-mcrypt-5.4.28-1.54.amzn1.i686 \n php54-fpm-5.4.28-1.54.amzn1.i686 \n php54-imap-5.4.28-1.54.amzn1.i686 \n php54-soap-5.4.28-1.54.amzn1.i686 \n php54-bcmath-5.4.28-1.54.amzn1.i686 \n php54-dba-5.4.28-1.54.amzn1.i686 \n php54-mbstring-5.4.28-1.54.amzn1.i686 \n php54-pgsql-5.4.28-1.54.amzn1.i686 \n php54-pspell-5.4.28-1.54.amzn1.i686 \n php54-devel-5.4.28-1.54.amzn1.i686 \n php54-mysql-5.4.28-1.54.amzn1.i686 \n php54-intl-5.4.28-1.54.amzn1.i686 \n php54-ldap-5.4.28-1.54.amzn1.i686 \n php54-enchant-5.4.28-1.54.amzn1.i686 \n php54-mssql-5.4.28-1.54.amzn1.i686 \n php54-debuginfo-5.4.28-1.54.amzn1.i686 \n php54-xml-5.4.28-1.54.amzn1.i686 \n php54-process-5.4.28-1.54.amzn1.i686 \n php54-xmlrpc-5.4.28-1.54.amzn1.i686 \n php54-common-5.4.28-1.54.amzn1.i686 \n php54-embedded-5.4.28-1.54.amzn1.i686 \n \n src: \n php54-5.4.28-1.54.amzn1.src \n \n x86_64: \n php54-mbstring-5.4.28-1.54.amzn1.x86_64 \n php54-odbc-5.4.28-1.54.amzn1.x86_64 \n php54-mysql-5.4.28-1.54.amzn1.x86_64 \n php54-xmlrpc-5.4.28-1.54.amzn1.x86_64 \n php54-mcrypt-5.4.28-1.54.amzn1.x86_64 \n php54-pspell-5.4.28-1.54.amzn1.x86_64 \n php54-pgsql-5.4.28-1.54.amzn1.x86_64 \n php54-5.4.28-1.54.amzn1.x86_64 \n php54-xml-5.4.28-1.54.amzn1.x86_64 \n php54-recode-5.4.28-1.54.amzn1.x86_64 \n php54-imap-5.4.28-1.54.amzn1.x86_64 \n php54-process-5.4.28-1.54.amzn1.x86_64 \n php54-tidy-5.4.28-1.54.amzn1.x86_64 \n php54-intl-5.4.28-1.54.amzn1.x86_64 \n php54-snmp-5.4.28-1.54.amzn1.x86_64 \n php54-gd-5.4.28-1.54.amzn1.x86_64 \n php54-enchant-5.4.28-1.54.amzn1.x86_64 \n php54-dba-5.4.28-1.54.amzn1.x86_64 \n php54-mysqlnd-5.4.28-1.54.amzn1.x86_64 \n php54-bcmath-5.4.28-1.54.amzn1.x86_64 \n php54-embedded-5.4.28-1.54.amzn1.x86_64 \n php54-pdo-5.4.28-1.54.amzn1.x86_64 \n php54-fpm-5.4.28-1.54.amzn1.x86_64 \n php54-debuginfo-5.4.28-1.54.amzn1.x86_64 \n php54-mssql-5.4.28-1.54.amzn1.x86_64 \n php54-ldap-5.4.28-1.54.amzn1.x86_64 \n php54-soap-5.4.28-1.54.amzn1.x86_64 \n php54-devel-5.4.28-1.54.amzn1.x86_64 \n php54-common-5.4.28-1.54.amzn1.x86_64 \n php54-cli-5.4.28-1.54.amzn1.x86_64 \n \n \n", "edition": 4, "modified": "2014-05-21T10:40:00", "published": "2014-05-21T10:40:00", "id": "ALAS-2014-343", "href": "https://alas.aws.amazon.com/ALAS-2014-343.html", "title": "Medium: php54", "type": "amazon", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2020-11-10T12:35:27", "bulletinFamily": "unix", "cvelist": ["CVE-2014-1943", "CVE-2014-2270"], "description": "**Issue Overview:**\n\nA denial of service flaw was found in the way the File Information (fileinfo) extension handled indirect rules. A remote attacker could use this flaw to cause a PHP application using fileinfo to crash or consume an excessive amount of CPU. \n\n \n**Affected Packages:** \n\n\nphp54\n\n \n**Issue Correction:** \nRun _yum update php54_ to update your system.\n\n \n\n\n**New Packages:**\n \n \n i686: \n php54-mssql-5.4.26-1.51.amzn1.i686 \n php54-dba-5.4.26-1.51.amzn1.i686 \n php54-mbstring-5.4.26-1.51.amzn1.i686 \n php54-mysqlnd-5.4.26-1.51.amzn1.i686 \n php54-5.4.26-1.51.amzn1.i686 \n php54-snmp-5.4.26-1.51.amzn1.i686 \n php54-enchant-5.4.26-1.51.amzn1.i686 \n php54-mcrypt-5.4.26-1.51.amzn1.i686 \n php54-cli-5.4.26-1.51.amzn1.i686 \n php54-tidy-5.4.26-1.51.amzn1.i686 \n php54-common-5.4.26-1.51.amzn1.i686 \n php54-mysql-5.4.26-1.51.amzn1.i686 \n php54-bcmath-5.4.26-1.51.amzn1.i686 \n php54-debuginfo-5.4.26-1.51.amzn1.i686 \n php54-recode-5.4.26-1.51.amzn1.i686 \n php54-odbc-5.4.26-1.51.amzn1.i686 \n php54-pdo-5.4.26-1.51.amzn1.i686 \n php54-pspell-5.4.26-1.51.amzn1.i686 \n php54-devel-5.4.26-1.51.amzn1.i686 \n php54-intl-5.4.26-1.51.amzn1.i686 \n php54-fpm-5.4.26-1.51.amzn1.i686 \n php54-xmlrpc-5.4.26-1.51.amzn1.i686 \n php54-pgsql-5.4.26-1.51.amzn1.i686 \n php54-soap-5.4.26-1.51.amzn1.i686 \n php54-gd-5.4.26-1.51.amzn1.i686 \n php54-xml-5.4.26-1.51.amzn1.i686 \n php54-process-5.4.26-1.51.amzn1.i686 \n php54-imap-5.4.26-1.51.amzn1.i686 \n php54-ldap-5.4.26-1.51.amzn1.i686 \n php54-embedded-5.4.26-1.51.amzn1.i686 \n \n src: \n php54-5.4.26-1.51.amzn1.src \n \n x86_64: \n php54-dba-5.4.26-1.51.amzn1.x86_64 \n php54-embedded-5.4.26-1.51.amzn1.x86_64 \n php54-mysqlnd-5.4.26-1.51.amzn1.x86_64 \n php54-xmlrpc-5.4.26-1.51.amzn1.x86_64 \n php54-mssql-5.4.26-1.51.amzn1.x86_64 \n php54-fpm-5.4.26-1.51.amzn1.x86_64 \n php54-cli-5.4.26-1.51.amzn1.x86_64 \n php54-devel-5.4.26-1.51.amzn1.x86_64 \n php54-debuginfo-5.4.26-1.51.amzn1.x86_64 \n php54-mbstring-5.4.26-1.51.amzn1.x86_64 \n php54-odbc-5.4.26-1.51.amzn1.x86_64 \n php54-gd-5.4.26-1.51.amzn1.x86_64 \n php54-common-5.4.26-1.51.amzn1.x86_64 \n php54-pgsql-5.4.26-1.51.amzn1.x86_64 \n php54-5.4.26-1.51.amzn1.x86_64 \n php54-xml-5.4.26-1.51.amzn1.x86_64 \n php54-bcmath-5.4.26-1.51.amzn1.x86_64 \n php54-pspell-5.4.26-1.51.amzn1.x86_64 \n php54-mysql-5.4.26-1.51.amzn1.x86_64 \n php54-imap-5.4.26-1.51.amzn1.x86_64 \n php54-enchant-5.4.26-1.51.amzn1.x86_64 \n php54-tidy-5.4.26-1.51.amzn1.x86_64 \n php54-pdo-5.4.26-1.51.amzn1.x86_64 \n php54-recode-5.4.26-1.51.amzn1.x86_64 \n php54-snmp-5.4.26-1.51.amzn1.x86_64 \n php54-process-5.4.26-1.51.amzn1.x86_64 \n php54-intl-5.4.26-1.51.amzn1.x86_64 \n php54-ldap-5.4.26-1.51.amzn1.x86_64 \n php54-soap-5.4.26-1.51.amzn1.x86_64 \n php54-mcrypt-5.4.26-1.51.amzn1.x86_64 \n \n \n", "edition": 4, "modified": "2014-03-24T23:37:00", "published": "2014-03-24T23:37:00", "id": "ALAS-2014-313", "href": "https://alas.aws.amazon.com/ALAS-2014-313.html", "title": "Medium: php54", "type": "amazon", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2020-11-10T12:36:34", "bulletinFamily": "unix", "cvelist": ["CVE-2013-7327", "CVE-2014-1943", "CVE-2013-7226", "CVE-2014-2270"], "description": "**Issue Overview:**\n\nA denial of service flaw was found in the way the File Information (fileinfo) extension handled indirect rules. A remote attacker could use