Lucene search

K

FreeBSD Ports: php5

πŸ—“οΈΒ 24 Jan 2011Β 00:00:00Reported byΒ Copyright (C) 2011 E-Soft Inc.TypeΒ 
openvas
Β openvas
πŸ”—Β plugins.openvas.orgπŸ‘Β 39Β Views

The remote host is missing an update to the system as announced in the referenced advisory. Package php5 version and php52 version are known to be vulnerable

Show more
Related
Refs
Code
ReporterTitlePublishedViews
Family
OpenVAS
Slackware: Security Advisory (SSA:2010-357-01)
10 Sep 201200:00
–openvas
OpenVAS
Slackware Advisory SSA:2010-357-01 php
11 Sep 201200:00
–openvas
OpenVAS
Mandriva Update for php MDVSA-2010:218 (php)
16 Nov 201000:00
–openvas
OpenVAS
Mandriva Update for php MDVSA-2010:218 (php)
16 Nov 201000:00
–openvas
OpenVAS
Ubuntu Update for php5 regression USN-1042-2
14 Jan 201100:00
–openvas
OpenVAS
FreeBSD Ports: php5
24 Jan 201100:00
–openvas
OpenVAS
Ubuntu: Security Advisory (USN-1042-2)
14 Jan 201100:00
–openvas
OpenVAS
FreeBSD Ports: php5
24 Jan 201100:00
–openvas
OpenVAS
FreeBSD Ports: php5-zip
24 Jan 201100:00
–openvas
OpenVAS
FreeBSD Ports: php5-zip
24 Jan 201100:00
–openvas
Rows per page
# SPDX-FileCopyrightText: 2011 E-Soft Inc.
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.68834");
  script_version("2023-07-26T05:05:09+0000");
  script_cve_id("CVE-2010-3436", "CVE-2010-3709");
  script_tag(name:"last_modification", value:"2023-07-26 05:05:09 +0000 (Wed, 26 Jul 2023)");
  script_tag(name:"creation_date", value:"2011-01-24 17:55:59 +0100 (Mon, 24 Jan 2011)");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:N/I:P/A:N");
  script_name("FreeBSD Ports: php5");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2011 E-Soft Inc.");
  script_family("FreeBSD Local Security Checks");
  script_dependencies("gather-package-list.nasl");
  script_mandatory_keys("ssh/login/freebsd", "ssh/login/freebsdrel");

  script_tag(name:"insight", value:"The following packages are affected:

  php5

  php52");

  script_tag(name:"solution", value:"Update your system with the appropriate patches or
  software upgrades.");

  script_xref(name:"URL", value:"http://www.mail-archive.com/[email protected]/msg47722.html");
  script_xref(name:"URL", value:"http://www.php.net/releases/5_2_15.php");
  script_xref(name:"URL", value:"http://www.vuxml.org/freebsd/f3148a05-0fa7-11e0-becc-0022156e8794.html");

  script_tag(name:"summary", value:"The remote host is missing an update to the system
  as announced in the referenced advisory.");

  script_tag(name:"qod_type", value:"package");
  script_tag(name:"solution_type", value:"VendorFix");

  exit(0);
}

include("revisions-lib.inc");
include("pkg-lib-bsd.inc");

vuln = FALSE;
txt = "";

bver = portver(pkg:"php5");
if(!isnull(bver) && revcomp(a:bver, b:"5.3.4")<0) {
  txt += 'Package php5 version ' + bver + ' is installed which is known to be vulnerable.\n';
  vuln = TRUE;
}
bver = portver(pkg:"php52");
if(!isnull(bver) && revcomp(a:bver, b:"5.2.15")<0) {
  txt += 'Package php52 version ' + bver + ' is installed which is known to be vulnerable.\n';
  vuln = TRUE;
}

if(vuln) {
  security_message(data:txt);
} else if (__pkg_match) {
  exit(99);
}

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. ContactΒ us for a demo andΒ discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
24 Jan 2011 00:00Current
7.9High risk
Vulners AI Score7.9
EPSS0.006
39
.json
Report