Lucene search

K
openvasCopyright (C) 2008 Greenbone AGOPENVAS:1361412562310800110
HistoryOct 07, 2008 - 12:00 a.m.

PHP Multiple Vulnerabilities (Aug 2008)

2008-10-0700:00:00
Copyright (C) 2008 Greenbone AG
plugins.openvas.org
105

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.9 High

AI Score

Confidence

High

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.533 Medium

EPSS

Percentile

97.6%

PHP is prone to multiple vulnerabilities.

# SPDX-FileCopyrightText: 2008 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

CPE = "cpe:/a:php:php";

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.800110");
  script_version("2024-02-19T05:05:57+0000");
  script_tag(name:"last_modification", value:"2024-02-19 05:05:57 +0000 (Mon, 19 Feb 2024)");
  script_tag(name:"creation_date", value:"2008-10-07 16:11:33 +0200 (Tue, 07 Oct 2008)");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_tag(name:"severity_vector", value:"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
  script_tag(name:"severity_origin", value:"NVD");
  script_tag(name:"severity_date", value:"2024-02-02 13:52:57 +0000 (Fri, 02 Feb 2024)");
  script_cve_id("CVE-2008-2050", "CVE-2008-2051", "CVE-2007-4850", "CVE-2008-0599", "CVE-2008-0674");
  script_xref(name:"CB-A", value:"08-0118");
  script_name("PHP Multiple Vulnerabilities (Aug 2008)");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2008 Greenbone AG");
  script_family("Web application abuses");
  script_dependencies("secpod_php_smb_login_detect.nasl", "gb_php_ssh_login_detect.nasl", "gb_php_http_detect.nasl");
  script_mandatory_keys("php/detected");

  script_xref(name:"URL", value:"http://pcre.org/changelog.txt");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/27413");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/27786");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/29009");
  script_xref(name:"URL", value:"http://www.php.net/ChangeLog-5.php");
  script_xref(name:"URL", value:"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0176");
  script_xref(name:"URL", value:"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0178");
  script_xref(name:"URL", value:"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0086");

  script_tag(name:"impact", value:"Successful exploitation could result in remote arbitrary code execution,
  security restrictions bypass, access to restricted files, denial of service.");

  script_tag(name:"affected", value:"PHP version prior to 5.2.6");

  script_tag(name:"insight", value:"The flaws are caused by,

  - an unspecified stack overflow error in FastCGI SAPI (fastcgi.c).

  - an error during path translation in cgi_main.c.

  - an error with an unknown impact/attack vectors.

  - an unspecified error within the processing of incomplete multibyte
  characters in escapeshellcmd() API function.

  - error in curl/interface.c in the cURL library(libcurl), which could be
  exploited by attackers to bypass safe_mode security restrictions.

  - an error in PCRE. i.e buffer overflow error when handling a character class
  containing a very large number of characters with codepoints greater than
  255(UTF-8 mode).");

  script_tag(name:"solution", value:"Update to PHP version 5.2.6 or later.");

  script_tag(name:"summary", value:"PHP is prone to multiple vulnerabilities.");

  script_tag(name:"solution_type", value:"VendorFix");
  script_tag(name:"qod_type", value:"remote_banner_unreliable");

  exit(0);
}

include("version_func.inc");
include("host_details.inc");

if( isnull( phpPort = get_app_port( cpe:CPE ) ) )
  exit( 0 );

if( ! phpVer = get_app_version( cpe:CPE, port:phpPort ) )
  exit( 0 );

if( version_is_less_equal( version:phpVer, test_version:"5.2.5" ) ) {
  report = report_fixed_ver( installed_version:phpVer, fixed_version:"5.2.6" );
  security_message( data:report, port:phpPort );
  exit( 0 );
}

exit( 99 );

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.9 High

AI Score

Confidence

High

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.533 Medium

EPSS

Percentile

97.6%