this flaw to cause a PHP application using fileinfo to crash or consume an excessive amount of CPU. \n\nThe gdImageCrop function in ext/gd/gd.c in PHP 5.5.x before 5.5.9 does not check return values, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via invalid imagecrop arguments that lead to use of a NULL pointer as a return value, a different vulnerability than [CVE-2013-7226 __](<https://access.redhat.com/security/cve/CVE-2013-7226>).\n\n \n**Affected Packages:** \n\n\nphp55\n\n \n**Issue Correction:** \nRun _yum update php55_ to update your system.\n\n \n\n\n**New Packages:**\n \n \n i686: \n php55-intl-5.5.10-1.67.amzn1.i686 \n php55-tidy-5.5.10-1.67.amzn1.i686 \n php55-snmp-5.5.10-1.67.amzn1.i686 \n php55-common-5.5.10-1.67.amzn1.i686 \n php55-embedded-5.5.10-1.67.amzn1.i686 \n php55-imap-5.5.10-1.67.amzn1.i686 \n php55-odbc-5.5.10-1.67.amzn1.i686 \n php55-xmlrpc-5.5.10-1.67.amzn1.i686 \n php55-cli-5.5.10-1.67.amzn1.i686 \n php55-process-5.5.10-1.67.amzn1.i686 \n php55-mbstring-5.5.10-1.67.amzn1.i686 \n php55-pdo-5.5.10-1.67.amzn1.i686 \n php55-5.5.10-1.67.amzn1.i686 \n php55-devel-5.5.10-1.67.amzn1.i686 \n php55-mcrypt-5.5.10-1.67.amzn1.i686 \n php55-fpm-5.5.10-1.67.amzn1.i686 \n php55-debuginfo-5.5.10-1.67.amzn1.i686 \n php55-opcache-5.5.10-1.67.amzn1.i686 \n php55-ldap-5.5.10-1.67.amzn1.i686 \n php55-recode-5.5.10-1.67.amzn1.i686 \n php55-gd-5.5.10-1.67.amzn1.i686 \n php55-pgsql-5.5.10-1.67.amzn1.i686 \n php55-gmp-5.5.10-1.67.amzn1.i686 \n php55-bcmath-5.5.10-1.67.amzn1.i686 \n php55-pspell-5.5.10-1.67.amzn1.i686 \n php55-enchant-5.5.10-1.67.amzn1.i686 \n php55-dba-5.5.10-1.67.amzn1.i686 \n php55-xml-5.5.10-1.67.amzn1.i686 \n php55-mysqlnd-5.5.10-1.67.amzn1.i686 \n php55-mssql-5.5.10-1.67.amzn1.i686 \n php55-soap-5.5.10-1.67.amzn1.i686 \n \n src: \n php55-5.5.10-1.67.amzn1.src \n \n x86_64: \n php55-soap-5.5.10-1.67.amzn1.x86_64 \n php55-xmlrpc-5.5.10-1.67.amzn1.x86_64 \n php55-xml-5.5.10-1.67.amzn1.x86_64 \n php55-pspell-5.5.10-1.67.amzn1.x86_64 \n php55-intl-5.5.10-1.67.amzn1.x86_64 \n php55-fpm-5.5.10-1.67.amzn1.x86_64 \n php55-snmp-5.5.10-1.67.amzn1.x86_64 \n php55-tidy-5.5.10-1.67.amzn1.x86_64 \n php55-enchant-5.5.10-1.67.amzn1.x86_64 \n php55-process-5.5.10-1.67.amzn1.x86_64 \n php55-imap-5.5.10-1.67.amzn1.x86_64 \n php55-pgsql-5.5.10-1.67.amzn1.x86_64 \n php55-devel-5.5.10-1.67.amzn1.x86_64 \n php55-ldap-5.5.10-1.67.amzn1.x86_64 \n php55-mbstring-5.5.10-1.67.amzn1.x86_64 \n php55-mysqlnd-5.5.10-1.67.amzn1.x86_64 \n php55-odbc-5.5.10-1.67.amzn1.x86_64 \n php55-bcmath-5.5.10-1.67.amzn1.x86_64 \n php55-recode-5.5.10-1.67.amzn1.x86_64 \n php55-mcrypt-5.5.10-1.67.amzn1.x86_64 \n php55-common-5.5.10-1.67.amzn1.x86_64 \n php55-pdo-5.5.10-1.67.amzn1.x86_64 \n php55-gmp-5.5.10-1.67.amzn1.x86_64 \n php55-gd-5.5.10-1.67.amzn1.x86_64 \n php55-cli-5.5.10-1.67.amzn1.x86_64 \n php55-embedded-5.5.10-1.67.amzn1.x86_64 \n php55-dba-5.5.10-1.67.amzn1.x86_64 \n php55-5.5.10-1.67.amzn1.x86_64 \n php55-debuginfo-5.5.10-1.67.amzn1.x86_64 \n php55-mssql-5.5.10-1.67.amzn1.x86_64 \n php55-opcache-5.5.10-1.67.amzn1.x86_64 \n \n \n", "edition": 4, "modified": "2014-03-24T23:37:00", "published": "2014-03-24T23:37:00", "id": "ALAS-2014-314", "href": "https://alas.aws.amazon.com/ALAS-2014-314.html", "title": "Important: php55", "type": "amazon", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "gentoo": [{"lastseen": "2016-09-06T19:45:59", "bulletinFamily": "unix", "cvelist": ["CVE-2013-7345"], "description": "### Background\n\nfile is a utility that guesses a file format by scanning binary data for patterns. \n\n### Description\n\nBEGIN regular expression in the awk script detector in magic/Magdir/commands uses multiple wildcards with unlimited repetitions. \n\n### Impact\n\nA context-dependent attacker could entice a user to open a specially crafted file, possibly resulting in a Denial of Service condition. \n\n### Workaround\n\nThere is no known workaround at this time.\n\n### Resolution\n\nAll file users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=sys-apps/file-5.15\"", "edition": 1, "modified": "2014-08-29T00:00:00", "published": "2014-08-26T00:00:00", "id": "GLSA-201408-08", "href": "https://security.gentoo.org/glsa/201408-08", "type": "gentoo", "title": "file: Denial of Service", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2016-09-06T19:46:20", "bulletinFamily": "unix", "cvelist": ["CVE-2014-9620", "CVE-2014-9621", "CVE-2014-2270"], "description": "### Background\n\nThe file utility attempts to identify a file\u2019s format by scanning binary data for patterns. \n\n### Description\n\nMultiple issues with the ELF parser used by the file utility have been detected and fixed. \n\n### Impact\n\nA context-dependent attacker can cause Denial of Service.\n\n### Workaround\n\nThere is no known workaround at this time.\n\n### Resolution\n\nAll file users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=sys-apps/file-5.22\"", "edition": 1, "modified": "2015-03-16T00:00:00", "published": "2015-03-16T00:00:00", "id": "GLSA-201503-08", "href": "https://security.gentoo.org/glsa/201503-08", "type": "gentoo", "title": "file: Denial of Service", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}], "ubuntu": [{"lastseen": "2020-07-02T11:41:33", "bulletinFamily": "unix", "cvelist": ["CVE-2014-2270"], "description": "It was discovered that PHP's embedded libmagic library incorrectly handled \nPE executables. An attacker could use this issue to cause PHP to crash, \nresulting in a denial of service.", "edition": 5, "modified": "2014-04-07T00:00:00", "published": "2014-04-07T00:00:00", "id": "USN-2163-1", "href": "https://ubuntu.com/security/notices/USN-2163-1", "title": "PHP vulnerability", "type": "ubuntu", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2020-07-02T11:36:52", "bulletinFamily": "unix", "cvelist": ["CVE-2014-2270"], "description": "It was discovered that file incorrectly handled PE executable files. An \nattacker could use this issue to cause file to crash, resulting in a denial \nof service.", "edition": 5, "modified": "2014-04-07T00:00:00", "published": "2014-04-07T00:00:00", "id": "USN-2162-1", "href": "https://ubuntu.com/security/notices/USN-2162-1", "title": "file vulnerability", "type": "ubuntu", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}], "seebug": [{"lastseen": "2017-11-19T17:31:31", "description": "BUGTRAQ ID: 66002\r\nCVE(CAN) ID: CVE-2014-2270\r\n\r\nPHP\u662f\u4e00\u79cdHTML\u5185\u5d4c\u5f0f\u7684\u8bed\u8a00\u3002\r\n\r\nPHP\u7684file\u7a0b\u5e8f\u5728\u89e3\u6790\u53ef\u79fb\u690d\u6267\u884c\u4f53\uff08PE\uff09\u683c\u5f0f\u6587\u4ef6\u65f6\u5728\u5b9e\u73b0\u4e0a\u5b58\u5728\u5185\u5b58\u7834\u574f\u6f0f\u6d1e\uff0c\u6210\u529f\u5229\u7528\u8be5\u6f0f\u6d1e\u540e\u53ef\u4f7f\u8fdc\u7a0b\u653b\u51fb\u8005\u6267\u884c\u4efb\u610f\u4ee3\u7801\u6216\u9020\u6210\u62d2\u7edd\u670d\u52a1\u3002\n0\nPHP PHP 5.x\n\u5382\u5546\u8865\u4e01\uff1a\r\n\r\nPHP\r\n---\r\n\u76ee\u524d\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u4e86\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u8fd9\u4e2a\u5b89\u5168\u95ee\u9898\uff0c\u8bf7\u5230\u5382\u5546\u7684\u4e3b\u9875\u4e0b\u8f7d\uff1a\r\n\r\nhttp://www.php.net/downloads.php", "published": "2014-03-12T00:00:00", "title": "PHP Fileinfo\u7ec4\u4ef6\u8d8a\u754c\u5185\u5b58\u7834\u574f\u6f0f\u6d1e", "type": "seebug", "bulletinFamily": "exploit", "cvelist": ["CVE-2014-2270"], "modified": "2014-03-12T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-61748", "id": "SSV:61748", "sourceData": "", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "sourceHref": ""}], "debian": [{"lastseen": "2020-11-11T13:16:10", "bulletinFamily": "unix", "cvelist": ["CVE-2014-2270"], "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-2873-1 security@debian.org\nhttp://www.debian.org/security/ Salvatore Bonaccorso\nMarch 11, 2014 http://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : file\nVulnerability : several\nCVE ID : CVE-2014-2270\nDebian Bug : 703993\n\nSeveral vulnerabilities have been found in file, a file type\nclassification tool.\n\nAaron Reffett reported a flaw in the way the file utility determined the\ntype of Portable Executable (PE) format files, the executable format\nused on Windows. When processing a defective or intentionally prepared\nPE executable which contains invalid offset information, the\nfile_strncmp routine will access memory that is out of bounds, causing\nfile to crash. The Common Vulnerabilities and Exposures project ID\nCVE-2014-2270 has been assigned to identify this flaw.\n\nMike Frysinger reported that file's rule for detecting AWK scripts\nsignificantly slows down file. The regular expression to detect AWK\nfiles contained two star operators, which could be exploited to cause\nexcessive backtracking in the regex engine.\n\nFor the oldstable distribution (squeeze), these problems have been fixed\nin version 5.04-5+squeeze4.\n\nFor the stable distribution (wheezy), these problems have been fixed in\nversion 5.11-2+deb7u2.\n\nFor the testing distribution (jessie), these problems have been fixed in\nversion 1:5.17-1.\n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 1:5.17-1.\n\nWe recommend that you upgrade your file packages.\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: http://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n", "edition": 10, "modified": "2014-03-11T21:10:16", "published": "2014-03-11T21:10:16", "id": "DEBIAN:DSA-2873-1:1CEBF", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2014/msg00044.html", "title": "[SECURITY] [DSA 2873-1] file security update", "type": "debian", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-05-30T02:22:03", "bulletinFamily": "unix", "cvelist": ["CVE-2014-0237", "CVE-2014-2270", "CVE-2014-0185", "CVE-2014-0238"], "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-2943-1 security@debian.org\nhttp://www.debian.org/security/ Moritz Muehlenhoff\nJune 01, 2014 http://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : php5\nCVE ID : CVE-2014-0185 CVE-2014-0237 CVE-2014-0238 CVE-2014-2270\n\nSeveral vulnerabilities were found in PHP, a general-purpose scripting\nlanguage commonly used for web application development:\n\nCVE-2014-0185\n\n The default PHP FPM socket permission has been changed from 0666\n to 0660 to mitigate a security vulnerability (CVE-2014-0185) in PHP\n FPM that allowed any local user to run a PHP code under the active\n user of FPM process via crafted FastCGI client.\n\n The default Debian setup now correctly sets the listen.owner and\n listen.group to www-data:www-data in default php-fpm.conf. If you\n have more FPM instances or a webserver not running under www-data\n user you need to adjust the configuration of FPM pools in\n /etc/php5/fpm/pool.d/ so the accessing process has rights to\n access the socket.\n\nCVE-2014-0237 / CVE-2014-0238:\n\n Denial of service in the CDF parser of the fileinfo module.\n\nCVE-2014-2270\n\n Denial of service in the fileinfo module.\n\nFor the stable distribution (wheezy), these problems have been fixed in\nversion 5.4.4-14+deb7u10.\n\nFor the unstable distribution (sid), these problems will be fixed soon.\n\nWe recommend that you upgrade your php5 packages.\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: http://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n", "edition": 3, "modified": "2014-06-01T08:38:27", "published": "2014-06-01T08:38:27", "id": "DEBIAN:DSA-2943-1:EDE80", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2014/msg00123.html", "title": "[SECURITY] [DSA 2943-1] php5 security update", "type": "debian", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}]}