Security Advisory for Slackware php package updat
Reporter | Title | Published | Views | Family All 199 |
---|---|---|---|---|
Slackware Linux | [slackware-security] php | 9 Jun 201421:04 | – | slackware |
Tenable Nessus | Slackware 13.0 / 13.1 / 13.37 / 14.0 / 14.1 / current : php (SSA:2014-160-01) | 10 Jun 201400:00 | – | nessus |
Tenable Nessus | Ubuntu 14.04 LTS : PHP updates (USN-2254-2) | 26 Jun 201400:00 | – | nessus |
Tenable Nessus | openSUSE Security Update : php5 (openSUSE-SU-2014:0784-1) | 13 Jun 201400:00 | – | nessus |
Tenable Nessus | Ubuntu 14.04 LTS : PHP vulnerabilities (USN-2254-1) | 24 Jun 201400:00 | – | nessus |
Tenable Nessus | Debian DSA-2943-1 : php5 - security update | 3 Jun 201400:00 | – | nessus |
Tenable Nessus | Mandriva Linux Security Advisory : php (MDVSA-2014:115) | 11 Jun 201400:00 | – | nessus |
Tenable Nessus | PHP 5.5.x < 5.5.13 'src/cdf.c' Multiple Vulnerabilities | 3 Jun 201400:00 | – | nessus |
Tenable Nessus | Fedora 20 : php-phpunit-PHPUnit-MockObject-1.2.3-4.fc20 / php-5.5.13-3.fc20 / etc (2014-6901) | 18 Jun 201400:00 | – | nessus |
Tenable Nessus | Amazon Linux AMI : php55 (ALAS-2014-362) | 12 Oct 201400:00 | – | nessus |
Source | Link |
---|---|
www.2014-160-01 | |
slackware | www.slackware.com/security/viewer.php |
# SPDX-FileCopyrightText: 2022 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.1.13.2014.160.01");
script_cve_id("CVE-2014-0185", "CVE-2014-0237", "CVE-2014-0238");
script_tag(name:"creation_date", value:"2022-04-21 12:12:27 +0000 (Thu, 21 Apr 2022)");
script_version("2024-02-02T05:06:09+0000");
script_tag(name:"last_modification", value:"2024-02-02 05:06:09 +0000 (Fri, 02 Feb 2024)");
script_tag(name:"cvss_base", value:"7.2");
script_tag(name:"cvss_base_vector", value:"AV:L/AC:L/Au:N/C:C/I:C/A:C");
script_name("Slackware: Security Advisory (SSA:2014-160-01)");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2022 Greenbone AG");
script_family("Slackware Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/slackware_linux", "ssh/login/slackpack", re:"ssh/login/release=SLK(13\.0|13\.1|13\.37|14\.0|14\.1|current)");
script_xref(name:"Advisory-ID", value:"SSA:2014-160-01");
script_xref(name:"URL", value:"http://www.slackware.com/security/viewer.php?l=slackware-security&y=2014&m=slackware-security.518178");
script_tag(name:"summary", value:"The remote host is missing an update for the 'php' package(s) announced via the SSA:2014-160-01 advisory.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable package version is present on the target host.");
script_tag(name:"insight", value:"New php packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1,
and -current to fix security issues.
Here are the details from the Slackware 14.1 ChangeLog:
+--------------------------+
patches/packages/php-5.4.29-i486-1_slack14.1.txz: Upgraded.
This update fixes bugs and security issues, including a possible denial
of service, and an issue where insecure default permissions on the FPM
socket may allow local users to run arbitrary code as the apache user.
For more information, see:
[link moved to references]
[link moved to references]
[link moved to references]
(* Security fix *)
+--------------------------+");
script_tag(name:"affected", value:"'php' package(s) on Slackware 13.0, Slackware 13.1, Slackware 13.37, Slackware 14.0, Slackware 14.1, Slackware current.");
script_tag(name:"solution", value:"Please install the updated package(s).");
script_tag(name:"solution_type", value:"VendorFix");
script_tag(name:"qod_type", value:"package");
exit(0);
}
include("revisions-lib.inc");
include("pkg-lib-slack.inc");
release = slk_get_ssh_release();
if(!release)
exit(0);
res = "";
report = "";
if(release == "SLK13.0") {
if(!isnull(res = isslkpkgvuln(pkg:"php", ver:"5.3.28-i486-1_slack13.0", rls:"SLK13.0"))) {
report += res;
}
if(!isnull(res = isslkpkgvuln(pkg:"php", ver:"5.3.28-x86_64-1_slack13.0", rls:"SLK13.0"))) {
report += res;
}
if(report != "") {
security_message(data:report);
} else if(__pkg_match) {
exit(99);
}
exit(0);
}
if(release == "SLK13.1") {
if(!isnull(res = isslkpkgvuln(pkg:"php", ver:"5.3.28-i486-1_slack13.1", rls:"SLK13.1"))) {
report += res;
}
if(!isnull(res = isslkpkgvuln(pkg:"php", ver:"5.3.28-x86_64-1_slack13.1", rls:"SLK13.1"))) {
report += res;
}
if(report != "") {
security_message(data:report);
} else if(__pkg_match) {
exit(99);
}
exit(0);
}
if(release == "SLK13.37") {
if(!isnull(res = isslkpkgvuln(pkg:"php", ver:"5.3.28-i486-1_slack13.37", rls:"SLK13.37"))) {
report += res;
}
if(!isnull(res = isslkpkgvuln(pkg:"php", ver:"5.3.28-x86_64-1_slack13.37", rls:"SLK13.37"))) {
report += res;
}
if(report != "") {
security_message(data:report);
} else if(__pkg_match) {
exit(99);
}
exit(0);
}
if(release == "SLK14.0") {
if(!isnull(res = isslkpkgvuln(pkg:"php", ver:"5.4.29-i486-1_slack14.0", rls:"SLK14.0"))) {
report += res;
}
if(!isnull(res = isslkpkgvuln(pkg:"php", ver:"5.4.29-x86_64-1_slack14.0", rls:"SLK14.0"))) {
report += res;
}
if(report != "") {
security_message(data:report);
} else if(__pkg_match) {
exit(99);
}
exit(0);
}
if(release == "SLK14.1") {
if(!isnull(res = isslkpkgvuln(pkg:"php", ver:"5.4.29-i486-1_slack14.1", rls:"SLK14.1"))) {
report += res;
}
if(!isnull(res = isslkpkgvuln(pkg:"php", ver:"5.4.29-x86_64-1_slack14.1", rls:"SLK14.1"))) {
report += res;
}
if(report != "") {
security_message(data:report);
} else if(__pkg_match) {
exit(99);
}
exit(0);
}
if(release == "SLKcurrent") {
if(!isnull(res = isslkpkgvuln(pkg:"php", ver:"5.4.29-i486-1", rls:"SLKcurrent"))) {
report += res;
}
if(!isnull(res = isslkpkgvuln(pkg:"php", ver:"5.4.29-x86_64-1", rls:"SLKcurrent"))) {
report += res;
}
if(report != "") {
security_message(data:report);
} else if(__pkg_match) {
exit(99);
}
exit(0);
}
exit(0);
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo