The remote host is missing an update for the 'php5' package(s) announced via the USN-761-1 advisory. It was discovered that PHP did not sanitize certain error messages when display_errors is enabled, which could result in browsers becoming vulnerable to cross-site scripting attacks when processing the output. With cross-site scripting vulnerabilities, if a user were tricked into viewing server output during a crafted server request, a remote attacker could exploit this to modify the contents, or steal confidential data (such as passwords), within the same domain. It was discovered that PHP did not properly handle the mbstring.func_overload setting within .htaccess files when using virtual hosts. A virtual host administrator could use this flaw to cause settings to be applied to other virtual hosts on the same server. It was discovered that PHP did not properly handle certain malformed strings when being parsed by the json_decode function. A remote attacker could exploit this flaw and cause the PHP server to crash, resulting in a denial of service. This issue only affected Ubuntu 8.04 and 8.10
Reporter | Title | Published | Views | Family All 153 |
---|---|---|---|---|
![]() | Ubuntu 6.06 LTS / 8.04 LTS / 8.10 : php5 vulnerabilities (USN-761-1) | 23 Apr 200900:00 | β | nessus |
![]() | Ubuntu 9.04 : php5 vulnerabilities (USN-761-2) | 28 Apr 200900:00 | β | nessus |
![]() | Debian DSA-1789-1 : php5 - several vulnerabilities | 6 May 200900:00 | β | nessus |
![]() | Mandriva Linux Security Advisory : php (MDVSA-2009:066) | 23 Apr 200900:00 | β | nessus |
![]() | Fedora 9 : maniadrive-1.2-13.fc9 / php-5.2.9-2.fc9 (2009-3848) | 1 Jun 200900:00 | β | nessus |
![]() | Debian DSA-1775-1 : php-json-ext - denial of service | 21 Apr 200900:00 | β | nessus |
![]() | Mandriva Linux Security Advisory : php (MDVSA-2009:090) | 23 Apr 200900:00 | β | nessus |
![]() | Fedora 10 : maniadrive-1.2-13.fc10 / php-5.2.9-2.fc10 (2009-3768) | 1 Jun 200900:00 | β | nessus |
![]() | CentOS 5 : php (CESA-2009:0338) | 6 Jan 201000:00 | β | nessus |
![]() | RHEL 5 : php (RHSA-2009:0338) | 7 Apr 200900:00 | β | nessus |
Source | Link |
---|---|
ubuntu | www.ubuntu.com/security/notices/USN-761-1 |
# SPDX-FileCopyrightText: 2009 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.63896");
script_cve_id("CVE-2008-5814", "CVE-2009-0754", "CVE-2009-1271");
script_tag(name:"creation_date", value:"2009-04-28 18:40:12 +0000 (Tue, 28 Apr 2009)");
script_version("2024-02-02T05:06:04+0000");
script_tag(name:"last_modification", value:"2024-02-02 05:06:04 +0000 (Fri, 02 Feb 2024)");
script_tag(name:"cvss_base", value:"5.0");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:N/I:N/A:P");
script_name("Ubuntu: Security Advisory (USN-761-1)");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2009 Greenbone AG");
script_family("Ubuntu Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/ubuntu_linux", "ssh/login/packages", re:"ssh/login/release=UBUNTU(6\.06\ LTS|8\.04\ LTS|8\.10)");
script_xref(name:"Advisory-ID", value:"USN-761-1");
script_xref(name:"URL", value:"https://ubuntu.com/security/notices/USN-761-1");
script_tag(name:"summary", value:"The remote host is missing an update for the 'php5' package(s) announced via the USN-761-1 advisory.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable package version is present on the target host.");
script_tag(name:"insight", value:"It was discovered that PHP did not sanitize certain error messages when
display_errors is enabled, which could result in browsers becoming
vulnerable to cross-site scripting attacks when processing the output. With
cross-site scripting vulnerabilities, if a user were tricked into viewing
server output during a crafted server request, a remote attacker could
exploit this to modify the contents, or steal confidential data (such as
passwords), within the same domain. (CVE-2008-5814)
It was discovered that PHP did not properly handle the
mbstring.func_overload setting within .htaccess files when using virtual
hosts. A virtual host administrator could use this flaw to cause settings
to be applied to other virtual hosts on the same server. (CVE-2009-0754)
It was discovered that PHP did not properly handle certain malformed
strings when being parsed by the json_decode function. A remote attacker
could exploit this flaw and cause the PHP server to crash, resulting in a
denial of service. This issue only affected Ubuntu 8.04 and 8.10.
(CVE-2009-1271)");
script_tag(name:"affected", value:"'php5' package(s) on Ubuntu 6.06, Ubuntu 8.04, Ubuntu 8.10.");
script_tag(name:"solution", value:"Please install the updated package(s).");
script_tag(name:"solution_type", value:"VendorFix");
script_tag(name:"qod_type", value:"package");
exit(0);
}
include("revisions-lib.inc");
include("pkg-lib-deb.inc");
release = dpkg_get_ssh_release();
if(!release)
exit(0);
res = "";
report = "";
if(release == "UBUNTU6.06 LTS") {
if(!isnull(res = isdpkgvuln(pkg:"libapache2-mod-php5", ver:"5.1.2-1ubuntu3.14", rls:"UBUNTU6.06 LTS"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"php5-cgi", ver:"5.1.2-1ubuntu3.14", rls:"UBUNTU6.06 LTS"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"php5-cli", ver:"5.1.2-1ubuntu3.14", rls:"UBUNTU6.06 LTS"))) {
report += res;
}
if(report != "") {
security_message(data:report);
} else if(__pkg_match) {
exit(99);
}
exit(0);
}
if(release == "UBUNTU8.04 LTS") {
if(!isnull(res = isdpkgvuln(pkg:"libapache2-mod-php5", ver:"5.2.4-2ubuntu5.6", rls:"UBUNTU8.04 LTS"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"php5-cgi", ver:"5.2.4-2ubuntu5.6", rls:"UBUNTU8.04 LTS"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"php5-cli", ver:"5.2.4-2ubuntu5.6", rls:"UBUNTU8.04 LTS"))) {
report += res;
}
if(report != "") {
security_message(data:report);
} else if(__pkg_match) {
exit(99);
}
exit(0);
}
if(release == "UBUNTU8.10") {
if(!isnull(res = isdpkgvuln(pkg:"libapache2-mod-php5", ver:"5.2.6-2ubuntu4.2", rls:"UBUNTU8.10"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"php5-cgi", ver:"5.2.6-2ubuntu4.2", rls:"UBUNTU8.10"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"php5-cli", ver:"5.2.6-2ubuntu4.2", rls:"UBUNTU8.10"))) {
report += res;
}
if(report != "") {
security_message(data:report);
} else if(__pkg_match) {
exit(99);
}
exit(0);
}
exit(0);
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. ContactΒ us for a demo andΒ discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo