The remote host is missing an update for the Huawei EulerOS 'php' package(s) announced via the EulerOS-SA-2020-1058 advisory. In PHP versions 7.1.x below 7.1.33, 7.2.x below 7.2.24 and 7.3.x below 7.3.11, remote code execution is possible, and a denial of service can be caused via an empty string in the message argument to the imap_mail function
Reporter | Title | Published | Views | Family All 199 |
---|---|---|---|---|
![]() | Fedora Update for php FEDORA-2019-187ae3128d | 2 Nov 201900:00 | – | openvas |
![]() | Huawei EulerOS: Security Advisory for php (EulerOS-SA-2020-1023) | 23 Jan 202000:00 | – | openvas |
![]() | Fedora Update for php FEDORA-2019-f187a4df7a | 7 May 201900:00 | – | openvas |
![]() | Fedora Update for php FEDORA-2019-efa799fd16 | 16 Mar 201900:00 | – | openvas |
![]() | Fedora Update for php FEDORA-2019-da36d5d484 | 7 May 201900:00 | – | openvas |
![]() | PHP 'CVE-2018-19935' - 'imap_mail' Denial of Service Vulnerability - Linux | 10 Dec 201800:00 | – | openvas |
![]() | Fedora Update for php FEDORA-2019-a6511b0eed | 19 Jan 201900:00 | – | openvas |
![]() | Fedora Update for php FEDORA-2019-253da50ddd | 17 Apr 201900:00 | – | openvas |
![]() | PHP 'CVE-2018-19935' - 'imap_mail' Denial of Service Vulnerability - Windows | 10 Dec 201800:00 | – | openvas |
![]() | Huawei EulerOS: Security Advisory for php (EulerOS-SA-2019-2295) | 23 Jan 202000:00 | – | openvas |
# SPDX-FileCopyrightText: 2020 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.1.2.2020.1058");
script_cve_id("CVE-2018-19935", "CVE-2019-11043");
script_tag(name:"creation_date", value:"2020-01-23 13:18:30 +0000 (Thu, 23 Jan 2020)");
script_version("2024-08-08T05:05:41+0000");
script_tag(name:"last_modification", value:"2024-08-08 05:05:41 +0000 (Thu, 08 Aug 2024)");
script_tag(name:"cvss_base", value:"7.5");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:P/A:P");
script_tag(name:"severity_vector", value:"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
script_tag(name:"severity_origin", value:"NVD");
script_tag(name:"severity_date", value:"2019-10-30 19:01:09 +0000 (Wed, 30 Oct 2019)");
script_name("Huawei EulerOS: Security Advisory for php (EulerOS-SA-2020-1058)");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2020 Greenbone AG");
script_family("Huawei EulerOS Local Security Checks");
script_dependencies("gb_huawei_euleros_consolidation.nasl");
script_mandatory_keys("ssh/login/euleros", "ssh/login/rpms", re:"ssh/login/release=EULEROSVIRTARM64\-3\.0\.5\.0");
script_xref(name:"Advisory-ID", value:"EulerOS-SA-2020-1058");
script_xref(name:"URL", value:"https://developer.huaweicloud.com/intl/en-us/euleros/securitydetail.html?secId=EulerOS-SA-2020-1058");
script_tag(name:"summary", value:"The remote host is missing an update for the Huawei EulerOS 'php' package(s) announced via the EulerOS-SA-2020-1058 advisory.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable package version is present on the target host.");
script_tag(name:"insight", value:"In PHP versions 7.1.x below 7.1.33, 7.2.x below 7.2.24 and 7.3.x below 7.3.11 in certain configurations of FPM setup it is possible to cause FPM module to write past allocated buffers into the space reserved for FCGI protocol data, thus opening the possibility of remote code execution.(CVE-2019-11043)
ext/imap/php_imap.c in PHP 5.x and 7.x before 7.3.0 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an empty string in the message argument to the imap_mail function.(CVE-2018-19935)");
script_tag(name:"affected", value:"'php' package(s) on Huawei EulerOS Virtualization for ARM 64 3.0.5.0.");
script_tag(name:"solution", value:"Please install the updated package(s).");
script_tag(name:"solution_type", value:"VendorFix");
script_tag(name:"qod_type", value:"package");
script_xref(name:"CISA", value:"Known Exploited Vulnerability (KEV) catalog");
script_xref(name:"URL", value:"https://www.cisa.gov/known-exploited-vulnerabilities-catalog");
exit(0);
}
include("revisions-lib.inc");
include("pkg-lib-rpm.inc");
release = rpm_get_ssh_release();
if(!release)
exit(0);
res = "";
report = "";
if(release == "EULEROSVIRTARM64-3.0.5.0") {
if(!isnull(res = isrpmvuln(pkg:"php", rpm:"php~7.2.10~1.h8.eulerosv2r8", rls:"EULEROSVIRTARM64-3.0.5.0"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"php-cli", rpm:"php-cli~7.2.10~1.h8.eulerosv2r8", rls:"EULEROSVIRTARM64-3.0.5.0"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"php-common", rpm:"php-common~7.2.10~1.h8.eulerosv2r8", rls:"EULEROSVIRTARM64-3.0.5.0"))) {
report += res;
}
if(report != "") {
security_message(data:report);
} else if(__pkg_match) {
exit(99);
}
exit(0);
}
exit(0);
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo