ID OPENVAS:871084 Type openvas Reporter Copyright (C) 2013 Greenbone Networks GmbH Modified 2018-02-03T00:00:00
Description
Check for the Version of php
###############################################################################
# OpenVAS Vulnerability Test
#
# RedHat Update for php RHSA-2013:1615-02
#
# Authors:
# System Generated Check
#
# Copyright:
# Copyright (C) 2013 Greenbone Networks GmbH, http://www.greenbone.net
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2
# (or any later version), as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
###############################################################################
include("revisions-lib.inc");
if(description)
{
script_id(871084);
script_version("$Revision: 8650 $");
script_tag(name:"last_modification", value:"$Date: 2018-02-03 13:16:59 +0100 (Sat, 03 Feb 2018) $");
script_tag(name:"creation_date", value:"2013-11-21 10:44:22 +0530 (Thu, 21 Nov 2013)");
script_cve_id("CVE-2006-7243", "CVE-2013-1643", "CVE-2013-4248");
script_tag(name:"cvss_base", value:"5.0");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:N/I:P/A:N");
script_name("RedHat Update for php RHSA-2013:1615-02");
tag_insight = "PHP is an HTML-embedded scripting language commonly used with the Apache
HTTP Server.
It was found that PHP did not properly handle file names with a NULL
character. A remote attacker could possibly use this flaw to make a PHP
script access unexpected files and bypass intended file system access
restrictions. (CVE-2006-7243)
A flaw was found in PHP's SSL client's hostname identity check when
handling certificates that contain hostnames with NULL bytes. If an
attacker was able to get a carefully crafted certificate signed by a
trusted Certificate Authority, the attacker could use the certificate to
conduct man-in-the-middle attacks to spoof SSL servers. (CVE-2013-4248)
It was found that the PHP SOAP parser allowed the expansion of external XML
entities during SOAP message parsing. A remote attacker could possibly use
this flaw to read arbitrary files that are accessible to a PHP application
using a SOAP extension. (CVE-2013-1643)
This update fixes the following bugs:
* Previously, when the allow_call_time_pass_reference setting was disabled,
a virtual host on the Apache server could terminate with a segmentation
fault when attempting to process certain PHP content. This bug has been
fixed and virtual hosts no longer crash when allow_call_time_pass_reference
is off. (BZ#892158, BZ#910466)
* Prior to this update, if an error occurred during the operation of the
fclose(), file_put_contents(), or copy() function, the function did not
report it. This could have led to data loss. With this update, the
aforementioned functions have been modified to properly report any errors.
(BZ#947429)
* The internal buffer for the SQLSTATE error code can store maximum of 5
characters. Previously, when certain calls exceeded this limit, a buffer
overflow occurred. With this update, messages longer than 5 characters are
automatically replaced with the default 'HY000' string, thus preventing the
overflow. (BZ#969110)
In addition, this update adds the following enhancement:
* This update adds the following rpm macros to the php package: %__php,
%php_inidir, %php_incldir. (BZ#953814)
Users of php are advised to upgrade to these updated packages, which fix
these bugs and add this enhancement. After installing the updated packages,
the httpd daemon must be restarted for the update to take effect.
";
tag_affected = "php on Red Hat Enterprise Linux Server (v. 6),
Red Hat Enterprise Linux Workstation (v. 6)";
tag_solution = "Please Install the Updated Packages.";
script_tag(name : "affected" , value : tag_affected);
script_tag(name : "insight" , value : tag_insight);
script_tag(name : "solution" , value : tag_solution);
script_tag(name:"qod_type", value:"package");
script_tag(name:"solution_type", value:"VendorFix");
script_xref(name: "RHSA", value: "2013:1615-02");
script_xref(name: "URL" , value: "https://www.redhat.com/archives/rhsa-announce/2013-November/msg00027.html");
script_tag(name: "summary" , value: "Check for the Version of php");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2013 Greenbone Networks GmbH");
script_family("Red Hat Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/rhel", "ssh/login/rpms");
exit(0);
}
include("pkg-lib-rpm.inc");
release = get_kb_item("ssh/login/release");
res = "";
if(release == NULL){
exit(0);
}
if(release == "RHENT_6")
{
if ((res = isrpmvuln(pkg:"php", rpm:"php~5.3.3~26.el6", rls:"RHENT_6")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"php-cli", rpm:"php-cli~5.3.3~26.el6", rls:"RHENT_6")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"php-common", rpm:"php-common~5.3.3~26.el6", rls:"RHENT_6")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"php-debuginfo", rpm:"php-debuginfo~5.3.3~26.el6", rls:"RHENT_6")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"php-gd", rpm:"php-gd~5.3.3~26.el6", rls:"RHENT_6")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"php-ldap", rpm:"php-ldap~5.3.3~26.el6", rls:"RHENT_6")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"php-mysql", rpm:"php-mysql~5.3.3~26.el6", rls:"RHENT_6")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"php-odbc", rpm:"php-odbc~5.3.3~26.el6", rls:"RHENT_6")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"php-pdo", rpm:"php-pdo~5.3.3~26.el6", rls:"RHENT_6")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"php-pgsql", rpm:"php-pgsql~5.3.3~26.el6", rls:"RHENT_6")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"php-soap", rpm:"php-soap~5.3.3~26.el6", rls:"RHENT_6")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"php-xml", rpm:"php-xml~5.3.3~26.el6", rls:"RHENT_6")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"php-xmlrpc", rpm:"php-xmlrpc~5.3.3~26.el6", rls:"RHENT_6")) != NULL)
{
security_message(data:res);
exit(0);
}
if (__pkg_match) exit(99); # Not vulnerable.
exit(0);
}
{"id": "OPENVAS:871084", "type": "openvas", "bulletinFamily": "scanner", "title": "RedHat Update for php RHSA-2013:1615-02", "description": "Check for the Version of php", "published": "2013-11-21T00:00:00", "modified": "2018-02-03T00:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}, "href": "http://plugins.openvas.org/nasl.php?oid=871084", "reporter": "Copyright (C) 2013 Greenbone Networks GmbH", "references": ["https://www.redhat.com/archives/rhsa-announce/2013-November/msg00027.html", "2013:1615-02"], "cvelist": ["CVE-2013-4248", "CVE-2013-1643", "CVE-2006-7243"], "lastseen": "2018-02-05T11:11:26", "viewCount": 0, "enchantments": {"score": {"value": 6.3, "vector": "NONE", "modified": "2018-02-05T11:11:26", "rev": 2}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2006-7243", "CVE-2013-1643", "CVE-2013-4248"]}, {"type": "centos", "idList": ["CESA-2013:1615", "CESA-2014:0311", "CESA-2013:1307"]}, {"type": "redhat", "idList": ["RHSA-2014:0311", "RHSA-2013:1307", "RHSA-2013:1615"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310867177", "OPENVAS:1361412562310123529", "OPENVAS:1361412562310871047", "OPENVAS:871047", "OPENVAS:1361412562310871084", "OPENVAS:866884", "OPENVAS:867177", "OPENVAS:1361412562310123562", "OPENVAS:1361412562310866884", "OPENVAS:68832"]}, {"type": "nessus", "idList": ["SL_20130930_PHP53_ON_SL5_X.NASL", "CENTOS_RHSA-2013-1307.NASL", "ORACLELINUX_ELSA-2013-1307.NASL", "ORACLELINUX_ELSA-2013-1615.NASL", "FREEBSD_PKG_3761DF020F9C11E0BECC0022156E8794.NASL", "REDHAT-RHSA-2013-1615.NASL", "UBUNTU_USN-1761-1.NASL", "CENTOS_RHSA-2013-1615.NASL", "SL_20131121_PHP_ON_SL6_X.NASL", "REDHAT-RHSA-2013-1307.NASL"]}, {"type": "f5", "idList": ["SOL16993", "F5:K16993", "SOL14433", "F5:K14433", "SOL14909"]}, {"type": "seebug", "idList": ["SSV:60051"]}, {"type": "oraclelinux", "idList": ["ELSA-2013-1615", "ELSA-2013-1307", "ELSA-2014-0311"]}, {"type": "fedora", "idList": ["FEDORA:CE081217C7", "FEDORA:DA7FD21A08", "FEDORA:D71912448B", "FEDORA:E577920E32"]}, {"type": "freebsd", "idList": ["1D23109A-9005-11E2-9602-D43D7E0C7C02", "3761DF02-0F9C-11E0-BECC-0022156E8794"]}, {"type": "ubuntu", "idList": ["USN-1761-1", "USN-1937-1"]}, {"type": "ptsecurity", "idList": ["PT-2013-14"]}, {"type": "debian", "idList": ["DEBIAN:DSA-2639-1:48C8A", "DEBIAN:DSA-2742-1:FA4D7", "DEBIAN:DLA-444-1:A9010"]}, {"type": "slackware", "idList": ["SSA-2013-081-01", "SSA-2013-242-02"]}, {"type": "thn", "idList": ["THN:88621B70C7F5EC61ED5F438C1F1EF3E0"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:VULN:12914", "SECURITYVULNS:DOC:29719", "SECURITYVULNS:DOC:29110"]}], "modified": "2018-02-05T11:11:26", "rev": 2}, "vulnersScore": 6.3}, "pluginID": "871084", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for php RHSA-2013:1615-02\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2013 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\n\nif(description)\n{\n script_id(871084);\n script_version(\"$Revision: 8650 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-02-03 13:16:59 +0100 (Sat, 03 Feb 2018) $\");\n script_tag(name:\"creation_date\", value:\"2013-11-21 10:44:22 +0530 (Thu, 21 Nov 2013)\");\n script_cve_id(\"CVE-2006-7243\", \"CVE-2013-1643\", \"CVE-2013-4248\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:P/A:N\");\n script_name(\"RedHat Update for php RHSA-2013:1615-02\");\n\n tag_insight = \"PHP is an HTML-embedded scripting language commonly used with the Apache\nHTTP Server.\n\nIt was found that PHP did not properly handle file names with a NULL\ncharacter. A remote attacker could possibly use this flaw to make a PHP\nscript access unexpected files and bypass intended file system access\nrestrictions. (CVE-2006-7243)\n\nA flaw was found in PHP's SSL client's hostname identity check when\nhandling certificates that contain hostnames with NULL bytes. If an\nattacker was able to get a carefully crafted certificate signed by a\ntrusted Certificate Authority, the attacker could use the certificate to\nconduct man-in-the-middle attacks to spoof SSL servers. (CVE-2013-4248)\n\nIt was found that the PHP SOAP parser allowed the expansion of external XML\nentities during SOAP message parsing. A remote attacker could possibly use\nthis flaw to read arbitrary files that are accessible to a PHP application\nusing a SOAP extension. (CVE-2013-1643)\n\nThis update fixes the following bugs:\n\n* Previously, when the allow_call_time_pass_reference setting was disabled,\na virtual host on the Apache server could terminate with a segmentation\nfault when attempting to process certain PHP content. This bug has been\nfixed and virtual hosts no longer crash when allow_call_time_pass_reference\nis off. (BZ#892158, BZ#910466)\n\n* Prior to this update, if an error occurred during the operation of the\nfclose(), file_put_contents(), or copy() function, the function did not\nreport it. This could have led to data loss. With this update, the\naforementioned functions have been modified to properly report any errors.\n(BZ#947429)\n\n* The internal buffer for the SQLSTATE error code can store maximum of 5\ncharacters. Previously, when certain calls exceeded this limit, a buffer\noverflow occurred. With this update, messages longer than 5 characters are\nautomatically replaced with the default 'HY000' string, thus preventing the\noverflow. (BZ#969110)\n\nIn addition, this update adds the following enhancement:\n\n* This update adds the following rpm macros to the php package: %__php,\n%php_inidir, %php_incldir. (BZ#953814)\n\nUsers of php are advised to upgrade to these updated packages, which fix\nthese bugs and add this enhancement. After installing the updated packages,\nthe httpd daemon must be restarted for the update to take effect.\n\";\n\n tag_affected = \"php on Red Hat Enterprise Linux Server (v. 6),\n Red Hat Enterprise Linux Workstation (v. 6)\";\n\n tag_solution = \"Please Install the Updated Packages.\";\n\n\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name: \"RHSA\", value: \"2013:1615-02\");\n script_xref(name: \"URL\" , value: \"https://www.redhat.com/archives/rhsa-announce/2013-November/msg00027.html\");\n script_tag(name: \"summary\" , value: \"Check for the Version of php\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2013 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"RHENT_6\")\n{\n\n if ((res = isrpmvuln(pkg:\"php\", rpm:\"php~5.3.3~26.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-cli\", rpm:\"php-cli~5.3.3~26.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-common\", rpm:\"php-common~5.3.3~26.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-debuginfo\", rpm:\"php-debuginfo~5.3.3~26.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-gd\", rpm:\"php-gd~5.3.3~26.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-ldap\", rpm:\"php-ldap~5.3.3~26.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mysql\", rpm:\"php-mysql~5.3.3~26.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-odbc\", rpm:\"php-odbc~5.3.3~26.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo\", rpm:\"php-pdo~5.3.3~26.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pgsql\", rpm:\"php-pgsql~5.3.3~26.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-soap\", rpm:\"php-soap~5.3.3~26.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xml\", rpm:\"php-xml~5.3.3~26.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xmlrpc\", rpm:\"php-xmlrpc~5.3.3~26.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "naslFamily": "Red Hat Local Security Checks"}
{"cve": [{"lastseen": "2020-12-09T19:23:51", "description": "PHP before 5.3.4 accepts the \\0 character in a pathname, which might allow context-dependent attackers to bypass intended access restrictions by placing a safe file extension after this character, as demonstrated by .php\\0.jpg at the end of the argument to the file_exists function.", "edition": 5, "cvss3": {}, "published": "2011-01-18T20:00:00", "title": "CVE-2006-7243", "type": "cve", "cwe": ["CWE-20"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2006-7243"], "modified": "2018-10-30T16:26:00", "cpe": ["cpe:/a:php:php:4.4.0", "cpe:/a:php:php:4.4.6", "cpe:/a:php:php:5.1.5", "cpe:/a:php:php:4.0.4", "cpe:/a:php:php:5.2.1", "cpe:/a:php:php:5.2.12", "cpe:/a:php:php:3.0.11", "cpe:/a:php:php:3.0.17", "cpe:/a:php:php:5.0.1", "cpe:/a:php:php:5.2.11", "cpe:/a:php:php:5.2.9", "cpe:/a:php:php:5.2.6", "cpe:/a:php:php:4.4.2", "cpe:/a:php:php:5.1.4", "cpe:/a:php:php:3.0.12", "cpe:/a:php:php:4.4.8", "cpe:/a:php:php:4.4.9", "cpe:/a:php:php:4.0", "cpe:/a:php:php:3.0.15", "cpe:/a:php:php:4.3.6", "cpe:/a:php:php:4.4.3", "cpe:/a:php:php:4.3.0", "cpe:/a:php:php:4.0.2", "cpe:/a:php:php:4.0.7", "cpe:/a:php:php:4.3.7", "cpe:/a:php:php:5.1.3", "cpe:/a:php:php:3.0.16", "cpe:/a:php:php:4.3.4", "cpe:/a:php:php:5.1.6", "cpe:/a:php:php:5.2.3", "cpe:/a:php:php:5.2.5", "cpe:/a:php:php:3.0.9", "cpe:/a:php:php:3.0.4", "cpe:/a:php:php:4.3.5", "cpe:/a:php:php:3.0.8", "cpe:/a:php:php:4.2.0", "cpe:/a:php:php:3.0.2", "cpe:/a:php:php:3.0", "cpe:/a:php:php:5.0.2", "cpe:/a:php:php:3.0.1", "cpe:/a:php:php:2.0", "cpe:/a:php:php:4.3.2", "cpe:/a:php:php:3.0.14", "cpe:/a:php:php:5.3.1", "cpe:/a:php:php:5.2.10", "cpe:/a:php:php:4.4.7", "cpe:/a:php:php:4.3.1", "cpe:/a:php:php:5.2.4", "cpe:/a:php:php:5.1.0", "cpe:/a:php:php:5.2.0", "cpe:/a:php:php:5.3.0", "cpe:/a:php:php:4.3.10", "cpe:/a:php:php:4.2.1", "cpe:/a:php:php:5.2.15", "cpe:/a:php:php:5.0.4", "cpe:/a:php:php:3.0.7", "cpe:/a:php:php:4.0.0", "cpe:/a:php:php:4.3.11", "cpe:/a:php:php:4.1.2", "cpe:/a:php:php:5.2.8", "cpe:/a:php:php:3.0.3", "cpe:/a:php:php:4.4.1", "cpe:/a:php:php:4.1.0", "cpe:/a:php:php:4.0.5", "cpe:/a:php:php:4.3.8", "cpe:/a:php:php:5.2.13", "cpe:/a:php:php:5.1.1", "cpe:/a:php:php:4.4.4", "cpe:/a:php:php:4.3.3", "cpe:/a:php:php:5.2.2", "cpe:/a:php:php:3.0.10", "cpe:/a:php:php:4.3.9", "cpe:/a:php:php:4.0.3", "cpe:/a:php:php:5.2.17", "cpe:/a:php:php:5.0.5", "cpe:/a:php:php:4.2.2", "cpe:/a:php:php:3.0.13", "cpe:/a:php:php:3.0.5", "cpe:/a:php:php:5.3.2", "cpe:/a:php:php:4.0.1", "cpe:/a:php:php:5.0.3", "cpe:/a:php:php:4.4.5", "cpe:/a:php:php:5.2.7", "cpe:/a:php:php:3.0.6", "cpe:/a:php:php:2.0b10", "cpe:/a:php:php:5.1.2", "cpe:/a:php:php:4.2.3", "cpe:/a:php:php:1.0", "cpe:/a:php:php:5.3.3", "cpe:/a:php:php:4.1.1", "cpe:/a:php:php:5.0.0", "cpe:/a:php:php:5.2.14", "cpe:/a:php:php:3.0.18", "cpe:/a:php:php:4.0.6", "cpe:/a:php:php:5.2.16"], "id": "CVE-2006-7243", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-7243", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:a:php:php:5.0.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.15:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:3.0.17:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.12:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.11:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:3.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:3.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.4.8:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:3.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.14:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:3.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:3.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.16:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:3.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:3.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.13:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:2.0b10:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:3.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.17:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.0:beta_4_patch1:*:*:*:*:*:*", "cpe:2.3:a:php:php:3.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.0:beta4:*:*:*:*:*:*", "cpe:2.3:a:php:php:3.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.3.11:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.4.9:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:3.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:php:php:3.0.15:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.10:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.3.10:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:3.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.3.7:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.3.9:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.4:*:windows:*:*:*:*:*", "cpe:2.3:a:php:php:3.0.18:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.3.8:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:3.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.0:beta4:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.9:*:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T19:52:44", "description": "The openssl_x509_parse function in openssl.c in the OpenSSL module in PHP before 5.4.18 and 5.5.x before 5.5.2 does not properly handle a '\\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.", "edition": 5, "cvss3": {}, "published": "2013-08-18T02:52:00", "title": "CVE-2013-4248", "type": "cve", "cwe": ["CWE-20"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2013-4248"], "modified": "2016-11-28T19:09:00", "cpe": ["cpe:/a:php:php:5.1.5", "cpe:/a:php:php:5.2.1", "cpe:/a:php:php:5.2.12", "cpe:/a:php:php:5.4.12", "cpe:/a:php:php:5.3.13", "cpe:/a:php:php:5.4.1", "cpe:/a:php:php:5.4.8", "cpe:/a:php:php:5.0.1", "cpe:/a:php:php:5.2.11", "cpe:/a:php:php:5.3.4", "cpe:/a:php:php:5.2.9", "cpe:/a:php:php:5.3.25", "cpe:/a:php:php:5.2.6", "cpe:/o:redhat:enterprise_linux:5", "cpe:/a:php:php:5.1.4", "cpe:/a:php:php:5.4.4", "cpe:/a:php:php:5.3.21", "cpe:/a:php:php:5.3.8", "cpe:/a:php:php:5.3.22", "cpe:/a:php:php:5.1.3", "cpe:/a:php:php:5.3.9", "cpe:/a:php:php:5.4.0", "cpe:/a:php:php:5.1.6", "cpe:/a:php:php:5.2.3", "cpe:/o:canonical:ubuntu_linux:12.04", "cpe:/a:php:php:5.4.5", "cpe:/a:php:php:5.2.5", "cpe:/a:php:php:5.4.17", "cpe:/a:php:php:5.3.6", "cpe:/a:php:php:5.3.19", "cpe:/a:php:php:5.3.10", "cpe:/a:php:php:5.0.2", "cpe:/a:php:php:5.3.5", "cpe:/a:php:php:5.3.1", "cpe:/a:php:php:5.2.10", "cpe:/a:php:php:5.3.23", "cpe:/a:php:php:5.2.4", "cpe:/a:php:php:5.3.20", "cpe:/a:php:php:5.1.0", "cpe:/a:php:php:5.2.0", "cpe:/a:php:php:5.3.0", "cpe:/a:php:php:5.3.26", "cpe:/a:php:php:5.2.15", "cpe:/a:php:php:5.0.4", "cpe:/a:php:php:5.3.17", "cpe:/a:php:php:5.4.11", "cpe:/a:php:php:5.2.8", "cpe:/a:php:php:5.3.11", "cpe:/a:php:php:5.4.7", "cpe:/a:php:php:5.4.9", "cpe:/o:canonical:ubuntu_linux:12.10", "cpe:/a:php:php:5.2.13", "cpe:/a:php:php:5.1.1", "cpe:/a:php:php:5.3.27", "cpe:/a:php:php:5.4.16", "cpe:/a:php:php:5.3.15", "cpe:/a:php:php:5.5.0", "cpe:/a:php:php:5.5.1", "cpe:/a:php:php:5.2.2", "cpe:/o:canonical:ubuntu_linux:10.04", "cpe:/a:php:php:5.3.12", "cpe:/a:php:php:5.3.7", "cpe:/o:canonical:ubuntu_linux:13.04", "cpe:/a:php:php:5.4.15", "cpe:/a:php:php:5.4.13", "cpe:/a:php:php:5.4.10", "cpe:/a:php:php:5.2.17", "cpe:/a:php:php:5.0.5", "cpe:/a:php:php:5.4.2", "cpe:/a:php:php:5.3.14", "cpe:/a:php:php:5.3.18", "cpe:/a:php:php:5.3.2", "cpe:/a:php:php:5.4.6", "cpe:/a:php:php:5.0.3", "cpe:/a:php:php:5.2.7", "cpe:/a:php:php:5.1.2", "cpe:/a:php:php:5.3.16", "cpe:/a:php:php:5.3.3", "cpe:/a:php:php:5.0.0", "cpe:/a:php:php:5.2.14", "cpe:/a:php:php:5.4.3", "cpe:/a:php:php:5.3.24", "cpe:/a:php:php:5.4.14", "cpe:/a:php:php:5.2.16"], "id": "CVE-2013-4248", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-4248", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:a:php:php:5.4.12:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.3.14:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.3.9:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.3.15:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.15:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.3.22:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.4.14:rc1:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.12:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.3.25:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.11:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.3.11:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.3.16:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.3.26:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.14:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.16:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.4.8:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.3.17:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.13:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.3.12:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.3.18:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.3.24:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.3.20:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.4.13:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.3.19:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.17:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.4.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.4.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.4.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.3.13:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.10:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.3.23:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.4.16:rc1:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.4.14:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.3.8:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.4.9:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.4.15:rc1:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.4.11:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.3.10:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.4.13:rc1:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.3.7:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.4.17:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.3.27:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*", "cpe:2.3:a:php:php:5.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.0:beta4:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.3:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.3.21:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.4.12:rc2:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.4.12:rc1:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.9:*:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T19:52:39", "description": "The SOAP parser in PHP before 5.3.23 and 5.4.x before 5.4.13 allows remote attackers to read arbitrary files via a SOAP WSDL file containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue in the soap_xmlParseFile and soap_xmlParseMemory functions. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-1824.", "edition": 5, "cvss3": {}, "published": "2013-03-06T13:10:00", "title": "CVE-2013-1643", "type": "cve", "cwe": ["CWE-200"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2013-1643"], "modified": "2014-01-28T04:51:00", "cpe": ["cpe:/a:php:php:4.4.0", "cpe:/a:php:php:4.4.6", "cpe:/a:php:php:5.1.5", "cpe:/a:php:php:4.0.4", "cpe:/a:php:php:5.2.1", "cpe:/a:php:php:5.2.12", "cpe:/a:php:php:5.4.12", "cpe:/a:php:php:5.3.13", "cpe:/a:php:php:5.4.1", "cpe:/a:php:php:3.0.11", "cpe:/a:php:php:5.4.8", "cpe:/a:php:php:3.0.17", "cpe:/a:php:php:5.0.1", "cpe:/a:php:php:5.2.11", "cpe:/a:php:php:5.3.4", "cpe:/a:php:php:5.2.9", "cpe:/a:php:php:5.2.6", "cpe:/a:php:php:4.4.2", "cpe:/a:php:php:5.1.4", "cpe:/a:php:php:5.4.4", "cpe:/a:php:php:3.0.12", "cpe:/a:php:php:4.4.8", "cpe:/a:php:php:5.3.21", "cpe:/a:php:php:4.4.9", "cpe:/a:php:php:4.0", "cpe:/a:php:php:3.0.15", "cpe:/a:php:php:5.3.8", "cpe:/a:php:php:4.3.6", "cpe:/a:php:php:4.4.3", "cpe:/a:php:php:4.3.0", "cpe:/a:php:php:4.0.2", "cpe:/a:php:php:4.0.7", "cpe:/a:php:php:4.3.7", "cpe:/a:php:php:5.1.3", "cpe:/a:php:php:5.3.9", "cpe:/a:php:php:3.0.16", "cpe:/a:php:php:4.3.4", "cpe:/a:php:php:5.4.0", "cpe:/a:php:php:5.1.6", "cpe:/a:php:php:5.2.3", "cpe:/a:php:php:5.4.5", "cpe:/a:php:php:5.2.5", "cpe:/a:php:php:3.0.9", "cpe:/a:php:php:3.0.4", "cpe:/a:php:php:4.3.5", "cpe:/a:php:php:5.3.6", "cpe:/a:php:php:5.3.19", "cpe:/a:php:php:3.0.8", "cpe:/a:php:php:4.2.0", "cpe:/a:php:php:3.0.2", "cpe:/a:php:php:3.0", "cpe:/a:php:php:5.3.10", "cpe:/a:php:php:5.0.2", "cpe:/a:php:php:3.0.1", "cpe:/a:php:php:2.0", "cpe:/a:php:php:4.3.2", "cpe:/a:php:php:5.3.5", "cpe:/a:php:php:3.0.14", "cpe:/a:php:php:5.3.1", "cpe:/a:php:php:5.2.10", "cpe:/a:php:php:4.4.7", "cpe:/a:php:php:4.3.1", "cpe:/a:php:php:5.2.4", "cpe:/a:php:php:5.3.20", "cpe:/a:php:php:5.1.0", "cpe:/a:php:php:5.2.0", "cpe:/a:php:php:5.3.0", "cpe:/a:php:php:4.3.10", "cpe:/a:php:php:4.2.1", "cpe:/a:php:php:5.2.15", "cpe:/a:php:php:5.0.4", "cpe:/a:php:php:3.0.7", "cpe:/a:php:php:5.3.17", "cpe:/a:php:php:4.0.0", "cpe:/a:php:php:4.3.11", "cpe:/a:php:php:5.4.11", "cpe:/a:php:php:4.1.2", "cpe:/a:php:php:5.2.8", "cpe:/a:php:php:5.3.11", "cpe:/a:php:php:3.0.3", "cpe:/a:php:php:4.4.1", "cpe:/a:php:php:5.4.7", "cpe:/a:php:php:5.4.9", "cpe:/a:php:php:4.1.0", "cpe:/a:php:php:4.0.5", "cpe:/a:php:php:4.3.8", "cpe:/a:php:php:5.2.13", "cpe:/a:php:php:5.1.1", "cpe:/a:php:php:5.3.15", "cpe:/a:php:php:4.4.4", "cpe:/a:php:php:4.3.3", "cpe:/a:php:php:5.2.2", "cpe:/a:php:php:5.3.12", "cpe:/a:php:php:5.3.7", "cpe:/a:php:php:3.0.10", "cpe:/a:php:php:4.3.9", "cpe:/a:php:php:5.4.10", "cpe:/a:php:php:4.0.3", "cpe:/a:php:php:5.2.17", "cpe:/a:php:php:5.0.5", "cpe:/a:php:php:5.4.2", "cpe:/a:php:php:5.3.14", "cpe:/a:php:php:4.2.2", "cpe:/a:php:php:3.0.13", "cpe:/a:php:php:3.0.5", "cpe:/a:php:php:5.3.18", "cpe:/a:php:php:5.3.2", "cpe:/a:php:php:4.0.1", "cpe:/a:php:php:5.4.6", "cpe:/a:php:php:5.0.3", "cpe:/a:php:php:4.4.5", "cpe:/a:php:php:5.2.7", "cpe:/a:php:php:3.0.6", "cpe:/a:php:php:2.0b10", "cpe:/a:php:php:5.1.2", "cpe:/a:php:php:4.2.3", "cpe:/a:php:php:1.0", "cpe:/a:php:php:5.3.16", "cpe:/a:php:php:5.3.3", "cpe:/a:php:php:4.1.1", "cpe:/a:php:php:5.0.0", "cpe:/a:php:php:5.2.14", "cpe:/a:php:php:3.0.18", "cpe:/a:php:php:4.0.6", "cpe:/a:php:php:5.4.3", "cpe:/a:php:php:5.2.16"], "id": "CVE-2013-1643", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-1643", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}, "cpe23": ["cpe:2.3:a:php:php:5.4.12:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.3.14:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.3.9:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.3.15:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.15:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:3.0.17:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.12:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.11:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:3.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:3.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.4.8:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.3.11:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:3.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.3.16:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.14:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:3.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:3.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.16:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:3.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.4.8:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:3.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.3.17:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.13:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.3.12:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:2.0b10:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.3.18:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.3.20:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:3.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.3.19:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.17:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.0:beta_4_patch1:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:3.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.0:beta4:*:*:*:*:*:*", "cpe:2.3:a:php:php:3.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.3.11:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.4.10:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.3.13:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.4.9:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:3.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:php:php:3.0.15:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.10:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.3.10:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:3.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.3.7:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.3.9:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.3.8:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.4.9:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.4.11:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:3.0.18:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.3.10:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.3.8:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.3.7:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:3.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.0:beta4:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.3.21:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.9:*:*:*:*:*:*:*"]}], "centos": [{"lastseen": "2019-12-20T18:28:26", "bulletinFamily": "unix", "cvelist": ["CVE-2013-4248", "CVE-2013-1643", "CVE-2006-7243"], "description": "**CentOS Errata and Security Advisory** CESA-2013:1615\n\n\nPHP is an HTML-embedded scripting language commonly used with the Apache\nHTTP Server.\n\nIt was found that PHP did not properly handle file names with a NULL\ncharacter. A remote attacker could possibly use this flaw to make a PHP\nscript access unexpected files and bypass intended file system access\nrestrictions. (CVE-2006-7243)\n\nA flaw was found in PHP's SSL client's hostname identity check when\nhandling certificates that contain hostnames with NULL bytes. If an\nattacker was able to get a carefully crafted certificate signed by a\ntrusted Certificate Authority, the attacker could use the certificate to\nconduct man-in-the-middle attacks to spoof SSL servers. (CVE-2013-4248)\n\nIt was found that the PHP SOAP parser allowed the expansion of external XML\nentities during SOAP message parsing. A remote attacker could possibly use\nthis flaw to read arbitrary files that are accessible to a PHP application\nusing a SOAP extension. (CVE-2013-1643)\n\nThis update fixes the following bugs:\n\n* Previously, when the allow_call_time_pass_reference setting was disabled,\na virtual host on the Apache server could terminate with a segmentation\nfault when attempting to process certain PHP content. This bug has been\nfixed and virtual hosts no longer crash when allow_call_time_pass_reference\nis off. (BZ#892158, BZ#910466)\n\n* Prior to this update, if an error occurred during the operation of the\nfclose(), file_put_contents(), or copy() function, the function did not\nreport it. This could have led to data loss. With this update, the\naforementioned functions have been modified to properly report any errors.\n(BZ#947429)\n\n* The internal buffer for the SQLSTATE error code can store maximum of 5\ncharacters. Previously, when certain calls exceeded this limit, a buffer\noverflow occurred. With this update, messages longer than 5 characters are\nautomatically replaced with the default \"HY000\" string, thus preventing the\noverflow. (BZ#969110)\n\nIn addition, this update adds the following enhancement:\n\n* This update adds the following rpm macros to the php package: %__php,\n%php_inidir, %php_incldir. (BZ#953814)\n\nUsers of php are advised to upgrade to these updated packages, which fix\nthese bugs and add this enhancement. After installing the updated packages,\nthe httpd daemon must be restarted for the update to take effect.\n\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-cr-announce/2013-November/007246.html\n\n**Affected packages:**\nphp\nphp-bcmath\nphp-cli\nphp-common\nphp-dba\nphp-devel\nphp-embedded\nphp-enchant\nphp-fpm\nphp-gd\nphp-imap\nphp-intl\nphp-ldap\nphp-mbstring\nphp-mysql\nphp-odbc\nphp-pdo\nphp-pgsql\nphp-process\nphp-pspell\nphp-recode\nphp-snmp\nphp-soap\nphp-tidy\nphp-xml\nphp-xmlrpc\nphp-zts\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2013-1615.html", "edition": 4, "modified": "2013-11-26T13:32:36", "published": "2013-11-26T13:32:36", "href": "http://lists.centos.org/pipermail/centos-cr-announce/2013-November/007246.html", "id": "CESA-2013:1615", "title": "php security update", "type": "centos", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2019-12-20T18:28:50", "bulletinFamily": "unix", "cvelist": ["CVE-2013-4248", "CVE-2013-1643", "CVE-2012-2688", "CVE-2011-1398", "CVE-2006-7243", "CVE-2012-0831"], "description": "**CentOS Errata and Security Advisory** CESA-2013:1307\n\n\nPHP is an HTML-embedded scripting language commonly used with the Apache\nHTTP Server.\n\nIt was found that PHP did not properly handle file names with a NULL\ncharacter. A remote attacker could possibly use this flaw to make a PHP\nscript access unexpected files and bypass intended file system access\nrestrictions. (CVE-2006-7243)\n\nIt was found that PHP did not check for carriage returns in HTTP headers,\nallowing intended HTTP response splitting protections to be bypassed.\nDepending on the web browser the victim is using, a remote attacker could\nuse this flaw to perform HTTP response splitting attacks. (CVE-2011-1398)\n\nA flaw was found in PHP's SSL client's hostname identity check when\nhandling certificates that contain hostnames with NULL bytes. If an\nattacker was able to get a carefully crafted certificate signed by a\ntrusted Certificate Authority, the attacker could use the certificate to\nconduct man-in-the-middle attacks to spoof SSL servers. (CVE-2013-4248)\n\nAn integer signedness issue, leading to a heap-based buffer underflow, was\nfound in the PHP scandir() function. If a remote attacker could upload an\nexcessively large number of files to a directory the scandir() function\nruns on, it could cause the PHP interpreter to crash or, possibly, execute\narbitrary code. (CVE-2012-2688)\n\nIt was found that PHP did not correctly handle the magic_quotes_gpc\nconfiguration directive. This could result in magic_quotes_gpc input\nescaping not being applied in all cases, possibly making it easier for a\nremote attacker to perform SQL injection attacks. (CVE-2012-0831)\n\nIt was found that the PHP SOAP parser allowed the expansion of external XML\nentities during SOAP message parsing. A remote attacker could possibly use\nthis flaw to read arbitrary files that are accessible to a PHP application\nusing a SOAP extension. (CVE-2013-1643)\n\nThese updated php53 packages also include numerous bug fixes and\nenhancements. Space precludes documenting all of these changes in this\nadvisory. Users are directed to the Red Hat Enterprise Linux 5.10 Technical\nNotes, linked to in the References, for information on the most significant\nof these changes.\n\nAll PHP users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues and add this\nenhancement. After installing the updated packages, the httpd daemon must\nbe restarted for the update to take effect.\n\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-cr-announce/2013-October/007063.html\n\n**Affected packages:**\nphp53\nphp53-bcmath\nphp53-cli\nphp53-common\nphp53-dba\nphp53-devel\nphp53-gd\nphp53-imap\nphp53-intl\nphp53-ldap\nphp53-mbstring\nphp53-mysql\nphp53-odbc\nphp53-pdo\nphp53-pgsql\nphp53-process\nphp53-pspell\nphp53-snmp\nphp53-soap\nphp53-xml\nphp53-xmlrpc\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2013-1307.html", "edition": 3, "modified": "2013-10-07T12:42:03", "published": "2013-10-07T12:42:03", "href": "http://lists.centos.org/pipermail/centos-cr-announce/2013-October/007063.html", "id": "CESA-2013:1307", "title": "php53 security update", "type": "centos", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-12-20T18:29:14", "bulletinFamily": "unix", "cvelist": ["CVE-2006-7243", "CVE-2009-0689"], "description": "**CentOS Errata and Security Advisory** CESA-2014:0311\n\n\nPHP is an HTML-embedded scripting language commonly used with the Apache\nHTTP Server.\n\nA buffer overflow flaw was found in the way PHP parsed floating point\nnumbers from their text representation. If a PHP application converted\nuntrusted input strings to numbers, an attacker able to provide such input\ncould cause the application to crash or, possibly, execute arbitrary code\nwith the privileges of the application. (CVE-2009-0689)\n\nIt was found that PHP did not properly handle file names with a NULL\ncharacter. A remote attacker could possibly use this flaw to make a PHP\nscript access unexpected files and bypass intended file system access\nrestrictions. (CVE-2006-7243)\n\nAll php users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues. After installing the\nupdated packages, the httpd daemon must be restarted for the update to\ntake effect.\n\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2014-March/032252.html\n\n**Affected packages:**\nphp\nphp-bcmath\nphp-cli\nphp-common\nphp-dba\nphp-devel\nphp-gd\nphp-imap\nphp-ldap\nphp-mbstring\nphp-mysql\nphp-ncurses\nphp-odbc\nphp-pdo\nphp-pgsql\nphp-snmp\nphp-soap\nphp-xml\nphp-xmlrpc\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2014-0311.html", "edition": 3, "modified": "2014-03-19T01:15:26", "published": "2014-03-19T01:15:26", "href": "http://lists.centos.org/pipermail/centos-announce/2014-March/032252.html", "id": "CESA-2014:0311", "title": "php security update", "type": "centos", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "redhat": [{"lastseen": "2019-08-13T18:44:43", "bulletinFamily": "unix", "cvelist": ["CVE-2006-7243", "CVE-2013-1643", "CVE-2013-4248"], "description": "PHP is an HTML-embedded scripting language commonly used with the Apache\nHTTP Server.\n\nIt was found that PHP did not properly handle file names with a NULL\ncharacter. A remote attacker could possibly use this flaw to make a PHP\nscript access unexpected files and bypass intended file system access\nrestrictions. (CVE-2006-7243)\n\nA flaw was found in PHP's SSL client's hostname identity check when\nhandling certificates that contain hostnames with NULL bytes. If an\nattacker was able to get a carefully crafted certificate signed by a\ntrusted Certificate Authority, the attacker could use the certificate to\nconduct man-in-the-middle attacks to spoof SSL servers. (CVE-2013-4248)\n\nIt was found that the PHP SOAP parser allowed the expansion of external XML\nentities during SOAP message parsing. A remote attacker could possibly use\nthis flaw to read arbitrary files that are accessible to a PHP application\nusing a SOAP extension. (CVE-2013-1643)\n\nThis update fixes the following bugs:\n\n* Previously, when the allow_call_time_pass_reference setting was disabled,\na virtual host on the Apache server could terminate with a segmentation\nfault when attempting to process certain PHP content. This bug has been\nfixed and virtual hosts no longer crash when allow_call_time_pass_reference\nis off. (BZ#892158, BZ#910466)\n\n* Prior to this update, if an error occurred during the operation of the\nfclose(), file_put_contents(), or copy() function, the function did not\nreport it. This could have led to data loss. With this update, the\naforementioned functions have been modified to properly report any errors.\n(BZ#947429)\n\n* The internal buffer for the SQLSTATE error code can store maximum of 5\ncharacters. Previously, when certain calls exceeded this limit, a buffer\noverflow occurred. With this update, messages longer than 5 characters are\nautomatically replaced with the default \"HY000\" string, thus preventing the\noverflow. (BZ#969110)\n\nIn addition, this update adds the following enhancement:\n\n* This update adds the following rpm macros to the php package: %__php,\n%php_inidir, %php_incldir. (BZ#953814)\n\nUsers of php are advised to upgrade to these updated packages, which fix\nthese bugs and add this enhancement. After installing the updated packages,\nthe httpd daemon must be restarted for the update to take effect.\n", "modified": "2018-06-06T20:24:34", "published": "2013-11-21T05:00:00", "id": "RHSA-2013:1615", "href": "https://access.redhat.com/errata/RHSA-2013:1615", "type": "redhat", "title": "(RHSA-2013:1615) Moderate: php security, bug fix, and enhancement update", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2019-08-13T18:44:44", "bulletinFamily": "unix", "cvelist": ["CVE-2006-7243", "CVE-2011-1398", "CVE-2012-0831", "CVE-2012-2688", "CVE-2013-1643", "CVE-2013-4248"], "description": "PHP is an HTML-embedded scripting language commonly used with the Apache\nHTTP Server.\n\nIt was found that PHP did not properly handle file names with a NULL\ncharacter. A remote attacker could possibly use this flaw to make a PHP\nscript access unexpected files and bypass intended file system access\nrestrictions. (CVE-2006-7243)\n\nIt was found that PHP did not check for carriage returns in HTTP headers,\nallowing intended HTTP response splitting protections to be bypassed.\nDepending on the web browser the victim is using, a remote attacker could\nuse this flaw to perform HTTP response splitting attacks. (CVE-2011-1398)\n\nA flaw was found in PHP's SSL client's hostname identity check when\nhandling certificates that contain hostnames with NULL bytes. If an\nattacker was able to get a carefully crafted certificate signed by a\ntrusted Certificate Authority, the attacker could use the certificate to\nconduct man-in-the-middle attacks to spoof SSL servers. (CVE-2013-4248)\n\nAn integer signedness issue, leading to a heap-based buffer underflow, was\nfound in the PHP scandir() function. If a remote attacker could upload an\nexcessively large number of files to a directory the scandir() function\nruns on, it could cause the PHP interpreter to crash or, possibly, execute\narbitrary code. (CVE-2012-2688)\n\nIt was found that PHP did not correctly handle the magic_quotes_gpc\nconfiguration directive. This could result in magic_quotes_gpc input\nescaping not being applied in all cases, possibly making it easier for a\nremote attacker to perform SQL injection attacks. (CVE-2012-0831)\n\nIt was found that the PHP SOAP parser allowed the expansion of external XML\nentities during SOAP message parsing. A remote attacker could possibly use\nthis flaw to read arbitrary files that are accessible to a PHP application\nusing a SOAP extension. (CVE-2013-1643)\n\nThese updated php53 packages also include numerous bug fixes and\nenhancements. Space precludes documenting all of these changes in this\nadvisory. Users are directed to the Red Hat Enterprise Linux 5.10 Technical\nNotes, linked to in the References, for information on the most significant\nof these changes.\n\nAll PHP users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues and add this\nenhancement. After installing the updated packages, the httpd daemon must\nbe restarted for the update to take effect.\n", "modified": "2017-09-08T12:09:36", "published": "2013-09-30T20:52:28", "id": "RHSA-2013:1307", "href": "https://access.redhat.com/errata/RHSA-2013:1307", "type": "redhat", "title": "(RHSA-2013:1307) Moderate: php53 security, bug fix and enhancement update", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-08-13T18:44:47", "bulletinFamily": "unix", "cvelist": ["CVE-2006-7243", "CVE-2009-0689"], "description": "PHP is an HTML-embedded scripting language commonly used with the Apache\nHTTP Server.\n\nA buffer overflow flaw was found in the way PHP parsed floating point\nnumbers from their text representation. If a PHP application converted\nuntrusted input strings to numbers, an attacker able to provide such input\ncould cause the application to crash or, possibly, execute arbitrary code\nwith the privileges of the application. (CVE-2009-0689)\n\nIt was found that PHP did not properly handle file names with a NULL\ncharacter. A remote attacker could possibly use this flaw to make a PHP\nscript access unexpected files and bypass intended file system access\nrestrictions. (CVE-2006-7243)\n\nAll php users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues. After installing the\nupdated packages, the httpd daemon must be restarted for the update to\ntake effect.\n", "modified": "2017-09-08T12:07:05", "published": "2014-03-18T04:00:00", "id": "RHSA-2014:0311", "href": "https://access.redhat.com/errata/RHSA-2014:0311", "type": "redhat", "title": "(RHSA-2014:0311) Critical: php security update", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "nessus": [{"lastseen": "2021-01-17T13:13:45", "description": "Updated php packages that fix three security issues, several bugs, and\nadd one enhancement are now available for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having\nmoderate security impact. Common Vulnerability Scoring System (CVSS)\nbase scores, which give detailed severity ratings, are available for\neach vulnerability from the CVE links in the References section.\n\nPHP is an HTML-embedded scripting language commonly used with the\nApache HTTP Server.\n\nIt was found that PHP did not properly handle file names with a NULL\ncharacter. A remote attacker could possibly use this flaw to make a\nPHP script access unexpected files and bypass intended file system\naccess restrictions. (CVE-2006-7243)\n\nA flaw was found in PHP's SSL client's hostname identity check when\nhandling certificates that contain hostnames with NULL bytes. If an\nattacker was able to get a carefully crafted certificate signed by a\ntrusted Certificate Authority, the attacker could use the certificate\nto conduct man-in-the-middle attacks to spoof SSL servers.\n(CVE-2013-4248)\n\nIt was found that the PHP SOAP parser allowed the expansion of\nexternal XML entities during SOAP message parsing. A remote attacker\ncould possibly use this flaw to read arbitrary files that are\naccessible to a PHP application using a SOAP extension.\n(CVE-2013-1643)\n\nThis update fixes the following bugs :\n\n* Previously, when the allow_call_time_pass_reference setting was\ndisabled, a virtual host on the Apache server could terminate with a\nsegmentation fault when attempting to process certain PHP content.\nThis bug has been fixed and virtual hosts no longer crash when\nallow_call_time_pass_reference is off. (BZ#892158, BZ#910466)\n\n* Prior to this update, if an error occurred during the operation of\nthe fclose(), file_put_contents(), or copy() function, the function\ndid not report it. This could have led to data loss. With this update,\nthe aforementioned functions have been modified to properly report any\nerrors. (BZ#947429)\n\n* The internal buffer for the SQLSTATE error code can store maximum of\n5 characters. Previously, when certain calls exceeded this limit, a\nbuffer overflow occurred. With this update, messages longer than 5\ncharacters are automatically replaced with the default 'HY000' string,\nthus preventing the overflow. (BZ#969110)\n\nIn addition, this update adds the following enhancement :\n\n* This update adds the following rpm macros to the php package:\n%__php, %php_inidir, %php_incldir. (BZ#953814)\n\nUsers of php are advised to upgrade to these updated packages, which\nfix these bugs and add this enhancement. After installing the updated\npackages, the httpd daemon must be restarted for the update to take\neffect.", "edition": 25, "published": "2013-11-21T00:00:00", "title": "RHEL 6 : php (RHSA-2013:1615)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-4248", "CVE-2013-1643", "CVE-2006-7243"], "modified": "2013-11-21T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:php-debuginfo", "p-cpe:/a:redhat:enterprise_linux:php-devel", "p-cpe:/a:redhat:enterprise_linux:php-pgsql", "p-cpe:/a:redhat:enterprise_linux:php-xml", "p-cpe:/a:redhat:enterprise_linux:php-embedded", "p-cpe:/a:redhat:enterprise_linux:php-tidy", "p-cpe:/a:redhat:enterprise_linux:php-ldap", "p-cpe:/a:redhat:enterprise_linux:php-intl", "p-cpe:/a:redhat:enterprise_linux:php-soap", "p-cpe:/a:redhat:enterprise_linux:php-common", "p-cpe:/a:redhat:enterprise_linux:php-pspell", "p-cpe:/a:redhat:enterprise_linux:php-mbstring", "p-cpe:/a:redhat:enterprise_linux:php-odbc", "p-cpe:/a:redhat:enterprise_linux:php-imap", "p-cpe:/a:redhat:enterprise_linux:php-xmlrpc", "p-cpe:/a:redhat:enterprise_linux:php-mysql", "p-cpe:/a:redhat:enterprise_linux:php-snmp", "p-cpe:/a:redhat:enterprise_linux:php-pdo", "p-cpe:/a:redhat:enterprise_linux:php", "p-cpe:/a:redhat:enterprise_linux:php-recode", "p-cpe:/a:redhat:enterprise_linux:php-process", "p-cpe:/a:redhat:enterprise_linux:php-zts", "cpe:/o:redhat:enterprise_linux:6", "p-cpe:/a:redhat:enterprise_linux:php-fpm", "p-cpe:/a:redhat:enterprise_linux:php-cli", "p-cpe:/a:redhat:enterprise_linux:php-enchant", "p-cpe:/a:redhat:enterprise_linux:php-dba", "p-cpe:/a:redhat:enterprise_linux:php-bcmath", "p-cpe:/a:redhat:enterprise_linux:php-gd"], "id": "REDHAT-RHSA-2013-1615.NASL", "href": "https://www.tenable.com/plugins/nessus/71010", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2013:1615. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(71010);\n script_version(\"1.18\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2006-7243\", \"CVE-2013-1643\", \"CVE-2013-4248\");\n script_bugtraq_id(44951, 58224, 61776);\n script_xref(name:\"RHSA\", value:\"2013:1615\");\n\n script_name(english:\"RHEL 6 : php (RHSA-2013:1615)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated php packages that fix three security issues, several bugs, and\nadd one enhancement are now available for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having\nmoderate security impact. Common Vulnerability Scoring System (CVSS)\nbase scores, which give detailed severity ratings, are available for\neach vulnerability from the CVE links in the References section.\n\nPHP is an HTML-embedded scripting language commonly used with the\nApache HTTP Server.\n\nIt was found that PHP did not properly handle file names with a NULL\ncharacter. A remote attacker could possibly use this flaw to make a\nPHP script access unexpected files and bypass intended file system\naccess restrictions. (CVE-2006-7243)\n\nA flaw was found in PHP's SSL client's hostname identity check when\nhandling certificates that contain hostnames with NULL bytes. If an\nattacker was able to get a carefully crafted certificate signed by a\ntrusted Certificate Authority, the attacker could use the certificate\nto conduct man-in-the-middle attacks to spoof SSL servers.\n(CVE-2013-4248)\n\nIt was found that the PHP SOAP parser allowed the expansion of\nexternal XML entities during SOAP message parsing. A remote attacker\ncould possibly use this flaw to read arbitrary files that are\naccessible to a PHP application using a SOAP extension.\n(CVE-2013-1643)\n\nThis update fixes the following bugs :\n\n* Previously, when the allow_call_time_pass_reference setting was\ndisabled, a virtual host on the Apache server could terminate with a\nsegmentation fault when attempting to process certain PHP content.\nThis bug has been fixed and virtual hosts no longer crash when\nallow_call_time_pass_reference is off. (BZ#892158, BZ#910466)\n\n* Prior to this update, if an error occurred during the operation of\nthe fclose(), file_put_contents(), or copy() function, the function\ndid not report it. This could have led to data loss. With this update,\nthe aforementioned functions have been modified to properly report any\nerrors. (BZ#947429)\n\n* The internal buffer for the SQLSTATE error code can store maximum of\n5 characters. Previously, when certain calls exceeded this limit, a\nbuffer overflow occurred. With this update, messages longer than 5\ncharacters are automatically replaced with the default 'HY000' string,\nthus preventing the overflow. (BZ#969110)\n\nIn addition, this update adds the following enhancement :\n\n* This update adds the following rpm macros to the php package:\n%__php, %php_inidir, %php_incldir. (BZ#953814)\n\nUsers of php are advised to upgrade to these updated packages, which\nfix these bugs and add this enhancement. After installing the updated\npackages, the httpd daemon must be restarted for the update to take\neffect.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2013:1615\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-7243\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2013-1643\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2013-4248\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:php\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:php-bcmath\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:php-cli\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:php-common\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:php-dba\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:php-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:php-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:php-embedded\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:php-enchant\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:php-fpm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:php-gd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:php-imap\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:php-intl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:php-ldap\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:php-mbstring\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:php-mysql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:php-odbc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:php-pdo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:php-pgsql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:php-process\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:php-pspell\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:php-recode\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:php-snmp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:php-soap\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:php-tidy\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:php-xml\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:php-xmlrpc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:php-zts\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2011/01/18\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/11/21\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/11/21\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^6([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 6.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2013:1615\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"php-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"php-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"php-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"php-bcmath-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"php-bcmath-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"php-bcmath-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"php-cli-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"php-cli-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"php-cli-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"php-common-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"php-common-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"php-common-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"php-dba-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"php-dba-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"php-dba-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"php-debuginfo-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"php-debuginfo-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"php-debuginfo-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"php-devel-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"php-devel-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"php-devel-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"php-embedded-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"php-embedded-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"php-embedded-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"php-enchant-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"php-enchant-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"php-enchant-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"php-fpm-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"php-fpm-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"php-fpm-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"php-gd-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"php-gd-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"php-gd-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"php-imap-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"php-imap-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"php-imap-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"php-intl-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"php-intl-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"php-intl-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"php-ldap-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"php-ldap-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"php-ldap-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"php-mbstring-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"php-mbstring-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"php-mbstring-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"php-mysql-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"php-mysql-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"php-mysql-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"php-odbc-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"php-odbc-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"php-odbc-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"php-pdo-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"php-pdo-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"php-pdo-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"php-pgsql-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"php-pgsql-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"php-pgsql-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"php-process-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"php-process-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"php-process-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"php-pspell-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"php-pspell-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"php-pspell-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"php-recode-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"php-recode-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"php-recode-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"php-snmp-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"php-snmp-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"php-snmp-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"php-soap-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"php-soap-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"php-soap-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"php-tidy-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"php-tidy-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"php-tidy-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"php-xml-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"php-xml-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"php-xml-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"php-xmlrpc-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"php-xmlrpc-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"php-xmlrpc-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"php-zts-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"php-zts-5.3.3-26.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"php-zts-5.3.3-26.el6\")) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"php / php-bcmath / php-cli / php-common / php-dba / php-debuginfo / etc\");\n }\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2021-01-06T09:29:08", "description": "Updated php packages that fix three security issues, several bugs, and\nadd one enhancement are now available for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having\nmoderate security impact. Common Vulnerability Scoring System (CVSS)\nbase scores, which give detailed severity ratings, are available for\neach vulnerability from the CVE links in the References section.\n\nPHP is an HTML-embedded scripting language commonly used with the\nApache HTTP Server.\n\nIt was found that PHP did not properly handle file names with a NULL\ncharacter. A remote attacker could possibly use this flaw to make a\nPHP script access unexpected files and bypass intended file system\naccess restrictions. (CVE-2006-7243)\n\nA flaw was found in PHP's SSL client's hostname identity check when\nhandling certificates that contain hostnames with NULL bytes. If an\nattacker was able to get a carefully crafted certificate signed by a\ntrusted Certificate Authority, the attacker could use the certificate\nto conduct man-in-the-middle attacks to spoof SSL servers.\n(CVE-2013-4248)\n\nIt was found that the PHP SOAP parser allowed the expansion of\nexternal XML entities during SOAP message parsing. A remote attacker\ncould possibly use this flaw to read arbitrary files that are\naccessible to a PHP application using a SOAP extension.\n(CVE-2013-1643)\n\nThis update fixes the following bugs :\n\n* Previously, when the allow_call_time_pass_reference setting was\ndisabled, a virtual host on the Apache server could terminate with a\nsegmentation fault when attempting to process certain PHP content.\nThis bug has been fixed and virtual hosts no longer crash when\nallow_call_time_pass_reference is off. (BZ#892158, BZ#910466)\n\n* Prior to this update, if an error occurred during the operation of\nthe fclose(), file_put_contents(), or copy() function, the function\ndid not report it. This could have led to data loss. With this update,\nthe aforementioned functions have been modified to properly report any\nerrors. (BZ#947429)\n\n* The internal buffer for the SQLSTATE error code can store maximum of\n5 characters. Previously, when certain calls exceeded this limit, a\nbuffer overflow occurred. With this update, messages longer than 5\ncharacters are automatically replaced with the default 'HY000' string,\nthus preventing the overflow. (BZ#969110)\n\nIn addition, this update adds the following enhancement :\n\n* This update adds the following rpm macros to the php package:\n%__php, %php_inidir, %php_incldir. (BZ#953814)\n\nUsers of php are advised to upgrade to these updated packages, which\nfix these bugs and add this enhancement. After installing the updated\npackages, the httpd daemon must be restarted for the update to take\neffect.", "edition": 25, "published": "2014-11-12T00:00:00", "title": "CentOS 6 : php (CESA-2013:1615)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-4248", "CVE-2013-1643", "CVE-2006-7243"], "modified": "2014-11-12T00:00:00", "cpe": ["p-cpe:/a:centos:centos:php-fpm", "p-cpe:/a:centos:centos:php-mbstring", "p-cpe:/a:centos:centos:php-bcmath", "cpe:/o:centos:centos:6", "p-cpe:/a:centos:centos:php-pgsql", "p-cpe:/a:centos:centos:php-enchant", "p-cpe:/a:centos:centos:php-recode", "p-cpe:/a:centos:centos:php", "p-cpe:/a:centos:centos:php-intl", "p-cpe:/a:centos:centos:php-ldap", "p-cpe:/a:centos:centos:php-snmp", "p-cpe:/a:centos:centos:php-xml", "p-cpe:/a:centos:centos:php-pdo", "p-cpe:/a:centos:centos:php-zts", "p-cpe:/a:centos:centos:php-gd", "p-cpe:/a:centos:centos:php-mysql", "p-cpe:/a:centos:centos:php-cli", "p-cpe:/a:centos:centos:php-common", "p-cpe:/a:centos:centos:php-devel", "p-cpe:/a:centos:centos:php-pspell", "p-cpe:/a:centos:centos:php-tidy", "p-cpe:/a:centos:centos:php-odbc", "p-cpe:/a:centos:centos:php-imap", "p-cpe:/a:centos:centos:php-soap", "p-cpe:/a:centos:centos:php-dba", "p-cpe:/a:centos:centos:php-process", "p-cpe:/a:centos:centos:php-xmlrpc", "p-cpe:/a:centos:centos:php-embedded"], "id": "CENTOS_RHSA-2013-1615.NASL", "href": "https://www.tenable.com/plugins/nessus/79167", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2013:1615 and \n# CentOS Errata and Security Advisory 2013:1615 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(79167);\n script_version(\"1.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2006-7243\", \"CVE-2013-1643\", \"CVE-2013-4248\");\n script_bugtraq_id(44951, 58224, 61776);\n script_xref(name:\"RHSA\", value:\"2013:1615\");\n\n script_name(english:\"CentOS 6 : php (CESA-2013:1615)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote CentOS host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated php packages that fix three security issues, several bugs, and\nadd one enhancement are now available for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having\nmoderate security impact. Common Vulnerability Scoring System (CVSS)\nbase scores, which give detailed severity ratings, are available for\neach vulnerability from the CVE links in the References section.\n\nPHP is an HTML-embedded scripting language commonly used with the\nApache HTTP Server.\n\nIt was found that PHP did not properly handle file names with a NULL\ncharacter. A remote attacker could possibly use this flaw to make a\nPHP script access unexpected files and bypass intended file system\naccess restrictions. (CVE-2006-7243)\n\nA flaw was found in PHP's SSL client's hostname identity check when\nhandling certificates that contain hostnames with NULL bytes. If an\nattacker was able to get a carefully crafted certificate signed by a\ntrusted Certificate Authority, the attacker could use the certificate\nto conduct man-in-the-middle attacks to spoof SSL servers.\n(CVE-2013-4248)\n\nIt was found that the PHP SOAP parser allowed the expansion of\nexternal XML entities during SOAP message parsing. A remote attacker\ncould possibly use this flaw to read arbitrary files that are\naccessible to a PHP application using a SOAP extension.\n(CVE-2013-1643)\n\nThis update fixes the following bugs :\n\n* Previously, when the allow_call_time_pass_reference setting was\ndisabled, a virtual host on the Apache server could terminate with a\nsegmentation fault when attempting to process certain PHP content.\nThis bug has been fixed and virtual hosts no longer crash when\nallow_call_time_pass_reference is off. (BZ#892158, BZ#910466)\n\n* Prior to this update, if an error occurred during the operation of\nthe fclose(), file_put_contents(), or copy() function, the function\ndid not report it. This could have led to data loss. With this update,\nthe aforementioned functions have been modified to properly report any\nerrors. (BZ#947429)\n\n* The internal buffer for the SQLSTATE error code can store maximum of\n5 characters. Previously, when certain calls exceeded this limit, a\nbuffer overflow occurred. With this update, messages longer than 5\ncharacters are automatically replaced with the default 'HY000' string,\nthus preventing the overflow. (BZ#969110)\n\nIn addition, this update adds the following enhancement :\n\n* This update adds the following rpm macros to the php package:\n%__php, %php_inidir, %php_incldir. (BZ#953814)\n\nUsers of php are advised to upgrade to these updated packages, which\nfix these bugs and add this enhancement. After installing the updated\npackages, the httpd daemon must be restarted for the update to take\neffect.\"\n );\n # https://lists.centos.org/pipermail/centos-cr-announce/2013-November/001046.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?284ca09a\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected php packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2006-7243\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:php\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:php-bcmath\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:php-cli\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:php-common\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:php-dba\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:php-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:php-embedded\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:php-enchant\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:php-fpm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:php-gd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:php-imap\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:php-intl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:php-ldap\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:php-mbstring\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:php-mysql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:php-odbc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:php-pdo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:php-pgsql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:php-process\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:php-pspell\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:php-recode\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:php-snmp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:php-soap\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:php-tidy\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:php-xml\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:php-xmlrpc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:php-zts\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:6\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2011/01/18\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/11/26\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/11/12\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"CentOS Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/CentOS/release\");\nif (isnull(release) || \"CentOS\" >!< release) audit(AUDIT_OS_NOT, \"CentOS\");\nos_ver = pregmatch(pattern: \"CentOS(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"CentOS\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^6([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"CentOS 6.x\", \"CentOS \" + os_ver);\n\nif (!get_kb_item(\"Host/CentOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"CentOS\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"CentOS-6\", reference:\"php-5.3.3-26.el6\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"php-bcmath-5.3.3-26.el6\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"php-cli-5.3.3-26.el6\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"php-common-5.3.3-26.el6\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"php-dba-5.3.3-26.el6\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"php-devel-5.3.3-26.el6\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"php-embedded-5.3.3-26.el6\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"php-enchant-5.3.3-26.el6\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"php-fpm-5.3.3-26.el6\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"php-gd-5.3.3-26.el6\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"php-imap-5.3.3-26.el6\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"php-intl-5.3.3-26.el6\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"php-ldap-5.3.3-26.el6\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"php-mbstring-5.3.3-26.el6\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"php-mysql-5.3.3-26.el6\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"php-odbc-5.3.3-26.el6\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"php-pdo-5.3.3-26.el6\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"php-pgsql-5.3.3-26.el6\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"php-process-5.3.3-26.el6\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"php-pspell-5.3.3-26.el6\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"php-recode-5.3.3-26.el6\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"php-snmp-5.3.3-26.el6\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"php-soap-5.3.3-26.el6\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"php-tidy-5.3.3-26.el6\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"php-xml-5.3.3-26.el6\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"php-xmlrpc-5.3.3-26.el6\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"php-zts-5.3.3-26.el6\")) flag++;\n\n\nif (flag)\n{\n cr_plugin_caveat = '\\n' +\n 'NOTE: The security advisory associated with this vulnerability has a\\n' +\n 'fixed package version that may only be available in the continuous\\n' +\n 'release (CR) repository for CentOS, until it is present in the next\\n' +\n 'point release of CentOS.\\n\\n' +\n\n 'If an equal or higher package level does not exist in the baseline\\n' +\n 'repository for your major version of CentOS, then updates from the CR\\n' +\n 'repository will need to be applied in order to address the\\n' +\n 'vulnerability.\\n';\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get() + cr_plugin_caveat\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"php / php-bcmath / php-cli / php-common / php-dba / php-devel / etc\");\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2021-01-17T12:48:21", "description": "From Red Hat Security Advisory 2013:1615 :\n\nUpdated php packages that fix three security issues, several bugs, and\nadd one enhancement are now available for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having\nmoderate security impact. Common Vulnerability Scoring System (CVSS)\nbase scores, which give detailed severity ratings, are available for\neach vulnerability from the CVE links in the References section.\n\nPHP is an HTML-embedded scripting language commonly used with the\nApache HTTP Server.\n\nIt was found that PHP did not properly handle file names with a NULL\ncharacter. A remote attacker could possibly use this flaw to make a\nPHP script access unexpected files and bypass intended file system\naccess restrictions. (CVE-2006-7243)\n\nA flaw was found in PHP's SSL client's hostname identity check when\nhandling certificates that contain hostnames with NULL bytes. If an\nattacker was able to get a carefully crafted certificate signed by a\ntrusted Certificate Authority, the attacker could use the certificate\nto conduct man-in-the-middle attacks to spoof SSL servers.\n(CVE-2013-4248)\n\nIt was found that the PHP SOAP parser allowed the expansion of\nexternal XML entities during SOAP message parsing. A remote attacker\ncould possibly use this flaw to read arbitrary files that are\naccessible to a PHP application using a SOAP extension.\n(CVE-2013-1643)\n\nThis update fixes the following bugs :\n\n* Previously, when the allow_call_time_pass_reference setting was\ndisabled, a virtual host on the Apache server could terminate with a\nsegmentation fault when attempting to process certain PHP content.\nThis bug has been fixed and virtual hosts no longer crash when\nallow_call_time_pass_reference is off. (BZ#892158, BZ#910466)\n\n* Prior to this update, if an error occurred during the operation of\nthe fclose(), file_put_contents(), or copy() function, the function\ndid not report it. This could have led to data loss. With this update,\nthe aforementioned functions have been modified to properly report any\nerrors. (BZ#947429)\n\n* The internal buffer for the SQLSTATE error code can store maximum of\n5 characters. Previously, when certain calls exceeded this limit, a\nbuffer overflow occurred. With this update, messages longer than 5\ncharacters are automatically replaced with the default 'HY000' string,\nthus preventing the overflow. (BZ#969110)\n\nIn addition, this update adds the following enhancement :\n\n* This update adds the following rpm macros to the php package:\n%__php, %php_inidir, %php_incldir. (BZ#953814)\n\nUsers of php are advised to upgrade to these updated packages, which\nfix these bugs and add this enhancement. After installing the updated\npackages, the httpd daemon must be restarted for the update to take\neffect.", "edition": 22, "published": "2013-11-27T00:00:00", "title": "Oracle Linux 6 : php (ELSA-2013-1615)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-4248", "CVE-2013-1643", "CVE-2006-7243"], "modified": "2013-11-27T00:00:00", "cpe": ["cpe:/o:oracle:linux:6", "p-cpe:/a:oracle:linux:php-ldap", "p-cpe:/a:oracle:linux:php-recode", "p-cpe:/a:oracle:linux:php-tidy", "p-cpe:/a:oracle:linux:php-devel", "p-cpe:/a:oracle:linux:php-common", "p-cpe:/a:oracle:linux:php-imap", "p-cpe:/a:oracle:linux:php-embedded", "p-cpe:/a:oracle:linux:php-mbstring", "p-cpe:/a:oracle:linux:php-zts", "p-cpe:/a:oracle:linux:php-soap", "p-cpe:/a:oracle:linux:php-fpm", "p-cpe:/a:oracle:linux:php-snmp", "p-cpe:/a:oracle:linux:php", "p-cpe:/a:oracle:linux:php-gd", "p-cpe:/a:oracle:linux:php-mysql", "p-cpe:/a:oracle:linux:php-pdo", "p-cpe:/a:oracle:linux:php-xmlrpc", "p-cpe:/a:oracle:linux:php-bcmath", "p-cpe:/a:oracle:linux:php-dba", "p-cpe:/a:oracle:linux:php-odbc", "p-cpe:/a:oracle:linux:php-process", "p-cpe:/a:oracle:linux:php-cli", "p-cpe:/a:oracle:linux:php-pgsql", "p-cpe:/a:oracle:linux:php-intl", "p-cpe:/a:oracle:linux:php-enchant", "p-cpe:/a:oracle:linux:php-xml", "p-cpe:/a:oracle:linux:php-pspell"], "id": "ORACLELINUX_ELSA-2013-1615.NASL", "href": "https://www.tenable.com/plugins/nessus/71107", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2013:1615 and \n# Oracle Linux Security Advisory ELSA-2013-1615 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(71107);\n script_version(\"1.11\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2006-7243\", \"CVE-2013-1643\", \"CVE-2013-4248\");\n script_bugtraq_id(44718, 44951, 58224, 58766, 61776);\n script_xref(name:\"RHSA\", value:\"2013:1615\");\n\n script_name(english:\"Oracle Linux 6 : php (ELSA-2013-1615)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Oracle Linux host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"From Red Hat Security Advisory 2013:1615 :\n\nUpdated php packages that fix three security issues, several bugs, and\nadd one enhancement are now available for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having\nmoderate security impact. Common Vulnerability Scoring System (CVSS)\nbase scores, which give detailed severity ratings, are available for\neach vulnerability from the CVE links in the References section.\n\nPHP is an HTML-embedded scripting language commonly used with the\nApache HTTP Server.\n\nIt was found that PHP did not properly handle file names with a NULL\ncharacter. A remote attacker could possibly use this flaw to make a\nPHP script access unexpected files and bypass intended file system\naccess restrictions. (CVE-2006-7243)\n\nA flaw was found in PHP's SSL client's hostname identity check when\nhandling certificates that contain hostnames with NULL bytes. If an\nattacker was able to get a carefully crafted certificate signed by a\ntrusted Certificate Authority, the attacker could use the certificate\nto conduct man-in-the-middle attacks to spoof SSL servers.\n(CVE-2013-4248)\n\nIt was found that the PHP SOAP parser allowed the expansion of\nexternal XML entities during SOAP message parsing. A remote attacker\ncould possibly use this flaw to read arbitrary files that are\naccessible to a PHP application using a SOAP extension.\n(CVE-2013-1643)\n\nThis update fixes the following bugs :\n\n* Previously, when the allow_call_time_pass_reference setting was\ndisabled, a virtual host on the Apache server could terminate with a\nsegmentation fault when attempting to process certain PHP content.\nThis bug has been fixed and virtual hosts no longer crash when\nallow_call_time_pass_reference is off. (BZ#892158, BZ#910466)\n\n* Prior to this update, if an error occurred during the operation of\nthe fclose(), file_put_contents(), or copy() function, the function\ndid not report it. This could have led to data loss. With this update,\nthe aforementioned functions have been modified to properly report any\nerrors. (BZ#947429)\n\n* The internal buffer for the SQLSTATE error code can store maximum of\n5 characters. Previously, when certain calls exceeded this limit, a\nbuffer overflow occurred. With this update, messages longer than 5\ncharacters are automatically replaced with the default 'HY000' string,\nthus preventing the overflow. (BZ#969110)\n\nIn addition, this update adds the following enhancement :\n\n* This update adds the following rpm macros to the php package:\n%__php, %php_inidir, %php_incldir. (BZ#953814)\n\nUsers of php are advised to upgrade to these updated packages, which\nfix these bugs and add this enhancement. After installing the updated\npackages, the httpd daemon must be restarted for the update to take\neffect.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2013-November/003807.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected php packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:php\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:php-bcmath\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:php-cli\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:php-common\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:php-dba\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:php-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:php-embedded\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:php-enchant\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:php-fpm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:php-gd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:php-imap\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:php-intl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:php-ldap\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:php-mbstring\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:php-mysql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:php-odbc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:php-pdo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:php-pgsql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:php-process\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:php-pspell\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:php-recode\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:php-snmp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:php-soap\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:php-tidy\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:php-xml\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:php-xmlrpc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:php-zts\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:6\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2011/01/18\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/11/26\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/11/27\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/OracleLinux\")) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nos_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Oracle Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^6([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Oracle Linux 6\", \"Oracle Linux \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Oracle Linux\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"EL6\", reference:\"php-5.3.3-26.el6\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"php-bcmath-5.3.3-26.el6\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"php-cli-5.3.3-26.el6\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"php-common-5.3.3-26.el6\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"php-dba-5.3.3-26.el6\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"php-devel-5.3.3-26.el6\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"php-embedded-5.3.3-26.el6\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"php-enchant-5.3.3-26.el6\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"php-fpm-5.3.3-26.el6\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"php-gd-5.3.3-26.el6\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"php-imap-5.3.3-26.el6\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"php-intl-5.3.3-26.el6\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"php-ldap-5.3.3-26.el6\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"php-mbstring-5.3.3-26.el6\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"php-mysql-5.3.3-26.el6\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"php-odbc-5.3.3-26.el6\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"php-pdo-5.3.3-26.el6\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"php-pgsql-5.3.3-26.el6\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"php-process-5.3.3-26.el6\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"php-pspell-5.3.3-26.el6\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"php-recode-5.3.3-26.el6\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"php-snmp-5.3.3-26.el6\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"php-soap-5.3.3-26.el6\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"php-tidy-5.3.3-26.el6\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"php-xml-5.3.3-26.el6\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"php-xmlrpc-5.3.3-26.el6\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"php-zts-5.3.3-26.el6\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"php / php-bcmath / php-cli / php-common / php-dba / php-devel / etc\");\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2021-01-17T13:47:59", "description": "It was found that PHP did not properly handle file names with a NULL\ncharacter. A remote attacker could possibly use this flaw to make a\nPHP script access unexpected files and bypass intended file system\naccess restrictions. (CVE-2006-7243)\n\nA flaw was found in PHP's SSL client's hostname identity check when\nhandling certificates that contain hostnames with NULL bytes. If an\nattacker was able to get a carefully crafted certificate signed by a\ntrusted Certificate Authority, the attacker could use the certificate\nto conduct man-in-the-middle attacks to spoof SSL servers.\n(CVE-2013-4248)\n\nIt was found that the PHP SOAP parser allowed the expansion of\nexternal XML entities during SOAP message parsing. A remote attacker\ncould possibly use this flaw to read arbitrary files that are\naccessible to a PHP application using a SOAP extension.\n(CVE-2013-1643)\n\nThis update fixes the following bugs :\n\n - Previously, when the allow_call_time_pass_reference\n setting was disabled, a virtual host on the Apache\n server could terminate with a segmentation fault when\n attempting to process certain PHP content. This bug has\n been fixed and virtual hosts no longer crash when\n allow_call_time_pass_reference is off.\n\n - Prior to this update, if an error occurred during the\n operation of the fclose(), file_put_contents(), or\n copy() function, the function did not report it. This\n could have led to data loss. With this update, the\n aforementioned functions have been modified to properly\n report any errors.\n\n - The internal buffer for the SQLSTATE error code can\n store maximum of 5 characters. Previously, when certain\n calls exceeded this limit, a buffer overflow occurred.\n With this update, messages longer than 5 characters are\n automatically replaced with the default 'HY000' string,\n thus preventing the overflow.\n\nIn addition, this update adds the following enhancement :\n\n - This update adds the following rpm macros to the php\n package: %__php, %php_inidir, %php_incldir.\n\nAfter installing the updated packages, the httpd daemon must be\nrestarted for the update to take effect.", "edition": 16, "published": "2013-12-04T00:00:00", "title": "Scientific Linux Security Update : php on SL6.x i386/x86_64 (20131121)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-4248", "CVE-2013-1643", "CVE-2006-7243"], "modified": "2013-12-04T00:00:00", "cpe": ["p-cpe:/a:fermilab:scientific_linux:php-embedded", "p-cpe:/a:fermilab:scientific_linux:php-enchant", "p-cpe:/a:fermilab:scientific_linux:php-pgsql", "p-cpe:/a:fermilab:scientific_linux:php-pspell", "p-cpe:/a:fermilab:scientific_linux:php-xmlrpc", "p-cpe:/a:fermilab:scientific_linux:php-mbstring", "p-cpe:/a:fermilab:scientific_linux:php", "p-cpe:/a:fermilab:scientific_linux:php-cli", "p-cpe:/a:fermilab:scientific_linux:php-common", "p-cpe:/a:fermilab:scientific_linux:php-dba", "p-cpe:/a:fermilab:scientific_linux:php-debuginfo", "p-cpe:/a:fermilab:scientific_linux:php-soap", "p-cpe:/a:fermilab:scientific_linux:php-pdo", "p-cpe:/a:fermilab:scientific_linux:php-fpm", "p-cpe:/a:fermilab:scientific_linux:php-recode", "p-cpe:/a:fermilab:scientific_linux:php-snmp", "p-cpe:/a:fermilab:scientific_linux:php-odbc", "p-cpe:/a:fermilab:scientific_linux:php-imap", "p-cpe:/a:fermilab:scientific_linux:php-tidy", "p-cpe:/a:fermilab:scientific_linux:php-ldap", "p-cpe:/a:fermilab:scientific_linux:php-xml", "p-cpe:/a:fermilab:scientific_linux:php-process", "p-cpe:/a:fermilab:scientific_linux:php-bcmath", "x-cpe:/o:fermilab:scientific_linux", "p-cpe:/a:fermilab:scientific_linux:php-gd", "p-cpe:/a:fermilab:scientific_linux:php-mysql", "p-cpe:/a:fermilab:scientific_linux:php-zts", "p-cpe:/a:fermilab:scientific_linux:php-intl", "p-cpe:/a:fermilab:scientific_linux:php-devel"], "id": "SL_20131121_PHP_ON_SL6_X.NASL", "href": "https://www.tenable.com/plugins/nessus/71198", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text is (C) Scientific Linux.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(71198);\n script_version(\"1.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2006-7243\", \"CVE-2013-1643\", \"CVE-2013-4248\");\n\n script_name(english:\"Scientific Linux Security Update : php on SL6.x i386/x86_64 (20131121)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Scientific Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"It was found that PHP did not properly handle file names with a NULL\ncharacter. A remote attacker could possibly use this flaw to make a\nPHP script access unexpected files and bypass intended file system\naccess restrictions. (CVE-2006-7243)\n\nA flaw was found in PHP's SSL client's hostname identity check when\nhandling certificates that contain hostnames with NULL bytes. If an\nattacker was able to get a carefully crafted certificate signed by a\ntrusted Certificate Authority, the attacker could use the certificate\nto conduct man-in-the-middle attacks to spoof SSL servers.\n(CVE-2013-4248)\n\nIt was found that the PHP SOAP parser allowed the expansion of\nexternal XML entities during SOAP message parsing. A remote attacker\ncould possibly use this flaw to read arbitrary files that are\naccessible to a PHP application using a SOAP extension.\n(CVE-2013-1643)\n\nThis update fixes the following bugs :\n\n - Previously, when the allow_call_time_pass_reference\n setting was disabled, a virtual host on the Apache\n server could terminate with a segmentation fault when\n attempting to process certain PHP content. This bug has\n been fixed and virtual hosts no longer crash when\n allow_call_time_pass_reference is off.\n\n - Prior to this update, if an error occurred during the\n operation of the fclose(), file_put_contents(), or\n copy() function, the function did not report it. This\n could have led to data loss. With this update, the\n aforementioned functions have been modified to properly\n report any errors.\n\n - The internal buffer for the SQLSTATE error code can\n store maximum of 5 characters. Previously, when certain\n calls exceeded this limit, a buffer overflow occurred.\n With this update, messages longer than 5 characters are\n automatically replaced with the default 'HY000' string,\n thus preventing the overflow.\n\nIn addition, this update adds the following enhancement :\n\n - This update adds the following rpm macros to the php\n package: %__php, %php_inidir, %php_incldir.\n\nAfter installing the updated packages, the httpd daemon must be\nrestarted for the update to take effect.\"\n );\n # https://listserv.fnal.gov/scripts/wa.exe?A2=ind1312&L=scientific-linux-errata&T=0&P=814\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?a51e1a0d\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:php\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:php-bcmath\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:php-cli\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:php-common\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:php-dba\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:php-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:php-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:php-embedded\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:php-enchant\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:php-fpm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:php-gd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:php-imap\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:php-intl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:php-ldap\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:php-mbstring\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:php-mysql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:php-odbc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:php-pdo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:php-pgsql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:php-process\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:php-pspell\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:php-recode\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:php-snmp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:php-soap\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:php-tidy\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:php-xml\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:php-xmlrpc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:php-zts\");\n script_set_attribute(attribute:\"cpe\", value:\"x-cpe:/o:fermilab:scientific_linux\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2011/01/18\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/11/21\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/12/04\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Scientific Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Scientific Linux \" >!< release) audit(AUDIT_HOST_NOT, \"running Scientific Linux\");\nos_ver = pregmatch(pattern: \"Scientific Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Scientific Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^6([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Scientific Linux 6.x\", \"Scientific Linux \" + os_ver);\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Scientific Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"SL6\", reference:\"php-5.3.3-26.el6\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"php-bcmath-5.3.3-26.el6\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"php-cli-5.3.3-26.el6\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"php-common-5.3.3-26.el6\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"php-dba-5.3.3-26.el6\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"php-debuginfo-5.3.3-26.el6\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"php-devel-5.3.3-26.el6\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"php-embedded-5.3.3-26.el6\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"php-enchant-5.3.3-26.el6\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"php-fpm-5.3.3-26.el6\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"php-gd-5.3.3-26.el6\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"php-imap-5.3.3-26.el6\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"php-intl-5.3.3-26.el6\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"php-ldap-5.3.3-26.el6\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"php-mbstring-5.3.3-26.el6\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"php-mysql-5.3.3-26.el6\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"php-odbc-5.3.3-26.el6\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"php-pdo-5.3.3-26.el6\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"php-pgsql-5.3.3-26.el6\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"php-process-5.3.3-26.el6\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"php-pspell-5.3.3-26.el6\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"php-recode-5.3.3-26.el6\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"php-snmp-5.3.3-26.el6\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"php-soap-5.3.3-26.el6\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"php-tidy-5.3.3-26.el6\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"php-xml-5.3.3-26.el6\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"php-xmlrpc-5.3.3-26.el6\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"php-zts-5.3.3-26.el6\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"php / php-bcmath / php-cli / php-common / php-dba / php-debuginfo / etc\");\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2021-01-17T13:47:49", "description": "It was found that PHP did not properly handle file names with a NULL\ncharacter. A remote attacker could possibly use this flaw to make a\nPHP script access unexpected files and bypass intended file system\naccess restrictions. (CVE-2006-7243)\n\nIt was found that PHP did not check for carriage returns in HTTP\nheaders, allowing intended HTTP response splitting protections to be\nbypassed. Depending on the web browser the victim is using, a remote\nattacker could use this flaw to perform HTTP response splitting\nattacks. (CVE-2011-1398)\n\nA flaw was found in PHP's SSL client's hostname identity check when\nhandling certificates that contain hostnames with NULL bytes. If an\nattacker was able to get a carefully crafted certificate signed by a\ntrusted Certificate Authority, the attacker could use the certificate\nto conduct man-in-the-middle attacks to spoof SSL servers.\n(CVE-2013-4248)\n\nAn integer signedness issue, leading to a heap-based buffer underflow,\nwas found in the PHP scandir() function. If a remote attacker could\nupload an excessively large number of files to a directory the\nscandir() function runs on, it could cause the PHP interpreter to\ncrash or, possibly, execute arbitrary code. (CVE-2012-2688)\n\nIt was found that PHP did not correctly handle the magic_quotes_gpc\nconfiguration directive. This could result in magic_quotes_gpc input\nescaping not being applied in all cases, possibly making it easier for\na remote attacker to perform SQL injection attacks. (CVE-2012-0831)\n\nIt was found that the PHP SOAP parser allowed the expansion of\nexternal XML entities during SOAP message parsing. A remote attacker\ncould possibly use this flaw to read arbitrary files that are\naccessible to a PHP application using a SOAP extension.\n(CVE-2013-1643)\n\nAfter installing the updated packages, the httpd daemon must be\nrestarted for the update to take effect.", "edition": 15, "published": "2013-10-11T00:00:00", "title": "Scientific Linux Security Update : php53 on SL5.x i386/x86_64 (20130930)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-4248", "CVE-2013-1643", "CVE-2012-2688", "CVE-2011-1398", "CVE-2006-7243", "CVE-2012-0831"], "modified": "2013-10-11T00:00:00", "cpe": ["p-cpe:/a:fermilab:scientific_linux:php53-bcmath", "p-cpe:/a:fermilab:scientific_linux:php53-gd", "p-cpe:/a:fermilab:scientific_linux:php53-cli", "p-cpe:/a:fermilab:scientific_linux:php53-process", "p-cpe:/a:fermilab:scientific_linux:unixODBC-devel", "p-cpe:/a:fermilab:scientific_linux:php53-pgsql", "p-cpe:/a:fermilab:scientific_linux:unixODBC-libs", "p-cpe:/a:fermilab:scientific_linux:php53-debuginfo", "p-cpe:/a:fermilab:scientific_linux:php53-xmlrpc", "p-cpe:/a:fermilab:scientific_linux:php53-xml", "p-cpe:/a:fermilab:scientific_linux:php53-intl", "p-cpe:/a:fermilab:scientific_linux:unixODBC64", "p-cpe:/a:fermilab:scientific_linux:php53-pspell", "p-cpe:/a:fermilab:scientific_linux:unixODBC", "p-cpe:/a:fermilab:scientific_linux:php53-imap", "p-cpe:/a:fermilab:scientific_linux:php53-soap", "p-cpe:/a:fermilab:scientific_linux:unixODBC64-libs", "p-cpe:/a:fermilab:scientific_linux:php53-mysql", "p-cpe:/a:fermilab:scientific_linux:unixODBC64-devel", "p-cpe:/a:fermilab:scientific_linux:php53-devel", "p-cpe:/a:fermilab:scientific_linux:php53-mbstring", "p-cpe:/a:fermilab:scientific_linux:php53-ldap", "x-cpe:/o:fermilab:scientific_linux", "p-cpe:/a:fermilab:scientific_linux:php53-common", "p-cpe:/a:fermilab:scientific_linux:php53-dba", "p-cpe:/a:fermilab:scientific_linux:php53", "p-cpe:/a:fermilab:scientific_linux:php53-snmp", "p-cpe:/a:fermilab:scientific_linux:php53-odbc", "p-cpe:/a:fermilab:scientific_linux:unixODBC-kde", "p-cpe:/a:fermilab:scientific_linux:php53-pdo"], "id": "SL_20130930_PHP53_ON_SL5_X.NASL", "href": "https://www.tenable.com/plugins/nessus/70389", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text is (C) Scientific Linux.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(70389);\n script_version(\"1.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2006-7243\", \"CVE-2011-1398\", \"CVE-2012-0831\", \"CVE-2012-2688\", \"CVE-2013-1643\", \"CVE-2013-4248\");\n\n script_name(english:\"Scientific Linux Security Update : php53 on SL5.x i386/x86_64 (20130930)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Scientific Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"It was found that PHP did not properly handle file names with a NULL\ncharacter. A remote attacker could possibly use this flaw to make a\nPHP script access unexpected files and bypass intended file system\naccess restrictions. (CVE-2006-7243)\n\nIt was found that PHP did not check for carriage returns in HTTP\nheaders, allowing intended HTTP response splitting protections to be\nbypassed. Depending on the web browser the victim is using, a remote\nattacker could use this flaw to perform HTTP response splitting\nattacks. (CVE-2011-1398)\n\nA flaw was found in PHP's SSL client's hostname identity check when\nhandling certificates that contain hostnames with NULL bytes. If an\nattacker was able to get a carefully crafted certificate signed by a\ntrusted Certificate Authority, the attacker could use the certificate\nto conduct man-in-the-middle attacks to spoof SSL servers.\n(CVE-2013-4248)\n\nAn integer signedness issue, leading to a heap-based buffer underflow,\nwas found in the PHP scandir() function. If a remote attacker could\nupload an excessively large number of files to a directory the\nscandir() function runs on, it could cause the PHP interpreter to\ncrash or, possibly, execute arbitrary code. (CVE-2012-2688)\n\nIt was found that PHP did not correctly handle the magic_quotes_gpc\nconfiguration directive. This could result in magic_quotes_gpc input\nescaping not being applied in all cases, possibly making it easier for\na remote attacker to perform SQL injection attacks. (CVE-2012-0831)\n\nIt was found that the PHP SOAP parser allowed the expansion of\nexternal XML entities during SOAP message parsing. A remote attacker\ncould possibly use this flaw to read arbitrary files that are\naccessible to a PHP application using a SOAP extension.\n(CVE-2013-1643)\n\nAfter installing the updated packages, the httpd daemon must be\nrestarted for the update to take effect.\"\n );\n # https://listserv.fnal.gov/scripts/wa.exe?A2=ind1310&L=scientific-linux-errata&T=0&P=809\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?98848f7c\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:php53\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:php53-bcmath\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:php53-cli\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:php53-common\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:php53-dba\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:php53-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:php53-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:php53-gd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:php53-imap\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:php53-intl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:php53-ldap\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:php53-mbstring\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:php53-mysql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:php53-odbc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:php53-pdo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:php53-pgsql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:php53-process\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:php53-pspell\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:php53-snmp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:php53-soap\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:php53-xml\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:php53-xmlrpc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:unixODBC\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:unixODBC-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:unixODBC-kde\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:unixODBC-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:unixODBC64\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:unixODBC64-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:unixODBC64-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"x-cpe:/o:fermilab:scientific_linux\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2011/01/18\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/09/30\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/10/11\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Scientific Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Scientific Linux \" >!< release) audit(AUDIT_HOST_NOT, \"running Scientific Linux\");\nos_ver = pregmatch(pattern: \"Scientific Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Scientific Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^5([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Scientific Linux 5.x\", \"Scientific Linux \" + os_ver);\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Scientific Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"SL5\", reference:\"php53-5.3.3-21.el5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"php53-bcmath-5.3.3-21.el5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"php53-cli-5.3.3-21.el5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"php53-common-5.3.3-21.el5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"php53-dba-5.3.3-21.el5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"php53-debuginfo-5.3.3-21.el5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"php53-devel-5.3.3-21.el5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"php53-gd-5.3.3-21.el5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"php53-imap-5.3.3-21.el5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"php53-intl-5.3.3-21.el5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"php53-ldap-5.3.3-21.el5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"php53-mbstring-5.3.3-21.el5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"php53-mysql-5.3.3-21.el5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"php53-odbc-5.3.3-21.el5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"php53-pdo-5.3.3-21.el5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"php53-pgsql-5.3.3-21.el5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"php53-process-5.3.3-21.el5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"php53-pspell-5.3.3-21.el5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"php53-snmp-5.3.3-21.el5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"php53-soap-5.3.3-21.el5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"php53-xml-5.3.3-21.el5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"php53-xmlrpc-5.3.3-21.el5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"unixODBC-2.2.11-10.el5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"unixODBC-devel-2.2.11-10.el5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"unixODBC-kde-2.2.11-10.el5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"unixODBC-libs-2.2.11-10.el5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"unixODBC64-2.2.14-3.el5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"unixODBC64-devel-2.2.14-3.el5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"unixODBC64-libs-2.2.14-3.el5\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"php53 / php53-bcmath / php53-cli / php53-common / php53-dba / etc\");\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-17T13:13:04", "description": "Updated php53 packages that fix multiple security issues, several\nbugs, and add one enhancement are now available for Red Hat Enterprise\nLinux 5.\n\nThe Red Hat Security Response Team has rated this update as having\nmoderate security impact. Common Vulnerability Scoring System (CVSS)\nbase scores, which give detailed severity ratings, are available for\neach vulnerability from the CVE links in the References section.\n\nPHP is an HTML-embedded scripting language commonly used with the\nApache HTTP Server.\n\nIt was found that PHP did not properly handle file names with a NULL\ncharacter. A remote attacker could possibly use this flaw to make a\nPHP script access unexpected files and bypass intended file system\naccess restrictions. (CVE-2006-7243)\n\nIt was found that PHP did not check for carriage returns in HTTP\nheaders, allowing intended HTTP response splitting protections to be\nbypassed. Depending on the web browser the victim is using, a remote\nattacker could use this flaw to perform HTTP response splitting\nattacks. (CVE-2011-1398)\n\nA flaw was found in PHP's SSL client's hostname identity check when\nhandling certificates that contain hostnames with NULL bytes. If an\nattacker was able to get a carefully crafted certificate signed by a\ntrusted Certificate Authority, the attacker could use the certificate\nto conduct man-in-the-middle attacks to spoof SSL servers.\n(CVE-2013-4248)\n\nAn integer signedness issue, leading to a heap-based buffer underflow,\nwas found in the PHP scandir() function. If a remote attacker could\nupload an excessively large number of files to a directory the\nscandir() function runs on, it could cause the PHP interpreter to\ncrash or, possibly, execute arbitrary code. (CVE-2012-2688)\n\nIt was found that PHP did not correctly handle the magic_quotes_gpc\nconfiguration directive. This could result in magic_quotes_gpc input\nescaping not being applied in all cases, possibly making it easier for\na remote attacker to perform SQL injection attacks. (CVE-2012-0831)\n\nIt was found that the PHP SOAP parser allowed the expansion of\nexternal XML entities during SOAP message parsing. A remote attacker\ncould possibly use this flaw to read arbitrary files that are\naccessible to a PHP application using a SOAP extension.\n(CVE-2013-1643)\n\nThese updated php53 packages also include numerous bug fixes and\nenhancements. Space precludes documenting all of these changes in this\nadvisory. Users are directed to the Red Hat Enterprise Linux 5.10\nTechnical Notes, linked to in the References, for information on the\nmost significant of these changes.\n\nAll PHP users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues and add this\nenhancement. After installing the updated packages, the httpd daemon\nmust be restarted for the update to take effect.", "edition": 25, "published": "2013-10-01T00:00:00", "title": "RHEL 5 : php53 (RHSA-2013:1307)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-4248", "CVE-2013-1643", "CVE-2012-2688", "CVE-2011-1398", "CVE-2006-7243", "CVE-2012-0831"], "modified": "2013-10-01T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:php53-imap", "p-cpe:/a:redhat:enterprise_linux:php53-odbc", "p-cpe:/a:redhat:enterprise_linux:php53-gd", "cpe:/o:redhat:enterprise_linux:5", "p-cpe:/a:redhat:enterprise_linux:php53-dba", "p-cpe:/a:redhat:enterprise_linux:php53-intl", "p-cpe:/a:redhat:enterprise_linux:php53-mysql", "p-cpe:/a:redhat:enterprise_linux:php53-cli", "p-cpe:/a:redhat:enterprise_linux:php53", "p-cpe:/a:redhat:enterprise_linux:php53-debuginfo", "p-cpe:/a:redhat:enterprise_linux:php53-devel", "p-cpe:/a:redhat:enterprise_linux:php53-soap", "p-cpe:/a:redhat:enterprise_linux:php53-mbstring", "p-cpe:/a:redhat:enterprise_linux:php53-xml", "p-cpe:/a:redhat:enterprise_linux:php53-pdo", "p-cpe:/a:redhat:enterprise_linux:php53-pgsql", "p-cpe:/a:redhat:enterprise_linux:php53-xmlrpc", "p-cpe:/a:redhat:enterprise_linux:php53-snmp", "p-cpe:/a:redhat:enterprise_linux:php53-common", "p-cpe:/a:redhat:enterprise_linux:php53-ldap", "p-cpe:/a:redhat:enterprise_linux:php53-bcmath", "p-cpe:/a:redhat:enterprise_linux:php53-process", "p-cpe:/a:redhat:enterprise_linux:php53-pspell"], "id": "REDHAT-RHSA-2013-1307.NASL", "href": "https://www.tenable.com/plugins/nessus/70244", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2013:1307. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(70244);\n script_version(\"1.18\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2006-7243\", \"CVE-2011-1398\", \"CVE-2012-0831\", \"CVE-2012-2688\", \"CVE-2013-1643\", \"CVE-2013-4248\");\n script_bugtraq_id(44951, 51954, 55297, 58766, 61776);\n script_xref(name:\"RHSA\", value:\"2013:1307\");\n\n script_name(english:\"RHEL 5 : php53 (RHSA-2013:1307)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated php53 packages that fix multiple security issues, several\nbugs, and add one enhancement are now available for Red Hat Enterprise\nLinux 5.\n\nThe Red Hat Security Response Team has rated this update as having\nmoderate security impact. Common Vulnerability Scoring System (CVSS)\nbase scores, which give detailed severity ratings, are available for\neach vulnerability from the CVE links in the References section.\n\nPHP is an HTML-embedded scripting language commonly used with the\nApache HTTP Server.\n\nIt was found that PHP did not properly handle file names with a NULL\ncharacter. A remote attacker could possibly use this flaw to make a\nPHP script access unexpected files and bypass intended file system\naccess restrictions. (CVE-2006-7243)\n\nIt was found that PHP did not check for carriage returns in HTTP\nheaders, allowing intended HTTP response splitting protections to be\nbypassed. Depending on the web browser the victim is using, a remote\nattacker could use this flaw to perform HTTP response splitting\nattacks. (CVE-2011-1398)\n\nA flaw was found in PHP's SSL client's hostname identity check when\nhandling certificates that contain hostnames with NULL bytes. If an\nattacker was able to get a carefully crafted certificate signed by a\ntrusted Certificate Authority, the attacker could use the certificate\nto conduct man-in-the-middle attacks to spoof SSL servers.\n(CVE-2013-4248)\n\nAn integer signedness issue, leading to a heap-based buffer underflow,\nwas found in the PHP scandir() function. If a remote attacker could\nupload an excessively large number of files to a directory the\nscandir() function runs on, it could cause the PHP interpreter to\ncrash or, possibly, execute arbitrary code. (CVE-2012-2688)\n\nIt was found that PHP did not correctly handle the magic_quotes_gpc\nconfiguration directive. This could result in magic_quotes_gpc input\nescaping not being applied in all cases, possibly making it easier for\na remote attacker to perform SQL injection attacks. (CVE-2012-0831)\n\nIt was found that the PHP SOAP parser allowed the expansion of\nexternal XML entities during SOAP message parsing. A remote attacker\ncould possibly use this flaw to read arbitrary files that are\naccessible to a PHP application using a SOAP extension.\n(CVE-2013-1643)\n\nThese updated php53 packages also include numerous bug fixes and\nenhancements. Space precludes documenting all of these changes in this\nadvisory. Users are directed to the Red Hat Enterprise Linux 5.10\nTechnical Notes, linked to in the References, for information on the\nmost significant of these changes.\n\nAll PHP users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues and add this\nenhancement. After installing the updated packages, the httpd daemon\nmust be restarted for the update to take effect.\"\n );\n # https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?c6b506c4\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2013:1307\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2011-1398\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2012-2688\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2012-0831\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-7243\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2013-1643\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2013-4248\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:php53\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:php53-bcmath\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:php53-cli\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:php53-common\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:php53-dba\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:php53-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:php53-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:php53-gd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:php53-imap\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:php53-intl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:php53-ldap\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:php53-mbstring\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:php53-mysql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:php53-odbc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:php53-pdo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:php53-pgsql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:php53-process\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:php53-pspell\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:php53-snmp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:php53-soap\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:php53-xml\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:php53-xmlrpc\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:5\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/09/30\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/10/01\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = eregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^5([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 5.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2013:1307\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL5\", cpu:\"i386\", reference:\"php53-5.3.3-21.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"php53-5.3.3-21.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"php53-5.3.3-21.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"i386\", reference:\"php53-bcmath-5.3.3-21.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"php53-bcmath-5.3.3-21.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"php53-bcmath-5.3.3-21.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"i386\", reference:\"php53-cli-5.3.3-21.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"php53-cli-5.3.3-21.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"php53-cli-5.3.3-21.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"i386\", reference:\"php53-common-5.3.3-21.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"php53-common-5.3.3-21.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"php53-common-5.3.3-21.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"i386\", reference:\"php53-dba-5.3.3-21.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"php53-dba-5.3.3-21.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"php53-dba-5.3.3-21.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"i386\", reference:\"php53-debuginfo-5.3.3-21.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"php53-debuginfo-5.3.3-21.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"php53-debuginfo-5.3.3-21.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"i386\", reference:\"php53-devel-5.3.3-21.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"php53-devel-5.3.3-21.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"php53-devel-5.3.3-21.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"i386\", reference:\"php53-gd-5.3.3-21.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"php53-gd-5.3.3-21.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"php53-gd-5.3.3-21.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"i386\", reference:\"php53-imap-5.3.3-21.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"php53-imap-5.3.3-21.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"php53-imap-5.3.3-21.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"i386\", reference:\"php53-intl-5.3.3-21.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"php53-intl-5.3.3-21.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"php53-intl-5.3.3-21.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"i386\", reference:\"php53-ldap-5.3.3-21.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"php53-ldap-5.3.3-21.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"php53-ldap-5.3.3-21.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"i386\", reference:\"php53-mbstring-5.3.3-21.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"php53-mbstring-5.3.3-21.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"php53-mbstring-5.3.3-21.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"i386\", reference:\"php53-mysql-5.3.3-21.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"php53-mysql-5.3.3-21.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"php53-mysql-5.3.3-21.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"i386\", reference:\"php53-odbc-5.3.3-21.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"php53-odbc-5.3.3-21.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"php53-odbc-5.3.3-21.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"i386\", reference:\"php53-pdo-5.3.3-21.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"php53-pdo-5.3.3-21.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"php53-pdo-5.3.3-21.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"i386\", reference:\"php53-pgsql-5.3.3-21.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"php53-pgsql-5.3.3-21.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"php53-pgsql-5.3.3-21.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"i386\", reference:\"php53-process-5.3.3-21.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"php53-process-5.3.3-21.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"php53-process-5.3.3-21.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"i386\", reference:\"php53-pspell-5.3.3-21.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"php53-pspell-5.3.3-21.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"php53-pspell-5.3.3-21.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"i386\", reference:\"php53-snmp-5.3.3-21.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"php53-snmp-5.3.3-21.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"php53-snmp-5.3.3-21.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"i386\", reference:\"php53-soap-5.3.3-21.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"php53-soap-5.3.3-21.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"php53-soap-5.3.3-21.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"i386\", reference:\"php53-xml-5.3.3-21.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"php53-xml-5.3.3-21.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"php53-xml-5.3.3-21.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"i386\", reference:\"php53-xmlrpc-5.3.3-21.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"php53-xmlrpc-5.3.3-21.el5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"php53-xmlrpc-5.3.3-21.el5\")) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"php53 / php53-bcmath / php53-cli / php53-common / php53-dba / etc\");\n }\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-17T12:48:12", "description": "From Red Hat Security Advisory 2013:1307 :\n\nUpdated php53 packages that fix multiple security issues, several\nbugs, and add one enhancement are now available for Red Hat Enterprise\nLinux 5.\n\nThe Red Hat Security Response Team has rated this update as having\nmoderate security impact. Common Vulnerability Scoring System (CVSS)\nbase scores, which give detailed severity ratings, are available for\neach vulnerability from the CVE links in the References section.\n\nPHP is an HTML-embedded scripting language commonly used with the\nApache HTTP Server.\n\nIt was found that PHP did not properly handle file names with a NULL\ncharacter. A remote attacker could possibly use this flaw to make a\nPHP script access unexpected files and bypass intended file system\naccess restrictions. (CVE-2006-7243)\n\nIt was found that PHP did not check for carriage returns in HTTP\nheaders, allowing intended HTTP response splitting protections to be\nbypassed. Depending on the web browser the victim is using, a remote\nattacker could use this flaw to perform HTTP response splitting\nattacks. (CVE-2011-1398)\n\nA flaw was found in PHP's SSL client's hostname identity check when\nhandling certificates that contain hostnames with NULL bytes. If an\nattacker was able to get a carefully crafted certificate signed by a\ntrusted Certificate Authority, the attacker could use the certificate\nto conduct man-in-the-middle attacks to spoof SSL servers.\n(CVE-2013-4248)\n\nAn integer signedness issue, leading to a heap-based buffer underflow,\nwas found in the PHP scandir() function. If a remote attacker could\nupload an excessively large number of files to a directory the\nscandir() function runs on, it could cause the PHP interpreter to\ncrash or, possibly, execute arbitrary code. (CVE-2012-2688)\n\nIt was found that PHP did not correctly handle the magic_quotes_gpc\nconfiguration directive. This could result in magic_quotes_gpc input\nescaping not being applied in all cases, possibly making it easier for\na remote attacker to perform SQL injection attacks. (CVE-2012-0831)\n\nIt was found that the PHP SOAP parser allowed the expansion of\nexternal XML entities during SOAP message parsing. A remote attacker\ncould possibly use this flaw to read arbitrary files that are\naccessible to a PHP application using a SOAP extension.\n(CVE-2013-1643)\n\nThese updated php53 packages also include numerous bug fixes and\nenhancements. Space precludes documenting all of these changes in this\nadvisory. Users are directed to the Red Hat Enterprise Linux 5.10\nTechnical Notes, linked to in the References, for information on the\nmost significant of these changes.\n\nAll PHP users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues and add this\nenhancement. After installing the updated packages, the httpd daemon\nmust be restarted for the update to take effect.", "edition": 22, "published": "2013-10-03T00:00:00", "title": "Oracle Linux 5 : php53 (ELSA-2013-1307)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-4248", "CVE-2013-1643", "CVE-2012-2688", "CVE-2011-1398", "CVE-2006-7243", "CVE-2012-0831"], "modified": "2013-10-03T00:00:00", "cpe": ["p-cpe:/a:oracle:linux:php53-pdo", "p-cpe:/a:oracle:linux:php53-ldap", "p-cpe:/a:oracle:linux:php53-soap", "p-cpe:/a:oracle:linux:php53-common", "p-cpe:/a:oracle:linux:php53-intl", "p-cpe:/a:oracle:linux:php53-snmp", "p-cpe:/a:oracle:linux:php53-devel", "p-cpe:/a:oracle:linux:php53-pgsql", "p-cpe:/a:oracle:linux:php53-odbc", "p-cpe:/a:oracle:linux:php53-mysql", "p-cpe:/a:oracle:linux:php53-dba", "cpe:/o:oracle:linux:5", "p-cpe:/a:oracle:linux:php53-gd", "p-cpe:/a:oracle:linux:php53-imap", "p-cpe:/a:oracle:linux:php53-xmlrpc", "p-cpe:/a:oracle:linux:php53", "p-cpe:/a:oracle:linux:php53-process", "p-cpe:/a:oracle:linux:php53-mbstring", "p-cpe:/a:oracle:linux:php53-bcmath", "p-cpe:/a:oracle:linux:php53-xml", "p-cpe:/a:oracle:linux:php53-pspell", "p-cpe:/a:oracle:linux:php53-cli"], "id": "ORACLELINUX_ELSA-2013-1307.NASL", "href": "https://www.tenable.com/plugins/nessus/70284", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2013:1307 and \n# Oracle Linux Security Advisory ELSA-2013-1307 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(70284);\n script_version(\"1.14\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2006-7243\", \"CVE-2011-1398\", \"CVE-2012-0831\", \"CVE-2012-2688\", \"CVE-2013-1643\", \"CVE-2013-4248\");\n script_bugtraq_id(44951, 51954, 54638, 55297, 58766, 61128, 61776);\n script_xref(name:\"RHSA\", value:\"2013:1307\");\n\n script_name(english:\"Oracle Linux 5 : php53 (ELSA-2013-1307)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Oracle Linux host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"From Red Hat Security Advisory 2013:1307 :\n\nUpdated php53 packages that fix multiple security issues, several\nbugs, and add one enhancement are now available for Red Hat Enterprise\nLinux 5.\n\nThe Red Hat Security Response Team has rated this update as having\nmoderate security impact. Common Vulnerability Scoring System (CVSS)\nbase scores, which give detailed severity ratings, are available for\neach vulnerability from the CVE links in the References section.\n\nPHP is an HTML-embedded scripting language commonly used with the\nApache HTTP Server.\n\nIt was found that PHP did not properly handle file names with a NULL\ncharacter. A remote attacker could possibly use this flaw to make a\nPHP script access unexpected files and bypass intended file system\naccess restrictions. (CVE-2006-7243)\n\nIt was found that PHP did not check for carriage returns in HTTP\nheaders, allowing intended HTTP response splitting protections to be\nbypassed. Depending on the web browser the victim is using, a remote\nattacker could use this flaw to perform HTTP response splitting\nattacks. (CVE-2011-1398)\n\nA flaw was found in PHP's SSL client's hostname identity check when\nhandling certificates that contain hostnames with NULL bytes. If an\nattacker was able to get a carefully crafted certificate signed by a\ntrusted Certificate Authority, the attacker could use the certificate\nto conduct man-in-the-middle attacks to spoof SSL servers.\n(CVE-2013-4248)\n\nAn integer signedness issue, leading to a heap-based buffer underflow,\nwas found in the PHP scandir() function. If a remote attacker could\nupload an excessively large number of files to a directory the\nscandir() function runs on, it could cause the PHP interpreter to\ncrash or, possibly, execute arbitrary code. (CVE-2012-2688)\n\nIt was found that PHP did not correctly handle the magic_quotes_gpc\nconfiguration directive. This could result in magic_quotes_gpc input\nescaping not being applied in all cases, possibly making it easier for\na remote attacker to perform SQL injection attacks. (CVE-2012-0831)\n\nIt was found that the PHP SOAP parser allowed the expansion of\nexternal XML entities during SOAP message parsing. A remote attacker\ncould possibly use this flaw to read arbitrary files that are\naccessible to a PHP application using a SOAP extension.\n(CVE-2013-1643)\n\nThese updated php53 packages also include numerous bug fixes and\nenhancements. Space precludes documenting all of these changes in this\nadvisory. Users are directed to the Red Hat Enterprise Linux 5.10\nTechnical Notes, linked to in the References, for information on the\nmost significant of these changes.\n\nAll PHP users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues and add this\nenhancement. After installing the updated packages, the httpd daemon\nmust be restarted for the update to take effect.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2013-October/003703.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected php53 packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:php53\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:php53-bcmath\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:php53-cli\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:php53-common\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:php53-dba\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:php53-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:php53-gd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:php53-imap\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:php53-intl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:php53-ldap\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:php53-mbstring\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:php53-mysql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:php53-odbc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:php53-pdo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:php53-pgsql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:php53-process\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:php53-pspell\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:php53-snmp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:php53-soap\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:php53-xml\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:php53-xmlrpc\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:5\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2011/01/18\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/10/02\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/10/03\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/OracleLinux\")) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nos_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Oracle Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^5([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Oracle Linux 5\", \"Oracle Linux \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && \"ia64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Oracle Linux\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"EL5\", reference:\"php53-5.3.3-21.el5\")) flag++;\nif (rpm_check(release:\"EL5\", reference:\"php53-bcmath-5.3.3-21.el5\")) flag++;\nif (rpm_check(release:\"EL5\", reference:\"php53-cli-5.3.3-21.el5\")) flag++;\nif (rpm_check(release:\"EL5\", reference:\"php53-common-5.3.3-21.el5\")) flag++;\nif (rpm_check(release:\"EL5\", reference:\"php53-dba-5.3.3-21.el5\")) flag++;\nif (rpm_check(release:\"EL5\", reference:\"php53-devel-5.3.3-21.el5\")) flag++;\nif (rpm_check(release:\"EL5\", reference:\"php53-gd-5.3.3-21.el5\")) flag++;\nif (rpm_check(release:\"EL5\", reference:\"php53-imap-5.3.3-21.el5\")) flag++;\nif (rpm_check(release:\"EL5\", reference:\"php53-intl-5.3.3-21.el5\")) flag++;\nif (rpm_check(release:\"EL5\", reference:\"php53-ldap-5.3.3-21.el5\")) flag++;\nif (rpm_check(release:\"EL5\", reference:\"php53-mbstring-5.3.3-21.el5\")) flag++;\nif (rpm_check(release:\"EL5\", reference:\"php53-mysql-5.3.3-21.el5\")) flag++;\nif (rpm_check(release:\"EL5\", reference:\"php53-odbc-5.3.3-21.el5\")) flag++;\nif (rpm_check(release:\"EL5\", reference:\"php53-pdo-5.3.3-21.el5\")) flag++;\nif (rpm_check(release:\"EL5\", reference:\"php53-pgsql-5.3.3-21.el5\")) flag++;\nif (rpm_check(release:\"EL5\", reference:\"php53-process-5.3.3-21.el5\")) flag++;\nif (rpm_check(release:\"EL5\", reference:\"php53-pspell-5.3.3-21.el5\")) flag++;\nif (rpm_check(release:\"EL5\", reference:\"php53-snmp-5.3.3-21.el5\")) flag++;\nif (rpm_check(release:\"EL5\", reference:\"php53-soap-5.3.3-21.el5\")) flag++;\nif (rpm_check(release:\"EL5\", reference:\"php53-xml-5.3.3-21.el5\")) flag++;\nif (rpm_check(release:\"EL5\", reference:\"php53-xmlrpc-5.3.3-21.el5\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"php53 / php53-bcmath / php53-cli / php53-common / php53-dba / etc\");\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-06T09:28:58", "description": "Updated php53 packages that fix multiple security issues, several\nbugs, and add one enhancement are now available for Red Hat Enterprise\nLinux 5.\n\nThe Red Hat Security Response Team has rated this update as having\nmoderate security impact. Common Vulnerability Scoring System (CVSS)\nbase scores, which give detailed severity ratings, are available for\neach vulnerability from the CVE links in the References section.\n\nPHP is an HTML-embedded scripting language commonly used with the\nApache HTTP Server.\n\nIt was found that PHP did not properly handle file names with a NULL\ncharacter. A remote attacker could possibly use this flaw to make a\nPHP script access unexpected files and bypass intended file system\naccess restrictions. (CVE-2006-7243)\n\nIt was found that PHP did not check for carriage returns in HTTP\nheaders, allowing intended HTTP response splitting protections to be\nbypassed. Depending on the web browser the victim is using, a remote\nattacker could use this flaw to perform HTTP response splitting\nattacks. (CVE-2011-1398)\n\nA flaw was found in PHP's SSL client's hostname identity check when\nhandling certificates that contain hostnames with NULL bytes. If an\nattacker was able to get a carefully crafted certificate signed by a\ntrusted Certificate Authority, the attacker could use the certificate\nto conduct man-in-the-middle attacks to spoof SSL servers.\n(CVE-2013-4248)\n\nAn integer signedness issue, leading to a heap-based buffer underflow,\nwas found in the PHP scandir() function. If a remote attacker could\nupload an excessively large number of files to a directory the\nscandir() function runs on, it could cause the PHP interpreter to\ncrash or, possibly, execute arbitrary code. (CVE-2012-2688)\n\nIt was found that PHP did not correctly handle the magic_quotes_gpc\nconfiguration directive. This could result in magic_quotes_gpc input\nescaping not being applied in all cases, possibly making it easier for\na remote attacker to perform SQL injection attacks. (CVE-2012-0831)\n\nIt was found that the PHP SOAP parser allowed the expansion of\nexternal XML entities during SOAP message parsing. A remote attacker\ncould possibly use this flaw to read arbitrary files that are\naccessible to a PHP application using a SOAP extension.\n(CVE-2013-1643)\n\nThese updated php53 packages also include numerous bug fixes and\nenhancements. Space precludes documenting all of these changes in this\nadvisory. Users are directed to the Red Hat Enterprise Linux 5.10\nTechnical Notes, linked to in the References, for information on the\nmost significant of these changes.\n\nAll PHP users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues and add this\nenhancement. After installing the updated packages, the httpd daemon\nmust be restarted for the update to take effect.", "edition": 25, "published": "2014-11-12T00:00:00", "title": "CentOS 5 : php53 (CESA-2013:1307)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-4248", "CVE-2013-1643", "CVE-2012-2688", "CVE-2011-1398", "CVE-2006-7243", "CVE-2012-0831"], "modified": "2014-11-12T00:00:00", "cpe": ["p-cpe:/a:centos:centos:php53-dba", "p-cpe:/a:centos:centos:php53", "p-cpe:/a:centos:centos:php53-snmp", "p-cpe:/a:centos:centos:php53-common", "p-cpe:/a:centos:centos:php53-xmlrpc", "p-cpe:/a:centos:centos:php53-mbstring", "p-cpe:/a:centos:centos:php53-gd", "p-cpe:/a:centos:centos:php53-pgsql", "p-cpe:/a:centos:centos:php53-intl", "p-cpe:/a:centos:centos:php53-bcmath", "p-cpe:/a:centos:centos:php53-imap", "p-cpe:/a:centos:centos:php53-pspell", "cpe:/o:centos:centos:5", "p-cpe:/a:centos:centos:php53-soap", "p-cpe:/a:centos:centos:php53-pdo", "p-cpe:/a:centos:centos:php53-ldap", "p-cpe:/a:centos:centos:php53-devel", "p-cpe:/a:centos:centos:php53-mysql", "p-cpe:/a:centos:centos:php53-process", "p-cpe:/a:centos:centos:php53-odbc", "p-cpe:/a:centos:centos:php53-xml", "p-cpe:/a:centos:centos:php53-cli"], "id": "CENTOS_RHSA-2013-1307.NASL", "href": "https://www.tenable.com/plugins/nessus/79149", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2013:1307 and \n# CentOS Errata and Security Advisory 2013:1307 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(79149);\n script_version(\"1.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2006-7243\", \"CVE-2011-1398\", \"CVE-2012-0831\", \"CVE-2012-2688\", \"CVE-2013-1643\", \"CVE-2013-4248\");\n script_bugtraq_id(44951, 51954, 55297, 58766, 61776);\n script_xref(name:\"RHSA\", value:\"2013:1307\");\n\n script_name(english:\"CentOS 5 : php53 (CESA-2013:1307)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote CentOS host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated php53 packages that fix multiple security issues, several\nbugs, and add one enhancement are now available for Red Hat Enterprise\nLinux 5.\n\nThe Red Hat Security Response Team has rated this update as having\nmoderate security impact. Common Vulnerability Scoring System (CVSS)\nbase scores, which give detailed severity ratings, are available for\neach vulnerability from the CVE links in the References section.\n\nPHP is an HTML-embedded scripting language commonly used with the\nApache HTTP Server.\n\nIt was found that PHP did not properly handle file names with a NULL\ncharacter. A remote attacker could possibly use this flaw to make a\nPHP script access unexpected files and bypass intended file system\naccess restrictions. (CVE-2006-7243)\n\nIt was found that PHP did not check for carriage returns in HTTP\nheaders, allowing intended HTTP response splitting protections to be\nbypassed. Depending on the web browser the victim is using, a remote\nattacker could use this flaw to perform HTTP response splitting\nattacks. (CVE-2011-1398)\n\nA flaw was found in PHP's SSL client's hostname identity check when\nhandling certificates that contain hostnames with NULL bytes. If an\nattacker was able to get a carefully crafted certificate signed by a\ntrusted Certificate Authority, the attacker could use the certificate\nto conduct man-in-the-middle attacks to spoof SSL servers.\n(CVE-2013-4248)\n\nAn integer signedness issue, leading to a heap-based buffer underflow,\nwas found in the PHP scandir() function. If a remote attacker could\nupload an excessively large number of files to a directory the\nscandir() function runs on, it could cause the PHP interpreter to\ncrash or, possibly, execute arbitrary code. (CVE-2012-2688)\n\nIt was found that PHP did not correctly handle the magic_quotes_gpc\nconfiguration directive. This could result in magic_quotes_gpc input\nescaping not being applied in all cases, possibly making it easier for\na remote attacker to perform SQL injection attacks. (CVE-2012-0831)\n\nIt was found that the PHP SOAP parser allowed the expansion of\nexternal XML entities during SOAP message parsing. A remote attacker\ncould possibly use this flaw to read arbitrary files that are\naccessible to a PHP application using a SOAP extension.\n(CVE-2013-1643)\n\nThese updated php53 packages also include numerous bug fixes and\nenhancements. Space precludes documenting all of these changes in this\nadvisory. Users are directed to the Red Hat Enterprise Linux 5.10\nTechnical Notes, linked to in the References, for information on the\nmost significant of these changes.\n\nAll PHP users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues and add this\nenhancement. After installing the updated packages, the httpd daemon\nmust be restarted for the update to take effect.\"\n );\n # https://lists.centos.org/pipermail/centos-cr-announce/2013-October/000863.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?b34ddbc9\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected php53 packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2012-2688\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:php53\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:php53-bcmath\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:php53-cli\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:php53-common\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:php53-dba\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:php53-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:php53-gd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:php53-imap\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:php53-intl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:php53-ldap\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:php53-mbstring\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:php53-mysql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:php53-odbc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:php53-pdo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:php53-pgsql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:php53-process\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:php53-pspell\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:php53-snmp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:php53-soap\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:php53-xml\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:php53-xmlrpc\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:5\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2011/01/18\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/10/07\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/11/12\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"CentOS Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/CentOS/release\");\nif (isnull(release) || \"CentOS\" >!< release) audit(AUDIT_OS_NOT, \"CentOS\");\nos_ver = pregmatch(pattern: \"CentOS(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"CentOS\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^5([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"CentOS 5.x\", \"CentOS \" + os_ver);\n\nif (!get_kb_item(\"Host/CentOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"CentOS\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"CentOS-5\", reference:\"php53-5.3.3-21.el5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"php53-bcmath-5.3.3-21.el5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"php53-cli-5.3.3-21.el5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"php53-common-5.3.3-21.el5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"php53-dba-5.3.3-21.el5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"php53-devel-5.3.3-21.el5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"php53-gd-5.3.3-21.el5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"php53-imap-5.3.3-21.el5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"php53-intl-5.3.3-21.el5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"php53-ldap-5.3.3-21.el5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"php53-mbstring-5.3.3-21.el5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"php53-mysql-5.3.3-21.el5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"php53-odbc-5.3.3-21.el5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"php53-pdo-5.3.3-21.el5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"php53-pgsql-5.3.3-21.el5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"php53-process-5.3.3-21.el5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"php53-pspell-5.3.3-21.el5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"php53-snmp-5.3.3-21.el5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"php53-soap-5.3.3-21.el5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"php53-xml-5.3.3-21.el5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"php53-xmlrpc-5.3.3-21.el5\")) flag++;\n\n\nif (flag)\n{\n cr_plugin_caveat = '\\n' +\n 'NOTE: The security advisory associated with this vulnerability has a\\n' +\n 'fixed package version that may only be available in the continuous\\n' +\n 'release (CR) repository for CentOS, until it is present in the next\\n' +\n 'point release of CentOS.\\n\\n' +\n\n 'If an equal or higher package level does not exist in the baseline\\n' +\n 'repository for your major version of CentOS, then updates from the CR\\n' +\n 'repository will need to be applied in order to address the\\n' +\n 'vulnerability.\\n';\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + cr_plugin_caveat\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"php53 / php53-bcmath / php53-cli / php53-common / php53-dba / etc\");\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-07T10:41:19", "description": "PHP-specific version of NULL-byte poisoning was briefly described by\nShAnKaR :\n\nPoison NULL byte vulnerability for perl CGI applications was described\nin [1]. ShAnKaR noted, that same vulnerability also affects different\nPHP applications.\n\nPHP developers report that branch 5.3 received a fix :\n\nPaths with NULL in them (foo\\0bar.txt) are now considered as invalid\n(CVE-2006-7243).", "edition": 25, "published": "2011-01-13T00:00:00", "title": "FreeBSD : php -- NULL byte poisoning (3761df02-0f9c-11e0-becc-0022156e8794)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2006-7243"], "modified": "2011-01-13T00:00:00", "cpe": ["cpe:/o:freebsd:freebsd", "p-cpe:/a:freebsd:freebsd:php5", "p-cpe:/a:freebsd:freebsd:php52"], "id": "FREEBSD_PKG_3761DF020F9C11E0BECC0022156E8794.NASL", "href": "https://www.tenable.com/plugins/nessus/51505", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2018 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(51505);\n script_version(\"1.13\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2006-7243\");\n\n script_name(english:\"FreeBSD : php -- NULL byte poisoning (3761df02-0f9c-11e0-becc-0022156e8794)\");\n script_summary(english:\"Checks for updated packages in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote FreeBSD host is missing one or more security-related\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"PHP-specific version of NULL-byte poisoning was briefly described by\nShAnKaR :\n\nPoison NULL byte vulnerability for perl CGI applications was described\nin [1]. ShAnKaR noted, that same vulnerability also affects different\nPHP applications.\n\nPHP developers report that branch 5.3 received a fix :\n\nPaths with NULL in them (foo\\0bar.txt) are now considered as invalid\n(CVE-2006-7243).\"\n );\n # http://www.securityfocus.com/archive/1/archive/1/445788/100/0/threaded\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?f1801b94\"\n );\n # http://artofhacking.com/files/phrack/phrack55/P55-07.TXT\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?14009b97\"\n );\n # https://vuxml.freebsd.org/freebsd/3761df02-0f9c-11e0-becc-0022156e8794.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?b3f34437\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:php5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:php52\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2010/12/10\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/01/13\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2011/01/13\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2011-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"php5<5.3.4\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"php52<5.2.17_12\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:pkg_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2021-01-01T06:39:19", "description": "It was discovered that PHP incorrectly handled XML external entities\nin SOAP WSDL files. A remote attacker could use this flaw to read\narbitrary files off the server.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 24, "published": "2013-03-14T00:00:00", "title": "Ubuntu 8.04 LTS / 10.04 LTS / 11.10 / 12.04 LTS / 12.10 : php5 vulnerability (USN-1761-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-1643"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/o:canonical:ubuntu_linux:11.10", "cpe:/o:canonical:ubuntu_linux:10.04:-:lts", "cpe:/o:canonical:ubuntu_linux:8.04:-:lts", "cpe:/o:canonical:ubuntu_linux:12.10", "p-cpe:/a:canonical:ubuntu_linux:php5", "cpe:/o:canonical:ubuntu_linux:12.04:-:lts"], "id": "UBUNTU_USN-1761-1.NASL", "href": "https://www.tenable.com/plugins/nessus/65547", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-1761-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(65547);\n script_version(\"1.11\");\n script_cvs_date(\"Date: 2019/09/19 12:54:29\");\n\n script_cve_id(\"CVE-2013-1643\");\n script_bugtraq_id(58224);\n script_xref(name:\"USN\", value:\"1761-1\");\n\n script_name(english:\"Ubuntu 8.04 LTS / 10.04 LTS / 11.10 / 12.04 LTS / 12.10 : php5 vulnerability (USN-1761-1)\");\n script_summary(english:\"Checks dpkg output for updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Ubuntu host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"It was discovered that PHP incorrectly handled XML external entities\nin SOAP WSDL files. A remote attacker could use this flaw to read\narbitrary files off the server.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/1761-1/\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected php5 package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:php5\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:10.04:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:11.10\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:12.04:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:12.10\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:8.04:-:lts\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2013/03/06\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/03/13\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/03/14\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2013-2019 Canonical, Inc. / NASL script (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! preg(pattern:\"^(8\\.04|10\\.04|11\\.10|12\\.04|12\\.10)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 8.04 / 10.04 / 11.10 / 12.04 / 12.10\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"8.04\", pkgname:\"php5\", pkgver:\"5.2.4-2ubuntu5.27\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"php5\", pkgver:\"5.3.2-1ubuntu4.19\")) flag++;\nif (ubuntu_check(osver:\"11.10\", pkgname:\"php5\", pkgver:\"5.3.6-13ubuntu3.10\")) flag++;\nif (ubuntu_check(osver:\"12.04\", pkgname:\"php5\", pkgver:\"5.3.10-1ubuntu3.6\")) flag++;\nif (ubuntu_check(osver:\"12.10\", pkgname:\"php5\", pkgver:\"5.4.6-1ubuntu1.2\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"php5\");\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}], "openvas": [{"lastseen": "2019-05-29T18:36:00", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-4248", "CVE-2013-1643", "CVE-2006-7243"], "description": "Oracle Linux Local Security Checks ELSA-2013-1615", "modified": "2018-09-28T00:00:00", "published": "2015-10-06T00:00:00", "id": "OPENVAS:1361412562310123529", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310123529", "type": "openvas", "title": "Oracle Linux Local Check: ELSA-2013-1615", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: ELSA-2013-1615.nasl 11688 2018-09-28 13:36:28Z cfischer $\n#\n# Oracle Linux Local Check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2015 Eero Volotinen, http://solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.123529\");\n script_version(\"$Revision: 11688 $\");\n script_tag(name:\"creation_date\", value:\"2015-10-06 14:05:07 +0300 (Tue, 06 Oct 2015)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-09-28 15:36:28 +0200 (Fri, 28 Sep 2018) $\");\n script_name(\"Oracle Linux Local Check: ELSA-2013-1615\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"summary\", value:\"Oracle Linux Local Security Checks ELSA-2013-1615\");\n script_xref(name:\"URL\", value:\"http://linux.oracle.com/errata/ELSA-2013-1615.html\");\n script_cve_id(\"CVE-2006-7243\", \"CVE-2013-1643\", \"CVE-2013-4248\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:P/A:N\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/oracle_linux\", \"ssh/login/release\", re:\"ssh/login/release=OracleLinux6\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Eero Volotinen\");\n script_family(\"Oracle Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"OracleLinux6\")\n{\n if ((res = isrpmvuln(pkg:\"php\", rpm:\"php~5.3.3~26.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"php-bcmath\", rpm:\"php-bcmath~5.3.3~26.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"php-cli\", rpm:\"php-cli~5.3.3~26.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"php-common\", rpm:\"php-common~5.3.3~26.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"php-dba\", rpm:\"php-dba~5.3.3~26.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"php-devel\", rpm:\"php-devel~5.3.3~26.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"php-embedded\", rpm:\"php-embedded~5.3.3~26.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"php-enchant\", rpm:\"php-enchant~5.3.3~26.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"php-fpm\", rpm:\"php-fpm~5.3.3~26.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"php-gd\", rpm:\"php-gd~5.3.3~26.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"php-imap\", rpm:\"php-imap~5.3.3~26.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"php-intl\", rpm:\"php-intl~5.3.3~26.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"php-ldap\", rpm:\"php-ldap~5.3.3~26.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"php-mbstring\", rpm:\"php-mbstring~5.3.3~26.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"php-mysql\", rpm:\"php-mysql~5.3.3~26.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"php-odbc\", rpm:\"php-odbc~5.3.3~26.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"php-pdo\", rpm:\"php-pdo~5.3.3~26.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"php-pgsql\", rpm:\"php-pgsql~5.3.3~26.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"php-process\", rpm:\"php-process~5.3.3~26.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"php-pspell\", rpm:\"php-pspell~5.3.3~26.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"php-recode\", rpm:\"php-recode~5.3.3~26.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"php-snmp\", rpm:\"php-snmp~5.3.3~26.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"php-soap\", rpm:\"php-soap~5.3.3~26.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"php-tidy\", rpm:\"php-tidy~5.3.3~26.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"php-xml\", rpm:\"php-xml~5.3.3~26.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"php-xmlrpc\", rpm:\"php-xmlrpc~5.3.3~26.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"php-zts\", rpm:\"php-zts~5.3.3~26.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n\n}\nif (__pkg_match) exit(99);\n exit(0);\n\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2019-05-29T18:38:03", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-4248", "CVE-2013-1643", "CVE-2006-7243"], "description": "The remote host is missing an update for the ", "modified": "2018-11-23T00:00:00", "published": "2013-11-21T00:00:00", "id": "OPENVAS:1361412562310871084", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310871084", "type": "openvas", "title": "RedHat Update for php RHSA-2013:1615-02", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for php RHSA-2013:1615-02\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2013 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.871084\");\n script_version(\"$Revision: 12497 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-11-23 09:28:21 +0100 (Fri, 23 Nov 2018) $\");\n script_tag(name:\"creation_date\", value:\"2013-11-21 10:44:22 +0530 (Thu, 21 Nov 2013)\");\n script_cve_id(\"CVE-2006-7243\", \"CVE-2013-1643\", \"CVE-2013-4248\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:P/A:N\");\n script_name(\"RedHat Update for php RHSA-2013:1615-02\");\n\n\n script_tag(name:\"affected\", value:\"php on Red Hat Enterprise Linux Server (v. 6),\n Red Hat Enterprise Linux Workstation (v. 6)\");\n script_tag(name:\"insight\", value:\"PHP is an HTML-embedded scripting language commonly used with the Apache\nHTTP Server.\n\nIt was found that PHP did not properly handle file names with a NULL\ncharacter. A remote attacker could possibly use this flaw to make a PHP\nscript access unexpected files and bypass intended file system access\nrestrictions. (CVE-2006-7243)\n\nA flaw was found in PHP's SSL client's hostname identity check when\nhandling certificates that contain hostnames with NULL bytes. If an\nattacker was able to get a carefully crafted certificate signed by a\ntrusted Certificate Authority, the attacker could use the certificate to\nconduct man-in-the-middle attacks to spoof SSL servers. (CVE-2013-4248)\n\nIt was found that the PHP SOAP parser allowed the expansion of external XML\nentities during SOAP message parsing. A remote attacker could possibly use\nthis flaw to read arbitrary files that are accessible to a PHP application\nusing a SOAP extension. (CVE-2013-1643)\n\nThis update fixes the following bugs:\n\n * Previously, when the allow_call_time_pass_reference setting was disabled,\na virtual host on the Apache server could terminate with a segmentation\nfault when attempting to process certain PHP content. This bug has been\nfixed and virtual hosts no longer crash when allow_call_time_pass_reference\nis off. (BZ#892158, BZ#910466)\n\n * Prior to this update, if an error occurred during the operation of the\nfclose(), file_put_contents(), or copy() function, the function did not\nreport it. This could have led to data loss. With this update, the\naforementioned functions have been modified to properly report any errors.\n(BZ#947429)\n\n * The internal buffer for the SQLSTATE error code can store maximum of 5\ncharacters. Previously, when certain calls exceeded this limit, a buffer\noverflow occurred. With this update, messages longer than 5 characters are\nautomatically replaced with the default 'HY000' string, thus preventing the\noverflow. (BZ#969110)\n\nIn addition, this update adds the following enhancement:\n\n * This update adds the following rpm macros to the php package: %__php,\n%php_inidir, %php_incldir. (BZ#953814)\n\nUsers of php are advised to upgrade to these updated packages, which fix\nthese bugs and add this enhancement. After installing the updated packages,\nthe httpd daemon must be restarted for the update to take effect.\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"RHSA\", value:\"2013:1615-02\");\n script_xref(name:\"URL\", value:\"https://www.redhat.com/archives/rhsa-announce/2013-November/msg00027.html\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'php'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2013 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\", re:\"ssh/login/release=RHENT_6\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"RHENT_6\")\n{\n\n if ((res = isrpmvuln(pkg:\"php\", rpm:\"php~5.3.3~26.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-cli\", rpm:\"php-cli~5.3.3~26.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-common\", rpm:\"php-common~5.3.3~26.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-debuginfo\", rpm:\"php-debuginfo~5.3.3~26.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-gd\", rpm:\"php-gd~5.3.3~26.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-ldap\", rpm:\"php-ldap~5.3.3~26.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mysql\", rpm:\"php-mysql~5.3.3~26.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-odbc\", rpm:\"php-odbc~5.3.3~26.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo\", rpm:\"php-pdo~5.3.3~26.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pgsql\", rpm:\"php-pgsql~5.3.3~26.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-soap\", rpm:\"php-soap~5.3.3~26.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xml\", rpm:\"php-xml~5.3.3~26.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xmlrpc\", rpm:\"php-xmlrpc~5.3.3~26.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2017-07-27T10:51:27", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-4248", "CVE-2013-1643", "CVE-2012-2688", "CVE-2011-1398", "CVE-2006-7243", "CVE-2012-0831"], "description": "Check for the Version of php53", "modified": "2017-07-12T00:00:00", "published": "2013-10-03T00:00:00", "id": "OPENVAS:871047", "href": "http://plugins.openvas.org/nasl.php?oid=871047", "type": "openvas", "title": "RedHat Update for php53 RHSA-2013:1307-01", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for php53 RHSA-2013:1307-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2013 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\n\nif(description)\n{\n script_id(871047);\n script_version(\"$Revision: 6687 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-12 11:46:43 +0200 (Wed, 12 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2013-10-03 10:17:21 +0530 (Thu, 03 Oct 2013)\");\n script_cve_id(\"CVE-2006-7243\", \"CVE-2011-1398\", \"CVE-2012-0831\", \"CVE-2012-2688\",\n \"CVE-2013-1643\", \"CVE-2013-4248\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_name(\"RedHat Update for php53 RHSA-2013:1307-01\");\n\n tag_insight = \"PHP is an HTML-embedded scripting language commonly used with the Apache\nHTTP Server.\n\nIt was found that PHP did not properly handle file names with a NULL\ncharacter. A remote attacker could possibly use this flaw to make a PHP\nscript access unexpected files and bypass intended file system access\nrestrictions. (CVE-2006-7243)\n\nIt was found that PHP did not check for carriage returns in HTTP headers,\nallowing intended HTTP response splitting protections to be bypassed.\nDepending on the web browser the victim is using, a remote attacker could\nuse this flaw to perform HTTP response splitting attacks. (CVE-2011-1398)\n\nA flaw was found in PHP's SSL client's hostname identity check when\nhandling certificates that contain hostnames with NULL bytes. If an\nattacker was able to get a carefully crafted certificate signed by a\ntrusted Certificate Authority, the attacker could use the certificate to\nconduct man-in-the-middle attacks to spoof SSL servers. (CVE-2013-4248)\n\nAn integer signedness issue, leading to a heap-based buffer underflow, was\nfound in the PHP scandir() function. If a remote attacker could upload an\nexcessively large number of files to a directory the scandir() function\nruns on, it could cause the PHP interpreter to crash or, possibly, execute\narbitrary code. (CVE-2012-2688)\n\nIt was found that PHP did not correctly handle the magic_quotes_gpc\nconfiguration directive. This could result in magic_quotes_gpc input\nescaping not being applied in all cases, possibly making it easier for a\nremote attacker to perform SQL injection attacks. (CVE-2012-0831)\n\nIt was found that the PHP SOAP parser allowed the expansion of external XML\nentities during SOAP message parsing. A remote attacker could possibly use\nthis flaw to read arbitrary files that are accessible to a PHP application\nusing a SOAP extension. (CVE-2013-1643)\n\nThese updated php53 packages also include numerous bug fixes and\nenhancements. Space precludes documenting all of these changes in this\nadvisory. Users are directed to the Red Hat Enterprise Linux 5.10 Technical\nNotes, linked to in the References, for information on the most significant\nof these changes.\n\nAll PHP users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues and add this\nenhancement. After installing the updated packages, the httpd daemon must\nbe restarted for the update to take effect.\n\";\n\n tag_affected = \"php53 on Red Hat Enterprise Linux (v. 5 server)\";\n\n tag_solution = \"Please Install the Updated Packages.\";\n\n\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name: \"RHSA\", value: \"2013:1307-01\");\n script_xref(name: \"URL\" , value: \"https://www.redhat.com/archives/rhsa-announce/2013-September/msg00050.html\");\n script_summary(\"Check for the Version of php53\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2013 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"RHENT_5\")\n{\n\n if ((res = isrpmvuln(pkg:\"php53\", rpm:\"php53~5.3.3~21.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php53-bcmath\", rpm:\"php53-bcmath~5.3.3~21.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php53-cli\", rpm:\"php53-cli~5.3.3~21.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php53-common\", rpm:\"php53-common~5.3.3~21.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php53-dba\", rpm:\"php53-dba~5.3.3~21.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php53-debuginfo\", rpm:\"php53-debuginfo~5.3.3~21.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php53-devel\", rpm:\"php53-devel~5.3.3~21.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php53-gd\", rpm:\"php53-gd~5.3.3~21.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php53-imap\", rpm:\"php53-imap~5.3.3~21.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php53-intl\", rpm:\"php53-intl~5.3.3~21.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php53-ldap\", rpm:\"php53-ldap~5.3.3~21.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php53-mbstring\", rpm:\"php53-mbstring~5.3.3~21.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php53-mysql\", rpm:\"php53-mysql~5.3.3~21.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php53-odbc\", rpm:\"php53-odbc~5.3.3~21.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php53-pdo\", rpm:\"php53-pdo~5.3.3~21.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php53-pgsql\", rpm:\"php53-pgsql~5.3.3~21.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php53-process\", rpm:\"php53-process~5.3.3~21.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php53-pspell\", rpm:\"php53-pspell~5.3.3~21.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php53-snmp\", rpm:\"php53-snmp~5.3.3~21.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php53-soap\", rpm:\"php53-soap~5.3.3~21.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php53-xml\", rpm:\"php53-xml~5.3.3~21.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php53-xmlrpc\", rpm:\"php53-xmlrpc~5.3.3~21.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2019-05-29T18:37:52", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-4248", "CVE-2013-1643", "CVE-2012-2688", "CVE-2011-1398", "CVE-2006-7243", "CVE-2012-0831"], "description": "The remote host is missing an update for the ", "modified": "2018-11-23T00:00:00", "published": "2013-10-03T00:00:00", "id": "OPENVAS:1361412562310871047", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310871047", "type": "openvas", "title": "RedHat Update for php53 RHSA-2013:1307-01", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for php53 RHSA-2013:1307-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2013 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.871047\");\n script_version(\"$Revision: 12497 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-11-23 09:28:21 +0100 (Fri, 23 Nov 2018) $\");\n script_tag(name:\"creation_date\", value:\"2013-10-03 10:17:21 +0530 (Thu, 03 Oct 2013)\");\n script_cve_id(\"CVE-2006-7243\", \"CVE-2011-1398\", \"CVE-2012-0831\", \"CVE-2012-2688\",\n \"CVE-2013-1643\", \"CVE-2013-4248\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_name(\"RedHat Update for php53 RHSA-2013:1307-01\");\n\n\n script_tag(name:\"affected\", value:\"php53 on Red Hat Enterprise Linux (v. 5 server)\");\n script_tag(name:\"insight\", value:\"PHP is an HTML-embedded scripting language commonly used with the Apache\nHTTP Server.\n\nIt was found that PHP did not properly handle file names with a NULL\ncharacter. A remote attacker could possibly use this flaw to make a PHP\nscript access unexpected files and bypass intended file system access\nrestrictions. (CVE-2006-7243)\n\nIt was found that PHP did not check for carriage returns in HTTP headers,\nallowing intended HTTP response splitting protections to be bypassed.\nDepending on the web browser the victim is using, a remote attacker could\nuse this flaw to perform HTTP response splitting attacks. (CVE-2011-1398)\n\nA flaw was found in PHP's SSL client's hostname identity check when\nhandling certificates that contain hostnames with NULL bytes. If an\nattacker was able to get a carefully crafted certificate signed by a\ntrusted Certificate Authority, the attacker could use the certificate to\nconduct man-in-the-middle attacks to spoof SSL servers. (CVE-2013-4248)\n\nAn integer signedness issue, leading to a heap-based buffer underflow, was\nfound in the PHP scandir() function. If a remote attacker could upload an\nexcessively large number of files to a directory the scandir() function\nruns on, it could cause the PHP interpreter to crash or, possibly, execute\narbitrary code. (CVE-2012-2688)\n\nIt was found that PHP did not correctly handle the magic_quotes_gpc\nconfiguration directive. This could result in magic_quotes_gpc input\nescaping not being applied in all cases, possibly making it easier for a\nremote attacker to perform SQL injection attacks. (CVE-2012-0831)\n\nIt was found that the PHP SOAP parser allowed the expansion of external XML\nentities during SOAP message parsing. A remote attacker could possibly use\nthis flaw to read arbitrary files that are accessible to a PHP application\nusing a SOAP extension. (CVE-2013-1643)\n\nThese updated php53 packages also include numerous bug fixes and\nenhancements. Space precludes documenting all of these changes in this\nadvisory. Users are directed to the Red Hat Enterprise Linux 5.10 Technical\nNotes, linked to in the References, for information on the most significant\nof these changes.\n\nAll PHP users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues and add this\nenhancement. After installing the updated packages, the httpd daemon must\nbe restarted for the update to take effect.\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"RHSA\", value:\"2013:1307-01\");\n script_xref(name:\"URL\", value:\"https://www.redhat.com/archives/rhsa-announce/2013-September/msg00050.html\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'php53'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2013 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\", re:\"ssh/login/release=RHENT_5\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"RHENT_5\")\n{\n\n if ((res = isrpmvuln(pkg:\"php53\", rpm:\"php53~5.3.3~21.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php53-bcmath\", rpm:\"php53-bcmath~5.3.3~21.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php53-cli\", rpm:\"php53-cli~5.3.3~21.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php53-common\", rpm:\"php53-common~5.3.3~21.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php53-dba\", rpm:\"php53-dba~5.3.3~21.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php53-debuginfo\", rpm:\"php53-debuginfo~5.3.3~21.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php53-devel\", rpm:\"php53-devel~5.3.3~21.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php53-gd\", rpm:\"php53-gd~5.3.3~21.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php53-imap\", rpm:\"php53-imap~5.3.3~21.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php53-intl\", rpm:\"php53-intl~5.3.3~21.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php53-ldap\", rpm:\"php53-ldap~5.3.3~21.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php53-mbstring\", rpm:\"php53-mbstring~5.3.3~21.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php53-mysql\", rpm:\"php53-mysql~5.3.3~21.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php53-odbc\", rpm:\"php53-odbc~5.3.3~21.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php53-pdo\", rpm:\"php53-pdo~5.3.3~21.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php53-pgsql\", rpm:\"php53-pgsql~5.3.3~21.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php53-process\", rpm:\"php53-process~5.3.3~21.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php53-pspell\", rpm:\"php53-pspell~5.3.3~21.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php53-snmp\", rpm:\"php53-snmp~5.3.3~21.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php53-soap\", rpm:\"php53-soap~5.3.3~21.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php53-xml\", rpm:\"php53-xml~5.3.3~21.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php53-xmlrpc\", rpm:\"php53-xmlrpc~5.3.3~21.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:36:25", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-4248", "CVE-2013-1643", "CVE-2012-2688", "CVE-2011-1398", "CVE-2006-7243", "CVE-2012-0831"], "description": "Oracle Linux Local Security Checks ELSA-2013-1307", "modified": "2018-09-28T00:00:00", "published": "2015-10-06T00:00:00", "id": "OPENVAS:1361412562310123562", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310123562", "type": "openvas", "title": "Oracle Linux Local Check: ELSA-2013-1307", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: ELSA-2013-1307.nasl 11688 2018-09-28 13:36:28Z cfischer $\n#\n# Oracle Linux Local Check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2015 Eero Volotinen, http://solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.123562\");\n script_version(\"$Revision: 11688 $\");\n script_tag(name:\"creation_date\", value:\"2015-10-06 14:05:34 +0300 (Tue, 06 Oct 2015)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-09-28 15:36:28 +0200 (Fri, 28 Sep 2018) $\");\n script_name(\"Oracle Linux Local Check: ELSA-2013-1307\");\n script_tag(name:\"insight\", value:\"ELSA-2013-1307 - php53 security, bug fix and enhancement update. Please see the references for more insight.\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"summary\", value:\"Oracle Linux Local Security Checks ELSA-2013-1307\");\n script_xref(name:\"URL\", value:\"http://linux.oracle.com/errata/ELSA-2013-1307.html\");\n script_cve_id(\"CVE-2011-1398\", \"CVE-2012-0831\", \"CVE-2012-2688\", \"CVE-2006-7243\", \"CVE-2013-1643\", \"CVE-2013-4248\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/oracle_linux\", \"ssh/login/release\", re:\"ssh/login/release=OracleLinux5\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Eero Volotinen\");\n script_family(\"Oracle Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"OracleLinux5\")\n{\n if ((res = isrpmvuln(pkg:\"php53\", rpm:\"php53~5.3.3~21.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"php53-bcmath\", rpm:\"php53-bcmath~5.3.3~21.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"php53-cli\", rpm:\"php53-cli~5.3.3~21.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"php53-common\", rpm:\"php53-common~5.3.3~21.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"php53-dba\", rpm:\"php53-dba~5.3.3~21.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"php53-devel\", rpm:\"php53-devel~5.3.3~21.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"php53-gd\", rpm:\"php53-gd~5.3.3~21.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"php53-imap\", rpm:\"php53-imap~5.3.3~21.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"php53-intl\", rpm:\"php53-intl~5.3.3~21.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"php53-ldap\", rpm:\"php53-ldap~5.3.3~21.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"php53-mbstring\", rpm:\"php53-mbstring~5.3.3~21.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"php53-mysql\", rpm:\"php53-mysql~5.3.3~21.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"php53-odbc\", rpm:\"php53-odbc~5.3.3~21.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"php53-pdo\", rpm:\"php53-pdo~5.3.3~21.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"php53-pgsql\", rpm:\"php53-pgsql~5.3.3~21.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"php53-process\", rpm:\"php53-process~5.3.3~21.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"php53-pspell\", rpm:\"php53-pspell~5.3.3~21.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"php53-snmp\", rpm:\"php53-snmp~5.3.3~21.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"php53-soap\", rpm:\"php53-soap~5.3.3~21.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"php53-xml\", rpm:\"php53-xml~5.3.3~21.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"php53-xmlrpc\", rpm:\"php53-xmlrpc~5.3.3~21.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n\n}\nif (__pkg_match) exit(99);\n exit(0);\n\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2018-01-23T13:09:53", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-4113", "CVE-2013-4248", "CVE-2013-1643", "CVE-2013-1635"], "description": "Check for the Version of php", "modified": "2018-01-23T00:00:00", "published": "2013-09-12T00:00:00", "id": "OPENVAS:866884", "href": "http://plugins.openvas.org/nasl.php?oid=866884", "type": "openvas", "title": "Fedora Update for php FEDORA-2013-14985", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for php FEDORA-2013-14985\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2013 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\n\nif(description)\n{\n script_id(866884);\n script_version(\"$Revision: 8494 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-23 07:57:55 +0100 (Tue, 23 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2013-09-12 11:35:12 +0530 (Thu, 12 Sep 2013)\");\n script_cve_id(\"CVE-2013-4248\", \"CVE-2013-4113\", \"CVE-2013-1643\", \"CVE-2013-1635\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_name(\"Fedora Update for php FEDORA-2013-14985\");\n\n tag_insight = \"PHP is an HTML-embedded scripting language. PHP attempts to make it\neasy for developers to write dynamically generated web pages. PHP also\noffers built-in database integration for several commercial and\nnon-commercial database management systems, so writing a\ndatabase-enabled webpage with PHP is fairly simple. The most common\nuse of PHP coding is probably as a replacement for CGI scripts.\n\nThe php package contains the module which adds support for the PHP\nlanguage to Apache HTTP Server.\n\";\n\n tag_affected = \"php on Fedora 18\";\n\n tag_solution = \"Please Install the Updated Packages.\";\n\n\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name: \"FEDORA\", value: \"2013-14985\");\n script_xref(name: \"URL\" , value: \"https://lists.fedoraproject.org/pipermail/package-announce/2013-September/115349.html\");\n script_tag(name: \"summary\" , value: \"Check for the Version of php\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2013 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC18\")\n{\n\n if ((res = isrpmvuln(pkg:\"php\", rpm:\"php~5.4.19~1.fc18\", rls:\"FC18\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2019-05-29T18:38:16", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-4113", "CVE-2013-4248", "CVE-2013-1643", "CVE-2013-1635"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2013-09-12T00:00:00", "id": "OPENVAS:1361412562310866884", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310866884", "type": "openvas", "title": "Fedora Update for php FEDORA-2013-14985", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for php FEDORA-2013-14985\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2013 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.866884\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2013-09-12 11:35:12 +0530 (Thu, 12 Sep 2013)\");\n script_cve_id(\"CVE-2013-4248\", \"CVE-2013-4113\", \"CVE-2013-1643\", \"CVE-2013-1635\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_name(\"Fedora Update for php FEDORA-2013-14985\");\n\n\n script_tag(name:\"affected\", value:\"php on Fedora 18\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"FEDORA\", value:\"2013-14985\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/pipermail/package-announce/2013-September/115349.html\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'php'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2013 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC18\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC18\")\n{\n\n if ((res = isrpmvuln(pkg:\"php\", rpm:\"php~5.4.19~1.fc18\", rls:\"FC18\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2017-07-25T10:52:07", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-4113", "CVE-2013-4248", "CVE-2013-1643", "CVE-2013-6420", "CVE-2013-1635"], "description": "Check for the Version of php", "modified": "2017-07-10T00:00:00", "published": "2013-12-23T00:00:00", "id": "OPENVAS:867177", "href": "http://plugins.openvas.org/nasl.php?oid=867177", "type": "openvas", "title": "Fedora Update for php FEDORA-2013-23215", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for php FEDORA-2013-23215\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2013 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\n\nif(description)\n{\n script_id(867177);\n script_version(\"$Revision: 6628 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 08:32:47 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2013-12-23 11:00:40 +0530 (Mon, 23 Dec 2013)\");\n script_cve_id(\"CVE-2013-6420\", \"CVE-2013-4248\", \"CVE-2013-4113\", \"CVE-2013-1643\", \"CVE-2013-1635\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_name(\"Fedora Update for php FEDORA-2013-23215\");\n\n tag_insight = \"PHP is an HTML-embedded scripting language. PHP attempts to make it\neasy for developers to write dynamically generated web pages. PHP also\noffers built-in database integration for several commercial and\nnon-commercial database management systems, so writing a\ndatabase-enabled webpage with PHP is fairly simple. The most common\nuse of PHP coding is probably as a replacement for CGI scripts.\n\nThe php package contains the module which adds support for the PHP\nlanguage to Apache HTTP Server.\n\";\n\n tag_affected = \"php on Fedora 18\";\n\n tag_solution = \"Please Install the Updated Packages.\";\n\n\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name: \"FEDORA\", value: \"2013-23215\");\n script_xref(name: \"URL\" , value: \"https://lists.fedoraproject.org/pipermail/package-announce/2013-December/124713.html\");\n script_summary(\"Check for the Version of php\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2013 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC18\")\n{\n\n if ((res = isrpmvuln(pkg:\"php\", rpm:\"php~5.4.23~1.fc18\", rls:\"FC18\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2019-05-29T18:38:00", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-4113", "CVE-2013-4248", "CVE-2013-1643", "CVE-2013-6420", "CVE-2013-1635"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2013-12-23T00:00:00", "id": "OPENVAS:1361412562310867177", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310867177", "type": "openvas", "title": "Fedora Update for php FEDORA-2013-23215", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for php FEDORA-2013-23215\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2013 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.867177\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2013-12-23 11:00:40 +0530 (Mon, 23 Dec 2013)\");\n script_cve_id(\"CVE-2013-6420\", \"CVE-2013-4248\", \"CVE-2013-4113\", \"CVE-2013-1643\", \"CVE-2013-1635\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_name(\"Fedora Update for php FEDORA-2013-23215\");\n\n\n script_tag(name:\"affected\", value:\"php on Fedora 18\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"FEDORA\", value:\"2013-23215\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/pipermail/package-announce/2013-December/124713.html\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'php'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2013 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC18\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC18\")\n{\n\n if ((res = isrpmvuln(pkg:\"php\", rpm:\"php~5.4.23~1.fc18\", rls:\"FC18\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2017-07-02T21:13:32", "bulletinFamily": "scanner", "cvelist": ["CVE-2006-7243"], "description": "The remote host is missing an update to the system\nas announced in the referenced advisory.", "modified": "2017-02-25T00:00:00", "published": "2011-01-24T00:00:00", "id": "OPENVAS:68832", "href": "http://plugins.openvas.org/nasl.php?oid=68832", "type": "openvas", "title": "FreeBSD Ports: php5", "sourceData": "#\n#VID 3761df02-0f9c-11e0-becc-0022156e8794\n# OpenVAS Vulnerability Test\n# $\n# Description: Auto generated from VID 3761df02-0f9c-11e0-becc-0022156e8794\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The following packages are affected:\n php5\n php52\n\nCVE-2006-7243\nPHP before 5.3.4 accepts the \\0 character in a pathname, which might\nallow context-dependent attackers to bypass intended access\nrestrictions by placing a safe file extension after this character, as\ndemonstrated by .php\\0.jpg at the end of the argument to the\nfile_exists function.\";\ntag_solution = \"Update your system with the appropriate patches or\nsoftware upgrades.\n\nhttp://www.securityfocus.com/archive/1/archive/1/445788/100/0/threaded\nhttp://artofhacking.com/files/phrack/phrack55/P55-07.TXT\nhttp://www.vuxml.org/freebsd/3761df02-0f9c-11e0-becc-0022156e8794.html\";\ntag_summary = \"The remote host is missing an update to the system\nas announced in the referenced advisory.\";\n\n\n\nif(description)\n{\n script_id(68832);\n script_version(\"$Revision: 5424 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-02-25 17:52:36 +0100 (Sat, 25 Feb 2017) $\");\n script_tag(name:\"creation_date\", value:\"2011-01-24 17:55:59 +0100 (Mon, 24 Jan 2011)\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:P/A:N\");\n script_cve_id(\"CVE-2006-7243\");\n script_name(\"FreeBSD Ports: php5\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"FreeBSD Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/freebsdrel\", \"login/SSH/success\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-bsd.inc\");\n\ntxt = \"\";\nvuln = 0;\nbver = portver(pkg:\"php5\");\nif(!isnull(bver) && revcomp(a:bver, b:\"5.3.4\")<0) {\n txt += 'Package php5 version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\nbver = portver(pkg:\"php52\");\nif(!isnull(bver) && revcomp(a:bver, b:\"0\")>=0) {\n txt += 'Package php52 version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\n\nif(vuln) {\n security_message(data:string(txt));\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}], "f5": [{"lastseen": "2017-06-08T06:18:20", "bulletinFamily": "software", "cvelist": ["CVE-2013-1643"], "edition": 1, "description": "\nTo determine if your release is known to be vulnerable, the components or features that are affected by the vulnerability, and for information about releases or hotfixes that address the vulnerability, refer to the following table:\n\nProduct | Versions known to be vulnerable | Versions known to be not vulnerable | Vulnerable component or feature \n---|---|---|--- \nBIG-IP LTM | \nNone \n| 9.0.0 - 9.6.1 \n10.0.0 - 10.2.4 \n11.0.0 - 11.4.0 \n| \nNone \nBIG-IP AAM | None | 11.4.0 | None \nBIG-IP AFM | \nNone | 11.3.0 - 11.4.0 \n| None \nBIG-IP Analytics | \nNone | 11.0.0 - 11.4.0 \n| None \nBIG-IP APM | \nNone | 10.1.0 - 10.2.4 \n11.0.0 - 11.4.0 \n| None \nBIG-IP ASM | \nNone | 9.2.0 - 9.4.8 \n10.0.0 - 10.2.4 \n11.0.0 - 11.4.0 \n| None \nBIG-IP Edge Gateway \n| \nNone | 10.1.0 - 10.2.4 \n11.0.0 - 11.4.0 \n| None \nBIG-IP GTM | \nNone | 9.2.2 - 9.4.8 \n10.0.0 - 10.2.4 \n11.0.0 - 11.4.0 \n| None \nBIG-IP Link Controller | \nNone \n| 9.2.2 - 9.4.8 \n10.0.0 - 10.2.4 \n11.0.0 - 11.4.0 \n \n| None \nBIG-IP PEM | \nNone \n| 11.3.0 - 11.4.0 \n \n| None \nBIG-IP PSM | \nNone | 9.4.5 - 9.4.8 \n10.0.0 - 10.2.4 \n11.0.0 - 11.4.0 \n| None \nBIG-IP WebAccelerator | \nNone | 9.4.0 - 9.4.8 \n10.0.0 - 10.2.4 \n11.0.0 - 11.3.0 \n| None \nBIG-IP WOM | \nNone | 10.0.0 - 10.2.4 \n11.0.0 - 11.3.0 \n| None \nARX | \nNone | 5.0.0 - 5.3.1 \n6.0.0 - 6.4.0 \n| None \nEnterprise Manager | \nNone | 1.6.0 - 1.8.0 \n2.0.0 - 2.3.0 \n3.0.0 - 3.1.1 \n| None \nFirePass | \nNone | 6.0.0 - 6.1.0 \n7.0.0 \n| None\n\nNone\n\n * [K9970: Subscribing to email notifications regarding F5 products](<https://support.f5.com/csp/article/K9970>)\n * [K9957: Creating a custom RSS feed to view new and updated documents](<https://support.f5.com/csp/article/K9957>)\n * [K4602: Overview of the F5 security vulnerability response policy](<https://support.f5.com/csp/article/K4602>)\n", "modified": "2017-03-14T22:30:00", "published": "2013-05-30T21:31:00", "href": "https://support.f5.com/csp/article/K14433", "id": "F5:K14433", "title": "PHP SOAP vulnerability CVE-2013-1643", "type": "f5", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}}, {"lastseen": "2016-09-26T17:23:01", "bulletinFamily": "software", "cvelist": ["CVE-2013-1643"], "edition": 1, "description": "Vulnerability Recommended Actions\n\nNone\n\nSupplemental Information\n\n * SOL9970: Subscribing to email notifications regarding F5 products\n * SOL9957: Creating a custom RSS feed to view new and updated documents\n * SOL4602: Overview of the F5 security vulnerability response policy\n", "modified": "2016-07-25T00:00:00", "published": "2013-05-30T00:00:00", "href": "http://support.f5.com/kb/en-us/solutions/public/14000/400/sol14433.html", "id": "SOL14433", "title": "SOL14433 - PHP SOAP vulnerability CVE-2013-1643", "type": "f5", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}}, {"lastseen": "2016-11-09T00:09:37", "bulletinFamily": "software", "cvelist": ["CVE-2013-4248", "CVE-2009-2408"], "edition": 1, "description": "Recommended Action\n\nNone\n\nSupplemental Information\n\n * SOL9970: Subscribing to email notifications regarding F5 products\n * SOL9957: Creating a custom RSS feed to view new and updated documents.\n * SOL4602: Overview of the F5 security vulnerability response policy\n", "modified": "2014-01-15T00:00:00", "published": "2014-01-15T00:00:00", "href": "http://support.f5.com/kb/en-us/solutions/public/14000/900/sol14909.html", "id": "SOL14909", "title": "SOL14909 - OpenSSL vulnerability CVE-2013-4248", "type": "f5", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2016-09-27T21:23:48", "bulletinFamily": "software", "cvelist": ["CVE-2006-7243", "CVE-2015-4025", "CVE-2015-4026"], "edition": 1, "description": "Vulnerability Recommended Actions\n\nIf the previous table lists a version in the **Versions known to be not vulnerable** column, you can eliminate this vulnerability by upgrading to the listed version. If the listed version is older than the version you are currently running, or if the table does not list any version in the column, then no upgrade candidate currently exists.\n\nF5 responds to vulnerabilities in accordance with the **Severity** values published in the previous table. The **Severity** values and other security vulnerability parameters are defined in SOL4602: Overview of the F5 security vulnerability response policy.\n\nSupplemental Information\n\n * SOL9970: Subscribing to email notifications regarding F5 products\n * SOL9957: Creating a custom RSS feed to view new and updated documents\n * SOL4918: Overview of the F5 critical issue hotfix policy\n * SOL167: Downloading software and firmware from F5\n * SOL13123: Managing BIG-IP product hotfixes (11.x - 12.x)\n * SOL10025: Managing BIG-IP product hotfixes (10.x)\n * SOL9502: BIG-IP hotfix matrix\n", "modified": "2016-05-27T00:00:00", "published": "2015-07-22T00:00:00", "href": "http://support.f5.com/kb/en-us/solutions/public/16000/900/sol16993.html", "id": "SOL16993", "title": "SOL16993 - PHP vulnerabilities CVE-2015-4025 and CVE-2015-4026", "type": "f5", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-06-08T00:16:40", "bulletinFamily": "software", "cvelist": ["CVE-2006-7243", "CVE-2015-4025", "CVE-2015-4026"], "edition": 1, "description": "\nF5 Product Development has assigned IDs 532561 and 532562 (BIG-IP), ID 528817 (BIG-IQ), and ID 525232 (Enterprise Manager) to this vulnerability, and has evaluated the currently supported releases for potential vulnerability.\n\nTo determine if your release is known to be vulnerable, the components or features that are affected by the vulnerability, and for information about releases or hotfixes that address the vulnerability, refer to the following table:\n\nProduct| Versions known to be vulnerable| Versions known to be not vulnerable| Severity| Vulnerable component or feature \n---|---|---|---|--- \nBIG-IP LTM| 11.6.0 \n11.0.0 - 11.5.3 \n10.1.0 - 10.2.4| 12.0.0 \n11.6.1 \n11.5.4| Low| PHP framework, Control Plane \nBIG-IP AAM| 11.6.0 \n11.4.0 - 11.5.3| 12.0.0 \n11.6.1 \n11.5.4| Low| PHP framework, Control Plane \nBIG-IP AFM| 11.6.0 \n11.3.0 - 11.5.3| 12.0.0 \n11.6.1 \n11.5.4| Low| PHP framework, Control Plane \nBIG-IP Analytics| 11.6.0 \n11.0.0 - 11.5.3| 12.0.0 \n11.6.1 \n11.5.4| Low| PHP framework, Control Plane \nBIG-IP APM| 11.6.0 \n11.0.0 - 11.5.3 \n10.1.0 - 10.2.4| 12.0.0 \n11.6.1 \n11.5.4| Low| PHP framework, Control Plane \nBIG-IP ASM| 11.6.0 \n11.0.0 - 11.5.3 \n10.1.0 - 10.2.4| 12.0.0 \n11.6.1 \n11.5.4| Low| PHP framework, Control Plane \nBIG-IP DNS| None| 12.0.0| Not vulnerable| None \nBIG-IP Edge Gateway| 11.0.0 - 11.3.0 \n10.1.0 - 10.2.4| None| Low| PHP framework, Control Plane \nBIG-IP GTM| 11.6.0 \n11.0.0 - 11.5.3 \n10.1.0 - 10.2.4| 11.6.1 \n11.5.4| Low| PHP framework, Control Plane \nBIG-IP Link Controller| 11.6.0 \n11.0.0 - 11.5.3 \n10.1.0 - 10.2.4| 12.0.0 \n11.6.1 \n11.5.4| Low| PHP framework, Control Plane \nBIG-IP PEM| 11.6.0 \n11.3.0 - 11.5.3| 12.0.0 \n11.6.1 \n11.5.4| Low| PHP framework, Control Plane \nBIG-IP PSM| 11.0.0 - 11.4.1 \n10.1.0 - 10.2.4| None| Low| PHP framework, Control Plane \nBIG-IP WebAccelerator| 11.0.0 - 11.3.0 \n10.1.0 - 10.2.4| None| Low| PHP framework, Control Plane \nBIG-IP WOM| 11.0.0 - 11.3.0 \n10.1.0 - 10.2.4| None| Low| PHP framework, Control Plane \nARX| None| 6.0.0 - 6.4.0| Not vulnerable| None \nEnterprise Manager| 3.0.0 - 3.1.1| None| Low| PHP framework, Control Plane \nFirePass| None| 7.0.0 \n6.0.0 - 6.1.0| Not vulnerable| None \nBIG-IQ Cloud| 4.0.0 - 4.5.0| None| Low| PHP framework, Control Plane \nBIG-IQ Device| 4.2.0 - 4.5.0| None| Low| PHP framework, Control Plane \nBIG-IQ Security| 4.0.0 - 4.5.0| None| Low| PHP framework, Control Plane \nBIG-IQ ADC| 4.5.0| None| Low| PHP framework, Control Plane \nLineRate| None| 2.2.0 - 2.6.1 \n1.6.0 - 1.6.4| Not vulnerable| None \nF5 WebSafe| None| 1.0.0| Not vulnerable| None \nTraffix SDC| None| 4.0.0 - 4.1.0 \n3.3.2 - 3.5.1| Not vulnerable| None\n\nIf the previous table lists a version in the **Versions known to be not vulnerable** column, you can eliminate this vulnerability by upgrading to the listed version. If the listed version is older than the version you are currently running, or if the table does not list any version in the column, then no upgrade candidate currently exists.\n\nF5 responds to vulnerabilities in accordance with the **Severity** values published in the previous table. The **Severity** values and other security vulnerability parameters are defined in [K4602: Overview of the F5 security vulnerability response policy](<https://support.f5.com/csp/article/K4602>).\n\n * [K9970: Subscribing to email notifications regarding F5 products](<https://support.f5.com/csp/article/K9970>)\n * [K9957: Creating a custom RSS feed to view new and updated documents](<https://support.f5.com/csp/article/K9957>)\n * [K4918: Overview of the F5 critical issue hotfix policy](<https://support.f5.com/csp/article/K4918>)\n * [K167: Downloading software and firmware from F5](<https://support.f5.com/csp/article/K167>)\n * [K13123: Managing BIG-IP product hotfixes (11.x - 12.x)](<https://support.f5.com/csp/article/K13123>)\n * [K10025: Managing BIG-IP product hotfixes (10.x)](<https://support.f5.com/csp/article/K10025>)\n * [K9502: BIG-IP hotfix matrix](<https://support.f5.com/csp/article/K9502>)\n", "modified": "2016-05-27T18:19:00", "published": "2015-07-22T23:35:00", "href": "https://support.f5.com/csp/article/K16993", "id": "F5:K16993", "title": "PHP vulnerabilities CVE-2015-4025 and CVE-2015-4026", "type": "f5", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "seebug": [{"lastseen": "2017-11-19T17:54:07", "description": "BUGTRAQ ID: 44951\r\nCVE ID: CVE-2006-7243\r\n\r\nPHP\u662f\u4e00\u79cdHTML\u5185\u5d4c\u5f0f\u7684\u8bed\u8a00\uff0cPHP\u4e0e\u5fae\u8f6f\u7684ASP\u9887\u6709\u51e0\u5206\u76f8\u4f3c\uff0c\u90fd\u662f\u4e00\u79cd\u5728\u670d\u52a1\u5668\u7aef\u6267\u884c\u7684\u5d4c\u5165HTML\u6587\u6863\u7684\u811a\u672c\u8bed\u8a00\uff0c\u8bed\u8a00\u7684\u98ce\u683c\u6709\u7c7b\u4f3c\u4e8eC\u8bed\u8a00\uff0c\u73b0\u5728\u88ab\u5f88\u591a\u7684\u7f51\u7ad9\u7f16\u7a0b\u4eba\u5458\u5e7f\u6cdb\u7684\u8fd0\u7528\u3002\r\n\r\nPHP 5.3.4\u4e4b\u524d\u7248\u672c\u8def\u5f84\u540d\u4e2d\u63a5\u53d7\\0\u5b57\u7b26\uff0c\u901a\u8fc7\u5728\u6b64\u5b57\u7b26\u540e\u653e\u7f6e\u5b89\u5168\u7684\u6587\u4ef6\u6269\u5c55\u540d\uff0c\u653b\u51fb\u8005\u53ef\u7ed5\u8fc7\u76ee\u6807\u8bbf\u95ee\u9650\u5236\u3002\r\n0\r\nPHP 5.3.x\r\n\u5382\u5546\u8865\u4e01\uff1a\r\n\r\nPHP\r\n---\r\n\u76ee\u524d\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u4e86\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u8fd9\u4e2a\u5b89\u5168\u95ee\u9898\uff0c\u8bf7\u5230\u5382\u5546\u7684\u4e3b\u9875\u4e0b\u8f7d\uff1a\r\n\r\nhttp://www.php.net", "published": "2012-04-12T00:00:00", "type": "seebug", "title": "PHP\u7a7a\u5b57\u7b26\u5b89\u5168\u9650\u5236\u7ed5\u8fc7\u6f0f\u6d1e(CVE-2006-7243)", "bulletinFamily": "exploit", "cvelist": ["CVE-2006-7243"], "modified": "2012-04-12T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-60051", "id": "SSV:60051", "sourceData": "", "sourceHref": "", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}], "oraclelinux": [{"lastseen": "2019-05-29T18:39:13", "bulletinFamily": "unix", "cvelist": ["CVE-2013-4248", "CVE-2013-1643", "CVE-2006-7243", "CVE-2010-3709"], "description": "[5.3.3-26]\r\n- add security fix for CVE-2013-4248\r\n \n[5.3.3-25]\r\n- rename patch to math CVE-2010-3709 name\r\n- add security fixes for CVE-2006-7243, CVE-2013-1643\r\n \n[5.3.3-24]\r\n- fix buffer overflow in _pdo_pgsql_error (#969110)\r\n- fix double free when destroy_zend_class fails (#910466)\r\n- fix segfault in error_handler with\r\n allow_call_time_pass_reference = Off (#892158)\r\n- fix copy doesn't report failure on partial copy (#947428)\r\n- add rpm macros for packagers: %php_inidir,\r\n %php_incldir and %__php (#953814)", "edition": 4, "modified": "2013-11-25T00:00:00", "published": "2013-11-25T00:00:00", "id": "ELSA-2013-1615", "href": "http://linux.oracle.com/errata/ELSA-2013-1615.html", "title": "php security, bug fix, and enhancement update", "type": "oraclelinux", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2019-05-29T18:35:31", "bulletinFamily": "unix", "cvelist": ["CVE-2013-4113", "CVE-2013-4248", "CVE-2013-1643", "CVE-2012-2688", "CVE-2011-1398", "CVE-2006-7243", "CVE-2012-0831"], "description": "[5.3.3-21]\r\n- add security fix for CVE-2013-4248\r\n \n[5.3.3-20]\r\n- add security fix for CVE-2013-4113\r\n \n[5.3.3-19]\r\n- add upstream reproducer for error_handler (#951075)\r\n \n[5.3.3-18]\r\n- add security fixes for CVE-2006-7243\r\n \n[5.3.3-17]\r\n- reorder security patches\r\n- add security fixes for CVE-2012-2688, CVE-2012-0831,\r\n CVE-2011-1398, CVE-2013-1643\r\n \n[5.3.3-15]\r\n- fix segfault in error_handler with\r\n allow_call_time_pass_reference = Off (#951075)\r\n- fix double free when destroy_zend_class fails (#951076)\r\n \n[5.3.3-14]\r\n- fix possible buffer overflow in pdo_odbc (#869694)\r\n- rename php-5.3.3-extrglob.patch and reorder\r\n- php script hangs when it exceeds max_execution_time\r\n when inside an ODBC call (#864954)\r\n- fix zend garbage collector (#892695)\r\n- fix transposed memset arguments in libzip (#953818)\r\n- fix possible segfault in pdo_mysql (#869693)\r\n- fix imap_open DISABLE_AUTHENTICATOR param ignores array (#859369)\r\n- fix stream support in fileinfo (#869697)\r\n- fix setDate when DateTime created from timestamp (#869691)\r\n- fix permission on source files (#869688)\r\n- add php(language) and missing provides (#837044)\r\n- fix copy doesn't report failure on partial copy (#951413)", "edition": 4, "modified": "2013-10-02T00:00:00", "published": "2013-10-02T00:00:00", "id": "ELSA-2013-1307", "href": "http://linux.oracle.com/errata/ELSA-2013-1307.html", "title": "php53 security, bug fix and enhancement update", "type": "oraclelinux", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:35:18", "bulletinFamily": "unix", "cvelist": ["CVE-2006-7243", "CVE-2009-0689"], "description": "[5.1.6-44]\n- add security fixes for CVE-2006-7243, CVE-2009-0689", "edition": 4, "modified": "2014-03-18T00:00:00", "published": "2014-03-18T00:00:00", "id": "ELSA-2014-0311", "href": "http://linux.oracle.com/errata/ELSA-2014-0311.html", "title": "php security update", "type": "oraclelinux", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "fedora": [{"lastseen": "2020-12-21T08:17:51", "bulletinFamily": "unix", "cvelist": ["CVE-2013-1635", "CVE-2013-1643", "CVE-2013-4113", "CVE-2013-4248"], "description": "PHP is an HTML-embedded scripting language. PHP attempts to make it easy for developers to write dynamically generated web pages. PHP also offers built-in database integration for several commercial and non-commercial database management systems, so writing a database-enabled webpage with PHP is fairly simple. The most common use of PHP coding is probably as a replacement for CGI scripts. The php package contains the module which adds support for the PHP language to Apache HTTP Server. ", "modified": "2013-09-08T23:25:56", "published": "2013-09-08T23:25:56", "id": "FEDORA:CE081217C7", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 18 Update: php-5.4.19-1.fc18", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-12-21T08:17:52", "bulletinFamily": "unix", "cvelist": ["CVE-2013-1635", "CVE-2013-1643", "CVE-2013-4113", "CVE-2013-4248", "CVE-2013-6420"], "description": "PHP is an HTML-embedded scripting language. PHP attempts to make it easy for developers to write dynamically generated web pages. PHP also offers built-in database integration for several commercial and non-commercial database management systems, so writing a database-enabled webpage with PHP is fairly simple. The most common use of PHP coding is probably as a replacement for CGI scripts. The php package contains the module which adds support for the PHP language to Apache HTTP Server. ", "modified": "2013-12-20T02:04:53", "published": "2013-12-20T02:04:53", "id": "FEDORA:D71912448B", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 18 Update: php-5.4.23-1.fc18", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-12-21T08:17:51", "bulletinFamily": "unix", "cvelist": ["CVE-2013-1635", "CVE-2013-1643"], "description": "PHP is an HTML-embedded scripting language. PHP attempts to make it easy for developers to write dynamically generated web pages. PHP also offers built-in database integration for several commercial and non-commercial database management systems, so writing a database-enabled webpage with PHP is fairly simple. The most common use of PHP coding is probably as a replacement for CGI scripts. The php package contains the module which adds support for the PHP language to Apache HTTP Server. ", "modified": "2013-04-03T04:40:40", "published": "2013-04-03T04:40:40", "id": "FEDORA:E577920E32", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 18 Update: php-5.4.13-1.fc18", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-12-21T08:17:51", "bulletinFamily": "unix", "cvelist": ["CVE-2013-1635", "CVE-2013-1643"], "description": "PHP is an HTML-embedded scripting language. PHP attempts to make it easy for developers to write dynamically generated web pages. PHP also offers built-in database integration for several commercial and non-commercial database management systems, so writing a database-enabled webpage with PHP is fairly simple. The most common use of PHP coding is probably as a replacement for CGI scripts. The php package contains the module which adds support for the PHP language to Apache HTTP Server. ", "modified": "2013-06-20T02:31:36", "published": "2013-06-20T02:31:36", "id": "FEDORA:DA7FD21A08", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 18 Update: php-5.4.16-1.fc18", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "freebsd": [{"lastseen": "2019-05-29T18:34:03", "bulletinFamily": "unix", "cvelist": ["CVE-2006-7243"], "description": "\nPHP-specific version of NULL-byte poisoning was briefly\n\t described by ShAnKaR:\n\nPoison NULL byte vulnerability for perl CGI applications\n\t was described in\n\t [1].\n\t ShAnKaR noted, that same vulnerability also affects\n\t different PHP applications.\n\nPHP developers report that branch 5.3 received a fix:\n\nPaths with NULL in them (foo\\0bar.txt) are now considered\n\t as invalid (CVE-2006-7243).\n\n", "edition": 4, "modified": "2012-11-25T00:00:00", "published": "2010-12-10T00:00:00", "id": "3761DF02-0F9C-11E0-BECC-0022156E8794", "href": "https://vuxml.freebsd.org/freebsd/3761df02-0f9c-11e0-becc-0022156e8794.html", "title": "php -- NULL byte poisoning", "type": "freebsd", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2019-05-29T18:33:39", "bulletinFamily": "unix", "cvelist": ["CVE-2013-1643", "CVE-2013-1635"], "description": "\nThe PHP development team reports:\n\nPHP does not validate the relationship between the soap.wsdl_cache_dir\n\t directive and the open_basedir directive, which allows remote attackers to\n\t bypass intended access restrictions by triggering the creation of cached\n\t SOAP WSDL files in an arbitrary directory.\nThe SOAP parser in PHP allows remote attackers to read arbitrary files\n\t via a SOAP WSDL file containing an XML external entity declaration in\n\t conjunction with an entity reference, related to an XML External Entity\n\t (XXE) issue in the soap_xmlParseFile and soap_xmlParseMemory functions.\n\n", "edition": 4, "modified": "2013-03-04T00:00:00", "published": "2013-03-04T00:00:00", "id": "1D23109A-9005-11E2-9602-D43D7E0C7C02", "href": "https://vuxml.freebsd.org/freebsd/1d23109a-9005-11e2-9602-d43d7e0c7c02.html", "title": "php5 -- Multiple vulnerabilities", "type": "freebsd", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "ubuntu": [{"lastseen": "2020-07-02T11:40:37", "bulletinFamily": "unix", "cvelist": ["CVE-2013-1643"], "description": "It was discovered that PHP incorrectly handled XML external entities in \nSOAP WSDL files. A remote attacker could use this flaw to read arbitrary \nfiles off the server.", "edition": 5, "modified": "2013-03-13T00:00:00", "published": "2013-03-13T00:00:00", "id": "USN-1761-1", "href": "https://ubuntu.com/security/notices/USN-1761-1", "title": "PHP vulnerability", "type": "ubuntu", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2020-07-02T11:43:23", "bulletinFamily": "unix", "cvelist": ["CVE-2013-4248"], "description": "It was discovered that PHP did not properly handle certificates with NULL \ncharacters in the Subject Alternative Name field. An attacker could exploit \nthis to perform a man in the middle attack to view sensitive information or \nalter encrypted communications.", "edition": 5, "modified": "2013-09-05T00:00:00", "published": "2013-09-05T00:00:00", "id": "USN-1937-1", "href": "https://ubuntu.com/security/notices/USN-1937-1", "title": "PHP vulnerability", "type": "ubuntu", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}], "ptsecurity": [{"lastseen": "2020-06-11T19:06:53", "bulletinFamily": "info", "cvelist": ["CVE-2013-1643"], "edition": 4, "description": "# PT-2013-14: XML External Entities Injection in PHP\n\n## Vulnerable software\n\nPHP \nVersion: 5.4.12/5.3.22 and earlier\n\nApplication link: \n<http://php.net/>[](<http://fluxbb.org/>)\n\n## Severity level\n\nSeverity level: Medium \nImpact: XML External Entities Injection (XXE) \nAccess Vector: Remote \n\n\nCVSS v2: \nBase Score: 5.0 \nVector: (AV:N/AC:L/Au:N/C:P/I:N/A:N)\n\nCVE: CVE-2013-1643\n\n**Software description**\n\nPHP is a widely-used general-purpose scripting language that is especially suited for Web development and can be embedded into HTML.\n\n## Vulnerability description\n\nThe specialists of Positive Technologies have detected an \"XXE\" vulnerability in PHP.\n\nThe vulnerability was detected in the PHP's built-in SoapClient and SoapServer classes. PHP allows the use of external entities while parsing SOAP wsdl files which allows an attacker to read arbitrary files. If a web application unserializes user-supplied data and tries to execute any method of it, an attacker can send serialized SoapClient object initialized in non-wsdl mode which will make PHP to parse automatically remote XML-document specified in the \"location\" option parameter.\n\n## How to fix\n\nUpdate your software up to the latest version.\n\n## Advisory status\n\n07.02.2013 - Vendor gets vulnerability details \n14.03.2013 - Vendor releases fixed version and details \n19.03.2013 - Public disclosure\n\n## Credits\n\nThe vulnerability was discovered by Arseniy Reutov, Positive Research Center (Positive Technologies Company)\n\n## References\n\n<http://en.securitylab.ru/lab/PT-2013-14> \n\n\nReports on the vulnerabilities previously discovered by Positive Research:\n\n<http://ptsecurity.com/research/advisory/> \n<http://en.securitylab.ru/lab/>\n", "modified": "1970-01-01T00:00:00", "published": "2013-03-19T00:00:00", "id": "PT-2013-14", "href": "https://www.ptsecurity.com/ww-en/analytics/threatscape/pt-2013-14/", "type": "ptsecurity", "title": "PT-2013-14: XML External Entities Injection in PHP", "cvss": {}}], "debian": [{"lastseen": "2020-11-11T13:17:58", "bulletinFamily": "unix", "cvelist": ["CVE-2013-4248"], "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-2742-1 security@debian.org\nhttp://www.debian.org/security/ \nAugust 26, 2013 http://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : php5\nVulnerability : interpretation conflict\nProblem type : remote\nDebian-specific: no\nCVE ID : CVE-2013-4248\nDebian Bug : 719765\n\nIt was discovered that PHP, a general-purpose scripting language\ncommonly used for web application development, did not properly\nprocess embedded NUL characters in the subjectAltName extension of\nX.509 certificates. Depending on the application and with\ninsufficient CA-level checks, this could be abused for impersonating\nother users.\n\nFor the oldstable distribution (squeeze), this problem has been fixed in\nversion 5.3.3-7+squeeze17.\n\nFor the stable distribution (wheezy), this problem has been fixed in\nversion 5.4.4-14+deb7u4.\n\nFor the unstable distribution (sid), this problem has been fixed in\nversion 5.5.3+dfsg-1.\n\nWe recommend that you upgrade your php5 packages.\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: http://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n", "edition": 4, "modified": "2013-08-26T20:21:58", "published": "2013-08-26T20:21:58", "id": "DEBIAN:DSA-2742-1:FA4D7", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2013/msg00152.html", "title": "[SECURITY] [DSA 2742-1] php5 security update", "type": "debian", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2020-11-11T13:15:58", "bulletinFamily": "unix", "cvelist": ["CVE-2013-1643", "CVE-2013-1635"], "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-2639-1 security@debian.org\nhttp://www.debian.org/security/ Thijs Kinkhorst\nMarch 05, 2013 http://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : php5\nVulnerability : several\nProblem type : remote\nDebian-specific: no\nCVE ID : CVE-2013-1635 CVE-2013-1643\nDebian Bug : 702221\n\nSeveral vulnerabilities have been discovered in PHP, the web scripting\nlanguage. The Common Vulnerabilities and Exposures project identifies\nthe following issues:\n\nCVE-2013-1635\n\n If a PHP application accepted untrusted SOAP object input remotely\n from clients, an attacker could read system files readable for the\n webserver.\n\nCVE-2013-1643\n\n The soap.wsdl_cache_dir function did not take PHP open_basedir\n restrictions into account. Note that Debian advises against relying\n on open_basedir restrictions for security.\n\nFor the stable distribution (squeeze), these problems have been fixed in\nversion 5.3.3-7+squeeze15.\n\nFor the testing distribution (wheezy), these problems will be fixed soon.\n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 5.4.4-14.\n\nWe recommend that you upgrade your php5 packages.\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: http://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n", "edition": 3, "modified": "2013-03-05T17:23:09", "published": "2013-03-05T17:23:09", "id": "DEBIAN:DSA-2639-1:48C8A", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2013/msg00045.html", "title": "[SECURITY] [DSA 2639-1] php5 security update", "type": "debian", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-11-11T13:17:39", "bulletinFamily": "unix", "cvelist": ["CVE-2015-2348", "CVE-2015-2305", "CVE-2006-7243"], "description": "Package : php5\nVersion : 5.3.3.1-7+squeeze29\nCVE ID : CVE-2015-2305 CVE-2015-2348\n\nCVE-2015-2305\n Integer overflow in the regcomp implementation in the Henry\n Spencer BSD regex library (aka rxspencer) alpha3.8.g5 on\n 32-bit platforms, as used in NetBSD through 6.1.5 and other\n products, might allow context-dependent attackers to execute\n arbitrary code via a large regular expression that leads to\n a heap-based buffer overflow.\nCVE-2015-2348\n The move_uploaded_file implementation in\n ext/standard/basic_functions.c in PHP before 5.4.39, 5.5.x\n before 5.5.23, and 5.6.x before 5.6.7 truncates a pathname upon\n encountering a \\x00 character, which allows remote attackers to\n bypass intended extension restrictions and create files with\n unexpected names via a crafted second argument.\n NOTE: this vulnerability exists because of an incomplete fix for\n CVE-2006-7243.\nCVE-2016-tmp, Bug #71039\n exec functions ignore length but look for NULL termination\nCVE-2016-tmp, Bug #71089\n No check to duplicate zend_extension\nCVE-2016-tmp, Bug #71201\n round() segfault on 64-bit builds\nCVE-2016-tmp, Bug #71459\n Integer overflow in iptcembed()\nCVE-2016-tmp, Bug #71354\n Heap corruption in tar/zip/phar parser\nCVE-2016-tmp, Bug #71391\n NULL Pointer Dereference in phar_tar_setupmetadata()\nCVE-2016-tmp, Bug #70979\n Crash on bad SOAP request\n\n", "edition": 9, "modified": "2016-02-29T18:45:25", "published": "2016-02-29T18:45:25", "id": "DEBIAN:DLA-444-1:A9010", "href": "https://lists.debian.org/debian-lts-announce/2016/debian-lts-announce-201602/msg00035.html", "title": "[SECURITY] [DLA 444-1] php5 security update", "type": "debian", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "slackware": [{"lastseen": "2020-10-25T16:36:11", "bulletinFamily": "unix", "cvelist": ["CVE-2013-4248"], "description": "New php packages are available for Slackware 14.0, and -current to fix a\nsecurity issue.\n\n\nHere are the details from the Slackware 14.0 ChangeLog:\n\npatches/packages/php-5.4.19-i486-1_slack14.0.txz: Upgraded.\n Fixed handling null bytes in subjectAltName (CVE-2013-4248).\n For more information, see:\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4248\n (* Security fix *)\n\nWhere to find the new packages:\n\nThanks to the friendly folks at the OSU Open Source Lab\n(http://osuosl.org) for donating FTP and rsync hosting\nto the Slackware project! :-)\n\nAlso see the \"Get Slack\" section on http://slackware.com for\nadditional mirror sites near you.\n\nUpdated package for Slackware 14.0:\nftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/php-5.4.19-i486-1_slack14.0.txz\n\nUpdated package for Slackware x86_64 14.0:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/php-5.4.19-x86_64-1_slack14.0.txz\n\nUpdated package for Slackware -current:\nftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/php-5.4.19-i486-1.txz\n\nUpdated package for Slackware x86_64 -current:\nftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/php-5.4.19-x86_64-1.txz\n\n\nMD5 signatures:\n\nSlackware 14.0 package:\n36ea4e45512c962948deddf695238785 php-5.4.19-i486-1_slack14.0.txz\n\nSlackware x86_64 14.0 package:\n54fa9c4170edebe732c17a859c55c573 php-5.4.19-x86_64-1_slack14.0.txz\n\nSlackware -current package:\nb984f8b2323d962e2689485111040430 n/php-5.4.19-i486-1.txz\n\nSlackware x86_64 -current package:\nc3bb32c6ea600e5f0a44a927e03a7717 n/php-5.4.19-x86_64-1.txz\n\n\nInstallation instructions:\n\nUpgrade the package as root:\n > upgradepkg php-5.4.19-i486-1_slack14.0.txz\n\nThen, restart Apache httpd:\n > /etc/rc.d/rc.httpd stop\n > /etc/rc.d/rc.httpd start", "modified": "2013-08-30T07:46:30", "published": "2013-08-30T07:46:30", "id": "SSA-2013-242-02", "href": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.343027", "type": "slackware", "title": "[slackware-security] php", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2019-05-30T07:37:14", "bulletinFamily": "unix", "cvelist": ["CVE-2013-1643", "CVE-2013-1635"], "description": "New php packages are available for Slackware 12.1, 12.2, 13.0, 13.1, 13.37,\n14.0, and -current to fix security issues.\n\n\nHere are the details from the Slackware 14.0 ChangeLog:\n\npatches/packages/php-5.4.13-i486-1_slack14.0.txz: Upgraded.\n This release fixes two security issues in SOAP:\n Added check that soap.wsdl_cache_dir conforms to open_basedir.\n Disabled external entities loading.\n For more information, see:\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1635\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1643\n (* Security fix *)\n\nWhere to find the new packages:\n\nThanks to the friendly folks at the OSU Open Source Lab\n(http://osuosl.org) for donating FTP and rsync hosting\nto the Slackware project! :-)\n\nAlso see the "Get Slack" section on http://slackware.com for\nadditional mirror sites near you.\n\nUpdated package for Slackware 12.1:\nftp://ftp.slackware.com/pub/slackware/slackware-12.1/patches/packages/php-5.3.23-i486-1_slack12.1.tgz\n\nUpdated package for Slackware 12.2:\nftp://ftp.slackware.com/pub/slackware/slackware-12.2/patches/packages/php-5.3.23-i486-1_slack12.2.tgz\n\nUpdated package for Slackware 13.0:\nftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/php-5.3.23-i486-1_slack13.0.txz\n\nUpdated package for Slackware x86_64 13.0:\nftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/php-5.3.23-x86_64-1_slack13.0.txz\n\nUpdated package for Slackware 13.1:\nftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/php-5.3.23-i486-1_slack13.1.txz\n\nUpdated package for Slackware x86_64 13.1:\nftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/php-5.3.23-x86_64-1_slack13.1.txz\n\nUpdated package for Slackware 13.37:\nftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/php-5.3.23-i486-1_slack13.37.txz\n\nUpdated package for Slackware x86_64 13.37:\nftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/php-5.3.23-x86_64-1_slack13.37.txz\n\nUpdated package for Slackware 14.0:\nftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/php-5.4.13-i486-1_slack14.0.txz\n\nUpdated package for Slackware x86_64 14.0:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/php-5.4.13-x86_64-1_slack14.0.txz\n\nUpdated package for Slackware -current:\nftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/php-5.4.13-i486-1.txz\n\nUpdated package for Slackware x86_64 -current:\nftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/php-5.4.13-x86_64-1.txz\n\n\nMD5 signatures:\n\nSlackware 12.1 package:\n5a254080f3b91fbb01fc661e404dd2b1 php-5.3.23-i486-1_slack12.1.tgz\n\nSlackware 12.2 package:\n0ece3456a2122326af3988a2b43c3ee5 php-5.3.23-i486-1_slack12.2.tgz\n\nSlackware 13.0 package:\n8a086a3085e8e91db78c32248b90ce2e php-5.3.23-i486-1_slack13.0.txz\n\nSlackware x86_64 13.0 package:\n382222ce4f23f9edb0b26287ca061daa php-5.3.23-x86_64-1_slack13.0.txz\n\nSlackware 13.1 package:\n6213d2b220b363457b2a6e98c6f06115 php-5.3.23-i486-1_slack13.1.txz\n\nSlackware x86_64 13.1 package:\n83ae48d2683b4834a98f0fbaa4138727 php-5.3.23-x86_64-1_slack13.1.txz\n\nSlackware 13.37 package:\ne4a7db62a60324f925d72ab244817749 php-5.3.23-i486-1_slack13.37.txz\n\nSlackware x86_64 13.37 package:\n8b8325f537c7e30d6003e303aafce575 php-5.3.23-x86_64-1_slack13.37.txz\n\nSlackware 14.0 package:\n037eb3196eb7d2a031d85191eafce18e php-5.4.13-i486-1_slack14.0.txz\n\nSlackware x86_64 14.0 package:\ne74abaff1cb141954c31a5caad98723b php-5.4.13-x86_64-1_slack14.0.txz\n\nSlackware -current package:\n3434f4215098b47d258e715751a3d05c n/php-5.4.13-i486-1.txz\n\nSlackware x86_64 -current package:\n4f90538a3b6b326c28ffba02452e1cb3 n/php-5.4.13-x86_64-1.txz\n\n\nInstallation instructions:\n\nUpgrade the package as root:\n > upgradepkg php-5.4.13-i486-1_slack14.0.txz\n\nThen, restart Apache httpd:\n > /etc/rc.d/rc.httpd stop\n > /etc/rc.d/rc.httpd start", "modified": "2013-03-23T20:35:59", "published": "2013-03-23T20:35:59", "id": "SSA-2013-081-01", "href": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.506938", "type": "slackware", "title": "php", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "thn": [{"lastseen": "2018-01-27T09:18:08", "bulletinFamily": "info", "cvelist": ["CVE-2014-8686", "CVE-2006-7243"], "description": "[](<https://3.bp.blogspot.com/-aw3NxZqFGNM/VPL7dS6erzI/AAAAAAAAAqE/pfFvH6UnghM/s1600/Seagate-NAS-Vulnerability-Root-Access.png.jpg>)\n\n**Seagate**, a popular vendor of hardware solutions, has a critical zero-day vulnerability in its **_Network Attached Storage_** (NAS) device software that possibly left thousands of its users vulnerable to hackers.\n\n \n\n\nSeagate's **_Business Storage 2-Bay NAS product_**, found in home and business networks, is vulnerable to a zero-day **_Remote Code Execution_** vulnerability, currently affecting _more than 2,500 publicly exposed devices on the Internet._\n\n \n\n\nSeagate is one of the world\u2019s largest vendor of hardware solutions, with products available worldwide. After Western Digital, Seagate ranked second and holds 41% of the market worldwide in supplying storage hardware products. \n\n \n\n\nA security researcher, named **_OJ Reeves_**, [discovered](<https://beyondbinary.io/advisory/seagate-nas-rce/>) the zero-day remote code execution vulnerability on 7th October last year and, reported to the company totally in the white hat style. But even after 130 days of responsible disclosure, the zero-day bug remains unpatched till now.\n\n \n\n\nIn order to exploit the vulnerability, an attacker needs to be on the same network as the vulnerable device which gives the attacker root access of the vulnerable device, without the need of a valid login. Reeves also released a python exploit along with its Metasploit module version which is available on Github.\n\n \n\n\n**ORIGIN OF ZERO-DAY VULNERABILITY**\n\nSeagate's Business Storage 2-Bay NAS products come with a **_web-enabled management application _**that lets administrators to perform device configuration functions such as adding users, setting up access control, managing files, and more. \n\n \n\n\nThis web application is built with three core technologies, including _PHP version 5.2.13_, _CodeIgniter version 2.1.0 and Lighttpd version 1.4.28, _which are all out-dated versions.\n\n * **PHP version 5.2.13** is vulnerable _(CVE-2006-7243)_ that allows user-controlled data to prematurely terminate file paths, allowing for full control over the file extension.\n * **CodeIgniter version prior to 2.2.0** is vulnerable _(CVE-2014-8686)_ that allows an attacker to extract the encryption key and decrypt the content of the cookie. Once decrypted, attacker can modify the content of the cookie and re-encrypt it prior to submitting it back to the server.\n\nThe custom web application authenticate the login user based upon browser cookies, having three parameters:\n\n * **username**: logged in user name\n * **is_admin**: user is admin or not i.e. Yes or No\n * **language**: chosen language (eg. en_US)\n\nResearcher explained that there is no further validation of user credentials at server-end, once username cookie is established, which could be impersonated easily by an attacker.\n\n \n\n\nAnother parameter 'is_admin' can be manipulated to 'Yes' value that allows the attacker to self-elevate to administrative privileges in the web application itself.\n\n> _\"The fact that a static session encryption key is in use across all instances of the NAS means that once a user has a valid session cookie on one instance, they can apply that same cookie directly to another instance and acquire the same level of access. In short, once a user is logged in as admin on one instance, they\u2019re effectively admin on every instance,\"_ Reeves explained in an advisory.\n\nThe language parameter can be manipulated for exploitation of a local file inclusion vulnerability. At last, the web application is being executed by an instance of _Lighttpd_ which is running under the context of the root user.\n\n \n\n\nWhen an attacker makes a request with the manipulated cookie, it results in arbitrary code execution as root user. Therefore, successful exploitation of this vulnerability could result in taking complete control of the vulnerable device as a root user.\n\n \n\n\n**VULNERABLE PRODUCTS**\n\nTwo different network storage devices made by Seagate were tested and found to be vulnerable. The latest Seagate NAS firmware version listed below are affected by this zero-day vulnerability:\n\n * Business Storage 2-Bay NAS version 2014.00319\n * Business Storage 2-Bay NAS version 2013.60311\n\nHowever, Reeves believes that all versions of _Business Storage 2-Bay NAS product prior to 2014.00319 are affected_ by the same vulnerability.\n\n \n\n\n**METASPLOIT MODULE AVAILABLE**\n\nA [Metasploit module](<https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/seagate_nas_php_exec_noauth.rb>) and a [Python script](<https://www.exploit-db.com/exploits/36202/>) to exploit the vulnerability automatically is available on the Github. Each of these scripts are able to perform the following tasks:\n\n * Connects to the vulnerable NAS device and extracts a ci_session cookie.\n * Decrypts the cookie using the static encryption key and extracts the PHP hash.\n * Modifies the serialized PHP hash so that the username is set to 'admin' and the is_admin field is set to 'yes'.\n * Encrypts this updated PHP hash ready for further use as a ci_session cookie, which allows future requests to operate on the NAS as if they were an administrator.\n * Performs a request to extract the host configuration, which includes the device's description.\n * Modifies the host configuration so that the device description contains a small stager payload.\n * Performs a request to update the host configuration with the new data so that the stager payload is written to /etc/devicedesc.\n * Modifies the PHP hash again so that the language parameter contains the value ../../../../etc/devicedesc\\x00.\n * Encrypts this new PHP hash ready for future use as a ci_session cookie.\n * Performs a request to the NAS using the cookie created in the previous step, which invokes the stager that was written to disk. This request posts a larger payload which is written to disk under the web server root.\n * Performs another request which then resets the host configuration back to what it was prior to exploitation.\n\nAccording to Reeves, there was no updated firmware version available for download that contains patches for the issues, even after contacting the company multiple times. \n\n \n\n\nUsers of Seagate's Business Storage NAS products and and other products using vulnerable firmware are recommended to ensure that their devices are not accessible via the public Internet and that the devices be located behind a firewall configured to allow only a trusted set of IP addresses to connect to the web interface.\n", "modified": "2015-03-02T14:49:58", "published": "2015-03-01T00:50:00", "id": "THN:88621B70C7F5EC61ED5F438C1F1EF3E0", "href": "https://thehackernews.com/2015/03/seagate-nas-device-vulnerability.html", "type": "thn", "title": "Seagate NAS Zero-Day Vulnerability allows Unauthorized Root Access Remotely", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}}], "securityvulns": [{"lastseen": "2018-08-31T11:09:50", "bulletinFamily": "software", "cvelist": ["CVE-2013-1643", "CVE-2013-1635"], "description": "safe_dir protection bypass and code execution on SOAP handling.", "edition": 1, "modified": "2013-03-02T00:00:00", "published": "2013-03-02T00:00:00", "id": "SECURITYVULNS:VULN:12914", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:12914", "title": "PHP securiy vulnerabilities", "type": "securityvulns", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-08-31T11:10:47", "bulletinFamily": "software", "cvelist": ["CVE-2013-1643", "CVE-2013-1635"], "description": "\r\n\r\n-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA1\r\n\r\n _______________________________________________________________________\r\n\r\n Mandriva Linux Security Advisory MDVSA-2013:016\r\n http://www.mandriva.com/security/\r\n _______________________________________________________________________\r\n\r\n Package : php\r\n Date : February 28, 2013\r\n Affected: 2011., Enterprise Server 5.0\r\n _______________________________________________________________________\r\n\r\n Problem Description:\r\n\r\n Multiple vulnerabilities has been discovered and corrected in php:\r\n \r\n PHP does not validate the configration directive soap.wsdl_cache_dir\r\n before writing SOAP wsdl cache files to the filesystem. Thus an\r\n attacker is able to write remote wsdl files to arbitrary locations\r\n (CVE-2013-1635).\r\n \r\n PHP allows the use of external entities while parsing SOAP wsdl\r\n files which allows an attacker to read arbitrary files. If a web\r\n application unserializes user-supplied data and tries to execute\r\n any method of it, an attacker can send serialized SoapClient\r\n object initialized in non-wsdl mode which will make PHP to parse\r\n automatically remote XML-document specified in the location option\r\n parameter (CVE-2013-1643).\r\n \r\n The updated packages have been upgraded to the 5.3.22 version which\r\n is not vulnerable to these issues.\r\n \r\n Additionally, some packages which requires so has been rebuilt for\r\n php-5.3.22.\r\n _______________________________________________________________________\r\n\r\n References:\r\n\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1635\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1643\r\n http://www.php.net/ChangeLog-5.php#5.3.22\r\n _______________________________________________________________________\r\n\r\n Updated Packages:\r\n\r\n Mandriva Linux 2011:\r\n f69d05a19ec5eaa398d818721a186630 2011/i586/apache-mod_php-5.3.22-0.1-mdv2011.0.i586.rpm\r\n ad900ce0aa33702e3031d39fce41297b 2011/i586/libphp5_common5-5.3.22-0.2-mdv2011.0.i586.rpm\r\n cc011759af56549a4b6374b8752380ea 2011/i586/php-apc-3.1.13-0.3-mdv2011.0.i586.rpm\r\n 260a28abdc44d6acf2d6b129e9860550 2011/i586/php-apc-admin-3.1.13-0.3-mdv2011.0.i586.rpm\r\n 5b332d7361fcd9e3c14a40363c2afb2e 2011/i586/php-bcmath-5.3.22-0.2-mdv2011.0.i586.rpm\r\n d4c5af7eb12531c0741f6a0d73c44e89 2011/i586/php-bz2-5.3.22-0.2-mdv2011.0.i586.rpm\r\n b6b0718f1e66c804f9b077e4d72aae78 2011/i586/php-calendar-5.3.22-0.2-mdv2011.0.i586.rpm\r\n 10b08e967dc1fd0942313da596303ed1 2011/i586/php-cgi-5.3.22-0.2-mdv2011.0.i586.rpm\r\n f939991aaa9f494c8899abb52f46c9b8 2011/i586/php-cli-5.3.22-0.2-mdv2011.0.i586.rpm\r\n 2e35ec3ab98fdee52f87f0661719ca6d 2011/i586/php-ctype-5.3.22-0.2-mdv2011.0.i586.rpm\r\n b10ff94496036749256ecccda7d19512 2011/i586/php-curl-5.3.22-0.2-mdv2011.0.i586.rpm\r\n cc06631fb2c563724fdfd160c151ddcf 2011/i586/php-dba-5.3.22-0.2-mdv2011.0.i586.rpm\r\n a88bd2b28fe21a16b6843ab6c8896872 2011/i586/php-devel-5.3.22-0.2-mdv2011.0.i586.rpm\r\n e927741bdb01114ad4113cd1eb36b9d0 2011/i586/php-doc-5.3.22-0.2-mdv2011.0.i586.rpm\r\n c23305d750a0978574f863d157155500 2011/i586/php-dom-5.3.22-0.2-mdv2011.0.i586.rpm\r\n 6d4d8464c02f8832ffafa61eb9028703 2011/i586/php-eaccelerator-0.9.6.1-9.3-mdv2011.0.i586.rpm\r\n 06301696182dc2083c21a6ebaa4fa68e 2011/i586/php-eaccelerator-admin-0.9.6.1-9.3-mdv2011.0.i586.rpm\r\n b8ac830e6eb7601eea3fa6f9a116818d 2011/i586/php-enchant-5.3.22-0.2-mdv2011.0.i586.rpm\r\n ff2db0159b53895c1af118c42a49a1ba 2011/i586/php-exif-5.3.22-0.2-mdv2011.0.i586.rpm\r\n 624b5f5fd28226337c5470a09c4e7150 2011/i586/php-fileinfo-5.3.22-0.2-mdv2011.0.i586.rpm\r\n c0a49af3a664a28e590d20f2519ab901 2011/i586/php-filter-5.3.22-0.2-mdv2011.0.i586.rpm\r\n 49d517190404dd52d4357df96e61bd67 2011/i586/php-fpm-5.3.22-0.2-mdv2011.0.i586.rpm\r\n b983e73cd403b9ba8bbb97dff93c76e4 2011/i586/php-ftp-5.3.22-0.2-mdv2011.0.i586.rpm\r\n daa4d33a93ba99aa2e502d1e9a7c204f 2011/i586/php-gd-5.3.22-0.2-mdv2011.0.i586.rpm\r\n 0cfff3ff25cfa046ae203c3281adf32e 2011/i586/php-gettext-5.3.22-0.2-mdv2011.0.i586.rpm\r\n f9ab03f0799f20323da93c0df5f15fd4 2011/i586/php-gmp-5.3.22-0.2-mdv2011.0.i586.rpm\r\n 3592ab766f43e04715b7b3bf774af5b9 2011/i586/php-hash-5.3.22-0.2-mdv2011.0.i586.rpm\r\n ddc4028e7e1c613039445a65287c7c6b 2011/i586/php-iconv-5.3.22-0.2-mdv2011.0.i586.rpm\r\n 8a575d6e63e9b96c2cc8b5911095cece 2011/i586/php-imap-5.3.22-0.2-mdv2011.0.i586.rpm\r\n d77b195b10db45cf6a6bac6b87851958 2011/i586/php-ini-5.3.22-0.1-mdv2011.0.i586.rpm\r\n 0941d82cff92637fff23abf55c7abd34 2011/i586/php-intl-5.3.22-0.2-mdv2011.0.i586.rpm\r\n 9c6c56232481a5eac01f3cff2a7257d5 2011/i586/php-json-5.3.22-0.2-mdv2011.0.i586.rpm\r\n 8712283f566a705a1a70e1c2680dfe63 2011/i586/php-ldap-5.3.22-0.2-mdv2011.0.i586.rpm\r\n 2fdaf2e8e0a6ecb675c77d63a1b4fabb 2011/i586/php-mbstring-5.3.22-0.2-mdv2011.0.i586.rpm\r\n 66633f21f3742734d97bf6c47133b680 2011/i586/php-mcrypt-5.3.22-0.2-mdv2011.0.i586.rpm\r\n 1e5c2594fa7c02c9e30337e1bb1cd6ce 2011/i586/php-mssql-5.3.22-0.2-mdv2011.0.i586.rpm\r\n abdd2efc219887ac2b2bb00bc311973d 2011/i586/php-mysql-5.3.22-0.2-mdv2011.0.i586.rpm\r\n 38e85b194dfe00e689d5cb8a348600b4 2011/i586/php-mysqli-5.3.22-0.2-mdv2011.0.i586.rpm\r\n c17c7560b86672287a2db40b51bc9540 2011/i586/php-mysqlnd-5.3.22-0.2-mdv2011.0.i586.rpm\r\n fe8f8a0abcb9b900a3dd08f582df43e9 2011/i586/php-odbc-5.3.22-0.2-mdv2011.0.i586.rpm\r\n 9211009bbc6b008e3796df07c71c2fcd 2011/i586/php-openssl-5.3.22-0.2-mdv2011.0.i586.rpm\r\n daf023a003b9cf99738216095b9ccd41 2011/i586/php-pcntl-5.3.22-0.2-mdv2011.0.i586.rpm\r\n 2369f78faf7afd93625a86c8a96225f2 2011/i586/php-pdo-5.3.22-0.2-mdv2011.0.i586.rpm\r\n d533a7c9f0b1ef80f4d43ac1bdadfe25 2011/i586/php-pdo_dblib-5.3.22-0.2-mdv2011.0.i586.rpm\r\n e7c69ef8b4cf461f14d955fea2f895c2 2011/i586/php-pdo_mysql-5.3.22-0.2-mdv2011.0.i586.rpm\r\n 7dc040a0e4b1e7f79d58e58fed4045fd 2011/i586/php-pdo_odbc-5.3.22-0.2-mdv2011.0.i586.rpm\r\n 4c69d926eb68eb9056034df53d1a2c25 2011/i586/php-pdo_pgsql-5.3.22-0.2-mdv2011.0.i586.rpm\r\n 02ca5bbaa0051b967d06168bb9c0bb54 2011/i586/php-pdo_sqlite-5.3.22-0.2-mdv2011.0.i586.rpm\r\n 0d5340ca6074c46cca5f011a0ea8c742 2011/i586/php-pgsql-5.3.22-0.2-mdv2011.0.i586.rpm\r\n b82b35f141b3f0b58a6b46840012f1f0 2011/i586/php-phar-5.3.22-0.2-mdv2011.0.i586.rpm\r\n 7def713b6763294587c29a544a007274 2011/i586/php-posix-5.3.22-0.2-mdv2011.0.i586.rpm\r\n a54ec77ef933c70e13aff174d281c07a 2011/i586/php-pspell-5.3.22-0.2-mdv2011.0.i586.rpm\r\n 763d29290791a2b82e343c9b8603c466 2011/i586/php-readline-5.3.22-0.2-mdv2011.0.i586.rpm\r\n 6aec9d1ec95da506cfae3516a5f70d24 2011/i586/php-recode-5.3.22-0.2-mdv2011.0.i586.rpm\r\n ac56113ee3eb3e43e871c65ef6ee79be 2011/i586/php-session-5.3.22-0.2-mdv2011.0.i586.rpm\r\n 38a8c9117029f34f6e8a402dfd0645c8 2011/i586/php-shmop-5.3.22-0.2-mdv2011.0.i586.rpm\r\n b1b49a2dbe953d0cc1d08b02700e3525 2011/i586/php-snmp-5.3.22-0.2-mdv2011.0.i586.rpm\r\n ad4a5fc74fd5b385979a7d08f8aef547 2011/i586/php-soap-5.3.22-0.2-mdv2011.0.i586.rpm\r\n c40e31fc469c718ad2eded39927879a3 2011/i586/php-sockets-5.3.22-0.2-mdv2011.0.i586.rpm\r\n 4ae9488749478498d84a4a3224e6985b 2011/i586/php-sqlite3-5.3.22-0.2-mdv2011.0.i586.rpm\r\n 777fc07bba4ecf9c7c49261ad1759d39 2011/i586/php-sqlite-5.3.22-0.2-mdv2011.0.i586.rpm\r\n a71f0fc995a38f3c8ca39958625f35b0 2011/i586/php-sybase_ct-5.3.22-0.2-mdv2011.0.i586.rpm\r\n d8961a58fedc111d88973474470b56c4 2011/i586/php-sysvmsg-5.3.22-0.2-mdv2011.0.i586.rpm\r\n c7164d8738e23ab8f686282c72f7b7d9 2011/i586/php-sysvsem-5.3.22-0.2-mdv2011.0.i586.rpm\r\n a07d1a8e54b47dba1c032c00c4312ee8 2011/i586/php-sysvshm-5.3.22-0.2-mdv2011.0.i586.rpm\r\n 66508bdd8960fcea15d5e8d1d2009ab9 2011/i586/php-tidy-5.3.22-0.2-mdv2011.0.i586.rpm\r\n 0cda150633a208bb587c186f3cde69af 2011/i586/php-tokenizer-5.3.22-0.2-mdv2011.0.i586.rpm\r\n bfb2e4f133124463415d8faf2ea59e74 2011/i586/php-wddx-5.3.22-0.2-mdv2011.0.i586.rpm\r\n 7bdef4fcd42d2b08d07b7654a87ab5c5 2011/i586/php-xml-5.3.22-0.2-mdv2011.0.i586.rpm\r\n e305c4f15488218d84d6fa71c9acb607 2011/i586/php-xmlreader-5.3.22-0.2-mdv2011.0.i586.rpm\r\n 6d55c7a844fc758af0705a044fc98d8d 2011/i586/php-xmlrpc-5.3.22-0.2-mdv2011.0.i586.rpm\r\n 628ae4eb99dd3af170021f896684dd89 2011/i586/php-xmlwriter-5.3.22-0.2-mdv2011.0.i586.rpm\r\n cda875efe8e5a86ddceff3c86da5fdbf 2011/i586/php-xsl-5.3.22-0.2-mdv2011.0.i586.rpm\r\n 8b58d6ddb7458f7291490141d6f421c1 2011/i586/php-zip-5.3.22-0.2-mdv2011.0.i586.rpm\r\n ff51505022b81cf374a1a9accadc5aec 2011/i586/php-zlib-5.3.22-0.2-mdv2011.0.i586.rpm \r\n 9ce9feb5c894c51f5bbc1556c9a0ea30 2011/SRPMS/apache-mod_php-5.3.22-0.1.src.rpm\r\n 95d732236971a14264940d3a5a4a92fb 2011/SRPMS/php-5.3.22-0.2.src.rpm\r\n 3077264a6016ddde295ae023e4999d15 2011/SRPMS/php-apc-3.1.13-0.3.src.rpm\r\n e68339b97a871231997081ce01afb6ae 2011/SRPMS/php-eaccelerator-0.9.6.1-9.3.src.rpm\r\n 59cd67c3a6f48ba20925fccba920dd98 2011/SRPMS/php-ini-5.3.22-0.1.src.rpm\r\n\r\n Mandriva Linux 2011/X86_64:\r\n 0f15dc25e5b9a9675c805037dc3fbb99 2011/x86_64/apache-mod_php-5.3.22-0.1-mdv2011.0.x86_64.rpm\r\n e5f25d7b68b02ceae8f9cbf1b3016034 2011/x86_64/lib64php5_common5-5.3.22-0.2-mdv2011.0.x86_64.rpm\r\n 70e9d4554ba5f0a7ac83f7df27e8b25e 2011/x86_64/php-apc-3.1.13-0.3-mdv2011.0.x86_64.rpm\r\n 637081bbd6c7b4f63f9706181aaac998 2011/x86_64/php-apc-admin-3.1.13-0.3-mdv2011.0.x86_64.rpm\r\n b28be058a2a74d7a7afe584dbc6652e2 2011/x86_64/php-bcmath-5.3.22-0.2-mdv2011.0.x86_64.rpm\r\n 484248677ea5852ebe418338d01e045f 2011/x86_64/php-bz2-5.3.22-0.2-mdv2011.0.x86_64.rpm\r\n 7b27c77a614dba8a50105b5874a79e86 2011/x86_64/php-calendar-5.3.22-0.2-mdv2011.0.x86_64.rpm\r\n b792ca06860858f35895e27898ca359c 2011/x86_64/php-cgi-5.3.22-0.2-mdv2011.0.x86_64.rpm\r\n a724fec5e872171c7967c602338e38d0 2011/x86_64/php-cli-5.3.22-0.2-mdv2011.0.x86_64.rpm\r\n 7cb3b2194b4fd91bd44dd400abb3f48e 2011/x86_64/php-ctype-5.3.22-0.2-mdv2011.0.x86_64.rpm\r\n 41dacec44404e6abdba3ba78f6a6ea97 2011/x86_64/php-curl-5.3.22-0.2-mdv2011.0.x86_64.rpm\r\n cb75f8f7d0617a900682b82b65ac3df4 2011/x86_64/php-dba-5.3.22-0.2-mdv2011.0.x86_64.rpm\r\n 79f1473f2faac2f1156d44b014e865bb 2011/x86_64/php-devel-5.3.22-0.2-mdv2011.0.x86_64.rpm\r\n e5e1d7f367920b222b32a88939ca1788 2011/x86_64/php-doc-5.3.22-0.2-mdv2011.0.x86_64.rpm\r\n d685678e3f7d4137c83c014d350dc0ba 2011/x86_64/php-dom-5.3.22-0.2-mdv2011.0.x86_64.rpm\r\n 80b4ed12b059bc1c1750de8429740d11 2011/x86_64/php-eaccelerator-0.9.6.1-9.3-mdv2011.0.x86_64.rpm\r\n 2a940e4d854b32749e06dbbd5316949e 2011/x86_64/php-eaccelerator-admin-0.9.6.1-9.3-mdv2011.0.x86_64.rpm\r\n 3a38efc38290e56e8cae0a38ca63d092 2011/x86_64/php-enchant-5.3.22-0.2-mdv2011.0.x86_64.rpm\r\n 69ce119f2fe0a07d46cc314f17fa26f9 2011/x86_64/php-exif-5.3.22-0.2-mdv2011.0.x86_64.rpm\r\n 9539992f1a27cd619dd754543c89b572 2011/x86_64/php-fileinfo-5.3.22-0.2-mdv2011.0.x86_64.rpm\r\n f3352204aa6365e8d5dccd91b9e9882a 2011/x86_64/php-filter-5.3.22-0.2-mdv2011.0.x86_64.rpm\r\n 165917a6ecffb3c96c73dba3fbccb894 2011/x86_64/php-fpm-5.3.22-0.2-mdv2011.0.x86_64.rpm\r\n 2edba81517dac7a1cc5cc3b22c1f23ae 2011/x86_64/php-ftp-5.3.22-0.2-mdv2011.0.x86_64.rpm\r\n ff082f666254c3a4b1a2e82c541f8ba9 2011/x86_64/php-gd-5.3.22-0.2-mdv2011.0.x86_64.rpm\r\n ad04758acf86f1f8be8296a10dc99131 2011/x86_64/php-gettext-5.3.22-0.2-mdv2011.0.x86_64.rpm\r\n 54819d5170ebb126a3ba7c7d79063331 2011/x86_64/php-gmp-5.3.22-0.2-mdv2011.0.x86_64.rpm\r\n 43b4df1e333c2906a7eda9e032eacb3d 2011/x86_64/php-hash-5.3.22-0.2-mdv2011.0.x86_64.rpm\r\n c1eef3069b06050b5ecd165b8d4b73fe 2011/x86_64/php-iconv-5.3.22-0.2-mdv2011.0.x86_64.rpm\r\n 1e7ef4a4d06e639633f78d60ec65e6a1 2011/x86_64/php-imap-5.3.22-0.2-mdv2011.0.x86_64.rpm\r\n 1b84e3dd3d7a31d6e5eead399545b764 2011/x86_64/php-ini-5.3.22-0.1-mdv2011.0.x86_64.rpm\r\n ac16be8cdf2492107accdf57649c347f 2011/x86_64/php-intl-5.3.22-0.2-mdv2011.0.x86_64.rpm\r\n 952deba31120d5d947bd350c1b7c4ec8 2011/x86_64/php-json-5.3.22-0.2-mdv2011.0.x86_64.rpm\r\n b2b17ef217466fd7878c5a18748f9cdb 2011/x86_64/php-ldap-5.3.22-0.2-mdv2011.0.x86_64.rpm\r\n b2ea465ca34806219cd0bdba134456ff 2011/x86_64/php-mbstring-5.3.22-0.2-mdv2011.0.x86_64.rpm\r\n 77d53f0f347f98a4fea6a17f41d7562d 2011/x86_64/php-mcrypt-5.3.22-0.2-mdv2011.0.x86_64.rpm\r\n 1db901e1838f516cf4d7e2f7881ded95 2011/x86_64/php-mssql-5.3.22-0.2-mdv2011.0.x86_64.rpm\r\n a7b067fc68d812109aba7ec1f649b7c5 2011/x86_64/php-mysql-5.3.22-0.2-mdv2011.0.x86_64.rpm\r\n 08e644c003b1d456490ab0ea4df9144b 2011/x86_64/php-mysqli-5.3.22-0.2-mdv2011.0.x86_64.rpm\r\n 152a8830b5c6f3ebf84a89651d9e6b75 2011/x86_64/php-mysqlnd-5.3.22-0.2-mdv2011.0.x86_64.rpm\r\n 711f8e490bed2c96d6c4831fa6233f9d 2011/x86_64/php-odbc-5.3.22-0.2-mdv2011.0.x86_64.rpm\r\n c8fbaf088994b397f3a3c3291ebcda0b 2011/x86_64/php-openssl-5.3.22-0.2-mdv2011.0.x86_64.rpm\r\n 77fede4bf8987d166a643dec61ceb29e 2011/x86_64/php-pcntl-5.3.22-0.2-mdv2011.0.x86_64.rpm\r\n 82557f0f20a25fc705cfea4d09d63e2e 2011/x86_64/php-pdo-5.3.22-0.2-mdv2011.0.x86_64.rpm\r\n 64777d8a80d646e45736035e485a9ff2 2011/x86_64/php-pdo_dblib-5.3.22-0.2-mdv2011.0.x86_64.rpm\r\n 6911d84d82756bf12230ac6fe90b03cb 2011/x86_64/php-pdo_mysql-5.3.22-0.2-mdv2011.0.x86_64.rpm\r\n 4eb4695181ebb037123c00c1fda70c20 2011/x86_64/php-pdo_odbc-5.3.22-0.2-mdv2011.0.x86_64.rpm\r\n 144ae099b80379143d7e7b1bca3cd84d 2011/x86_64/php-pdo_pgsql-5.3.22-0.2-mdv2011.0.x86_64.rpm\r\n 47ca1fa4b49223ad64b4ce4a00c77224 2011/x86_64/php-pdo_sqlite-5.3.22-0.2-mdv2011.0.x86_64.rpm\r\n f68f7aaef72fd3c1cb6da7c385143ddc 2011/x86_64/php-pgsql-5.3.22-0.2-mdv2011.0.x86_64.rpm\r\n 53184743e28624436b76326702248df5 2011/x86_64/php-phar-5.3.22-0.2-mdv2011.0.x86_64.rpm\r\n c621b4c9e8c80442105627d32bff4d3d 2011/x86_64/php-posix-5.3.22-0.2-mdv2011.0.x86_64.rpm\r\n e4f98ea7cd14eafdfabcfb67d31a53ec 2011/x86_64/php-pspell-5.3.22-0.2-mdv2011.0.x86_64.rpm\r\n f0211ea0f77497dad5c7a7fe9218bcd9 2011/x86_64/php-readline-5.3.22-0.2-mdv2011.0.x86_64.rpm\r\n 3c5a3d971a7ccdf04540273f87c0332a 2011/x86_64/php-recode-5.3.22-0.2-mdv2011.0.x86_64.rpm\r\n 601fc5ec003e26178a63c677f4143272 2011/x86_64/php-session-5.3.22-0.2-mdv2011.0.x86_64.rpm\r\n d673485d7a0be7e38c23dc3b24e19747 2011/x86_64/php-shmop-5.3.22-0.2-mdv2011.0.x86_64.rpm\r\n df26a7b10eb2fc5c30003f217c45c452 2011/x86_64/php-snmp-5.3.22-0.2-mdv2011.0.x86_64.rpm\r\n e95a96d2417130e2365d1a50681e6485 2011/x86_64/php-soap-5.3.22-0.2-mdv2011.0.x86_64.rpm\r\n 47bb1ab436e82a63dc6a650b631c3811 2011/x86_64/php-sockets-5.3.22-0.2-mdv2011.0.x86_64.rpm\r\n 7dfb597825c15ca08e6e14250a1a1d6f 2011/x86_64/php-sqlite3-5.3.22-0.2-mdv2011.0.x86_64.rpm\r\n 1ad6a3dadbfeb7737aca37668a85b3e2 2011/x86_64/php-sqlite-5.3.22-0.2-mdv2011.0.x86_64.rpm\r\n e526ff0b35d2301e9d92368b3dcba3ff 2011/x86_64/php-sybase_ct-5.3.22-0.2-mdv2011.0.x86_64.rpm\r\n 9de5ca15dcb44227b18e4eeda8c19f70 2011/x86_64/php-sysvmsg-5.3.22-0.2-mdv2011.0.x86_64.rpm\r\n d977fa300e4c8a9c8466598dcf21607b 2011/x86_64/php-sysvsem-5.3.22-0.2-mdv2011.0.x86_64.rpm\r\n 9613d6a9b6e9845acce87d0611b3fd01 2011/x86_64/php-sysvshm-5.3.22-0.2-mdv2011.0.x86_64.rpm\r\n d6a3cc136c70781ab0e0003651b2619d 2011/x86_64/php-tidy-5.3.22-0.2-mdv2011.0.x86_64.rpm\r\n ab19d8f6007006da09eae3b40ad04e26 2011/x86_64/php-tokenizer-5.3.22-0.2-mdv2011.0.x86_64.rpm\r\n 4e5cdf9520f442bb6eca212aaa37a24d 2011/x86_64/php-wddx-5.3.22-0.2-mdv2011.0.x86_64.rpm\r\n e5231ee1989e22c7cc05a8746af1d750 2011/x86_64/php-xml-5.3.22-0.2-mdv2011.0.x86_64.rpm\r\n 98d999c2af7024c70993841ae67adb17 2011/x86_64/php-xmlreader-5.3.22-0.2-mdv2011.0.x86_64.rpm\r\n da4609bf645d04b415e88df6bfbcef9f 2011/x86_64/php-xmlrpc-5.3.22-0.2-mdv2011.0.x86_64.rpm\r\n 40a4dbb5e3dca4660bfc84c4a2badd4f 2011/x86_64/php-xmlwriter-5.3.22-0.2-mdv2011.0.x86_64.rpm\r\n 38172302db8f152221ee4aab8c8d672a 2011/x86_64/php-xsl-5.3.22-0.2-mdv2011.0.x86_64.rpm\r\n 867540da740fb7d16a31f0e73ff1c26e 2011/x86_64/php-zip-5.3.22-0.2-mdv2011.0.x86_64.rpm\r\n bd954204a3d96576fb391fcbcee9a128 2011/x86_64/php-zlib-5.3.22-0.2-mdv2011.0.x86_64.rpm \r\n 9ce9feb5c894c51f5bbc1556c9a0ea30 2011/SRPMS/apache-mod_php-5.3.22-0.1.src.rpm\r\n 95d732236971a14264940d3a5a4a92fb 2011/SRPMS/php-5.3.22-0.2.src.rpm\r\n 3077264a6016ddde295ae023e4999d15 2011/SRPMS/php-apc-3.1.13-0.3.src.rpm\r\n e68339b97a871231997081ce01afb6ae 2011/SRPMS/php-eaccelerator-0.9.6.1-9.3.src.rpm\r\n 59cd67c3a6f48ba20925fccba920dd98 2011/SRPMS/php-ini-5.3.22-0.1.src.rpm\r\n\r\n Mandriva Enterprise Server 5:\r\n ec3a25a501100880041314e346bd9b84 mes5/i586/apache-mod_php-5.3.22-0.1mdvmes5.2.i586.rpm\r\n 79b1ff7fd7e3c55531029cc00d113d17 mes5/i586/libphp5_common5-5.3.22-0.2mdvmes5.2.i586.rpm\r\n dbb83ff7cfce35487098189b071c33a6 mes5/i586/php-apc-3.1.13-0.3mdvmes5.2.i586.rpm\r\n 7de47e5fb8605984a1d7a1eca0686c79 mes5/i586/php-apc-admin-3.1.13-0.3mdvmes5.2.i586.rpm\r\n 392b47da2a81829a07aaf9efecba993b mes5/i586/php-bcmath-5.3.22-0.2mdvmes5.2.i586.rpm\r\n b38a762b1e277852126f14163c0da929 mes5/i586/php-bz2-5.3.22-0.2mdvmes5.2.i586.rpm\r\n 278221be9a221fedd7dabc0c3e4ba741 mes5/i586/php-calendar-5.3.22-0.2mdvmes5.2.i586.rpm\r\n fa1c5929ceb4e6405f98e244380557ff mes5/i586/php-cgi-5.3.22-0.2mdvmes5.2.i586.rpm\r\n 002d964454c364c11d85d572f3b21d45 mes5/i586/php-cli-5.3.22-0.2mdvmes5.2.i586.rpm\r\n 4a4d757b9dfe9ae679df2e04bf812213 mes5/i586/php-ctype-5.3.22-0.2mdvmes5.2.i586.rpm\r\n 80f6348c08b6e806a3162b1e3860f6a1 mes5/i586/php-curl-5.3.22-0.2mdvmes5.2.i586.rpm\r\n 25aa26c0b7839853498fe9f73a9363a2 mes5/i586/php-dba-5.3.22-0.2mdvmes5.2.i586.rpm\r\n 502716b95981de5e6e327c803490ba52 mes5/i586/php-devel-5.3.22-0.2mdvmes5.2.i586.rpm\r\n da02dbd06a190b5c938de4b29a9e4d25 mes5/i586/php-doc-5.3.22-0.2mdvmes5.2.i586.rpm\r\n ccd1f56111f3123ed38e0ec12230ebf4 mes5/i586/php-dom-5.3.22-0.2mdvmes5.2.i586.rpm\r\n 05299319b5b838634b2aaa54f6b32bbe mes5/i586/php-eaccelerator-0.9.6.1-0.9mdvmes5.2.i586.rpm\r\n dcea1d1f9d2538ebe8c9fb7b945a525a mes5/i586/php-eaccelerator-admin-0.9.6.1-0.9mdvmes5.2.i586.rpm\r\n 2ff330998bff90bd5bd66bd0b9887ccd mes5/i586/php-enchant-5.3.22-0.2mdvmes5.2.i586.rpm\r\n fb58060613dc7526ccca1c62c7aadd10 mes5/i586/php-exif-5.3.22-0.2mdvmes5.2.i586.rpm\r\n a46d7a091bc3b71c10970b7b2621559d mes5/i586/php-fileinfo-5.3.22-0.2mdvmes5.2.i586.rpm\r\n f17049108fbf57b12a4f055d46fcfe67 mes5/i586/php-filter-5.3.22-0.2mdvmes5.2.i586.rpm\r\n f7347ab9b44bd025ffc81b071fcf2f18 mes5/i586/php-fpm-5.3.22-0.2mdvmes5.2.i586.rpm\r\n cca1cb1d5d28c1047269d9602beb3aa1 mes5/i586/php-ftp-5.3.22-0.2mdvmes5.2.i586.rpm\r\n 9364073474063e83fd281048af52f667 mes5/i586/php-gd-5.3.22-0.2mdvmes5.2.i586.rpm\r\n ffaf6c253a48c96d29ddb1b91644eb4c mes5/i586/php-gd-bundled-5.3.22-0.1mdvmes5.2.i586.rpm\r\n faa62bee517732186e30b45e3fafe457 mes5/i586/php-gettext-5.3.22-0.2mdvmes5.2.i586.rpm\r\n ab893bbcc3de64f35ecdd6f478f97d7e mes5/i586/php-gmp-5.3.22-0.2mdvmes5.2.i586.rpm\r\n 7e7b54dc9964a878c47063e4b7b27c05 mes5/i586/php-hash-5.3.22-0.2mdvmes5.2.i586.rpm\r\n fc9adcc0dd1a37170924b01bb7fde64f mes5/i586/php-iconv-5.3.22-0.2mdvmes5.2.i586.rpm\r\n cd70b0324c2d46414808ef7f4f206f75 mes5/i586/php-imap-5.3.22-0.2mdvmes5.2.i586.rpm\r\n 766644e644be81b92e72cb6bfa0bb62e mes5/i586/php-ini-5.3.22-0.1mdvmes5.2.i586.rpm\r\n d40e2280c95602e82cd4339fb91d761c mes5/i586/php-intl-5.3.22-0.2mdvmes5.2.i586.rpm\r\n 3d0e17b42642e079296deb08cafe2743 mes5/i586/php-json-5.3.22-0.2mdvmes5.2.i586.rpm\r\n 384b6e581b3ad4b8790610f5b9a0db16 mes5/i586/php-ldap-5.3.22-0.2mdvmes5.2.i586.rpm\r\n e91c064c1c68ae0d0488a65ae74b7736 mes5/i586/php-mbstring-5.3.22-0.2mdvmes5.2.i586.rpm\r\n 794e71df19ad183de0f1c2219fee2aa2 mes5/i586/php-mcrypt-5.3.22-0.2mdvmes5.2.i586.rpm\r\n 3eef4dd7ab0d68f6138e4cfbba952d90 mes5/i586/php-mssql-5.3.22-0.2mdvmes5.2.i586.rpm\r\n ed77ca254e17ed6033c09d7e2238d87f mes5/i586/php-mysql-5.3.22-0.2mdvmes5.2.i586.rpm\r\n 3054c66045442d2b0d3671c8cca84b34 mes5/i586/php-mysqli-5.3.22-0.2mdvmes5.2.i586.rpm\r\n 979cc7e9da31267c1c729b20d88005c1 mes5/i586/php-mysqlnd-5.3.22-0.2mdvmes5.2.i586.rpm\r\n 704684b3c899b393e2995816148a2e2a mes5/i586/php-odbc-5.3.22-0.2mdvmes5.2.i586.rpm\r\n 2693f560961f9718a09493a58aad1233 mes5/i586/php-openssl-5.3.22-0.2mdvmes5.2.i586.rpm\r\n 58d42cd007a8d7039b3589a8847fe9aa mes5/i586/php-pcntl-5.3.22-0.2mdvmes5.2.i586.rpm\r\n 2e96125230cd2bd488c43c4896e826f3 mes5/i586/php-pdo-5.3.22-0.2mdvmes5.2.i586.rpm\r\n fcbf6c31ad42a052f895e72e06e3b056 mes5/i586/php-pdo_dblib-5.3.22-0.2mdvmes5.2.i586.rpm\r\n 74b24be17b3ad7e118f0529239e2a629 mes5/i586/php-pdo_mysql-5.3.22-0.2mdvmes5.2.i586.rpm\r\n d0b70a43102f82bc93dfa094566660b2 mes5/i586/php-pdo_odbc-5.3.22-0.2mdvmes5.2.i586.rpm\r\n 2255bb30e1e8bc254ae7c7265dd46a5b mes5/i586/php-pdo_pgsql-5.3.22-0.2mdvmes5.2.i586.rpm\r\n b7c2a9a471da76f52f227640247c062e mes5/i586/php-pdo_sqlite-5.3.22-0.2mdvmes5.2.i586.rpm\r\n c85e2d3944baf7454546e23df82d4bcc mes5/i586/php-pgsql-5.3.22-0.2mdvmes5.2.i586.rpm\r\n ee251d55e9e1cbdbd2d2604a6e22c564 mes5/i586/php-phar-5.3.22-0.2mdvmes5.2.i586.rpm\r\n 0b609e2259072f9c2205977eda552fe2 mes5/i586/php-posix-5.3.22-0.2mdvmes5.2.i586.rpm\r\n 5e048d2cb4484aa0b41c0f100f6ed19a mes5/i586/php-pspell-5.3.22-0.2mdvmes5.2.i586.rpm\r\n 5dc8c7bc33e909f46b875a009b3672f4 mes5/i586/php-readline-5.3.22-0.2mdvmes5.2.i586.rpm\r\n 228d4f68aa7e40c25454963fce68de2c mes5/i586/php-recode-5.3.22-0.2mdvmes5.2.i586.rpm\r\n 6bd85404a6e22d30abfff7192c874fcb mes5/i586/php-session-5.3.22-0.2mdvmes5.2.i586.rpm\r\n 64c9853bf96109cb8ef388342cd1bc80 mes5/i586/php-shmop-5.3.22-0.2mdvmes5.2.i586.rpm\r\n 45b56031cf43d5c5d35c665bd9002e62 mes5/i586/php-snmp-5.3.22-0.2mdvmes5.2.i586.rpm\r\n 90f853d7d6275723e725f290d14b53de mes5/i586/php-soap-5.3.22-0.2mdvmes5.2.i586.rpm\r\n f0c26d1a47043ff953930027b74f2649 mes5/i586/php-sockets-5.3.22-0.2mdvmes5.2.i586.rpm\r\n 5f8270397162c7dd4d2f9afb7c42b399 mes5/i586/php-sqlite3-5.3.22-0.2mdvmes5.2.i586.rpm\r\n c5c30e0ea471cee791c6dc5c4300210a mes5/i586/php-sqlite-5.3.22-0.2mdvmes5.2.i586.rpm\r\n c7ccbcb3b9e3694c5e13c9b76de15947 mes5/i586/php-sybase_ct-5.3.22-0.2mdvmes5.2.i586.rpm\r\n 01a5c337a55c5d2d4361b8dba6ee867b mes5/i586/php-sysvmsg-5.3.22-0.2mdvmes5.2.i586.rpm\r\n 220c6158da75631518d0d92cd5009ba0 mes5/i586/php-sysvsem-5.3.22-0.2mdvmes5.2.i586.rpm\r\n bde57e471734fa8ebbd8e8cbd372fc8d mes5/i586/php-sysvshm-5.3.22-0.2mdvmes5.2.i586.rpm\r\n 0779c4b7ce0106f262aeb73265cac93f mes5/i586/php-tidy-5.3.22-0.2mdvmes5.2.i586.rpm\r\n e339bee5073f24eaec8d42a6cc270097 mes5/i586/php-tokenizer-5.3.22-0.2mdvmes5.2.i586.rpm\r\n d98a1a0fd1e11a897b8f84c7a072116a mes5/i586/php-wddx-5.3.22-0.2mdvmes5.2.i586.rpm\r\n 2f30f4540d31dfbadf296e5c1dea7a49 mes5/i586/php-xml-5.3.22-0.2mdvmes5.2.i586.rpm\r\n bb8aa6a70a418004d92d189bcff5fbba mes5/i586/php-xmlreader-5.3.22-0.2mdvmes5.2.i586.rpm\r\n abacd3597634a4da995710dd8c2b1a95 mes5/i586/php-xmlrpc-5.3.22-0.2mdvmes5.2.i586.rpm\r\n d097c1dc35936a366e1f27d9182c3f3c mes5/i586/php-xmlwriter-5.3.22-0.2mdvmes5.2.i586.rpm\r\n 43629296db8e70b172324a177c73fa72 mes5/i586/php-xsl-5.3.22-0.2mdvmes5.2.i586.rpm\r\n d9b99148f3d6baf02d9b94abd0d9ed1d mes5/i586/php-zip-5.3.22-0.2mdvmes5.2.i586.rpm\r\n 0bb6f84dcfd3f650c6fb4fa9cd72ccf1 mes5/i586/php-zlib-5.3.22-0.2mdvmes5.2.i586.rpm \r\n 1d2010c0a7429d421662dd155b3adf7d mes5/SRPMS/apache-mod_php-5.3.22-0.1mdvmes5.2.src.rpm\r\n fdf261c0482bfd9441303354feb12e73 mes5/SRPMS/php-5.3.22-0.2mdvmes5.2.src.rpm\r\n 4dd7e34ddd738a51d52e1aa405c606a7 mes5/SRPMS/php-apc-3.1.13-0.3mdvmes5.2.src.rpm\r\n dbebfa3bfa67532e99f818c13ba43295 mes5/SRPMS/php-eaccelerator-0.9.6.1-0.9mdvmes5.2.src.rpm\r\n c90ca244ed28c306f352b18f8b830405 mes5/SRPMS/php-gd-bundled-5.3.22-0.1mdvmes5.2.src.rpm\r\n 2239e3d32cce5f0dd4e422285934015e mes5/SRPMS/php-ini-5.3.22-0.1mdvmes5.2.src.rpm\r\n\r\n Mandriva Enterprise Server 5/X86_64:\r\n 99b463586e9a09da4efb9d611a00e294 mes5/x86_64/apache-mod_php-5.3.22-0.1mdvmes5.2.x86_64.rpm\r\n 5abc8b2e0b58650c9d92da8d46bd959e mes5/x86_64/lib64php5_common5-5.3.22-0.2mdvmes5.2.x86_64.rpm\r\n a743e2678f3e77cd06a68fd101ec2868 mes5/x86_64/php-apc-3.1.13-0.3mdvmes5.2.x86_64.rpm\r\n 82aeb4792c564b40f6406defb4f03dd6 mes5/x86_64/php-apc-admin-3.1.13-0.3mdvmes5.2.x86_64.rpm\r\n c9a140845d2af8043776bb74a4c080e1 mes5/x86_64/php-bcmath-5.3.22-0.2mdvmes5.2.x86_64.rpm\r\n dac4fa30d827f25db1f7e37576a617a1 mes5/x86_64/php-bz2-5.3.22-0.2mdvmes5.2.x86_64.rpm\r\n 6fbc9bbd4b05d784615c7de6bde04ccd mes5/x86_64/php-calendar-5.3.22-0.2mdvmes5.2.x86_64.rpm\r\n 0942b7a504acf3b13109a5d2146fb945 mes5/x86_64/php-cgi-5.3.22-0.2mdvmes5.2.x86_64.rpm\r\n 30334a2544a2fd27e08b9d41be9022f0 mes5/x86_64/php-cli-5.3.22-0.2mdvmes5.2.x86_64.rpm\r\n 917e60a2e04aa35a7ddf20c876944fe2 mes5/x86_64/php-ctype-5.3.22-0.2mdvmes5.2.x86_64.rpm\r\n f84f40b111dc426f7272768aabb5d7ad mes5/x86_64/php-curl-5.3.22-0.2mdvmes5.2.x86_64.rpm\r\n 1e60d54e44f2a869f2ad2a0c8c228a53 mes5/x86_64/php-dba-5.3.22-0.2mdvmes5.2.x86_64.rpm\r\n 0e5c6f95921fdc9c16479a5109147f66 mes5/x86_64/php-devel-5.3.22-0.2mdvmes5.2.x86_64.rpm\r\n 276116d8dd21c3a1cd3b9d8b069d2ef2 mes5/x86_64/php-doc-5.3.22-0.2mdvmes5.2.x86_64.rpm\r\n 0c8c18ef3fff119408a0c976867bfe15 mes5/x86_64/php-dom-5.3.22-0.2mdvmes5.2.x86_64.rpm\r\n 7473e9f92055c750b87d2c7a4667193a mes5/x86_64/php-eaccelerator-0.9.6.1-0.9mdvmes5.2.x86_64.rpm\r\n 3a2e60228be6ed72e27c8be9b72e87c1 mes5/x86_64/php-eaccelerator-admin-0.9.6.1-0.9mdvmes5.2.x86_64.rpm\r\n b093c986550868c1e0ebe69dded6189a mes5/x86_64/php-enchant-5.3.22-0.2mdvmes5.2.x86_64.rpm\r\n a5df7b660933891ca6a21f20c4fd7c00 mes5/x86_64/php-exif-5.3.22-0.2mdvmes5.2.x86_64.rpm\r\n ea97bf4d483cdca8f627ac05c93d8bbd mes5/x86_64/php-fileinfo-5.3.22-0.2mdvmes5.2.x86_64.rpm\r\n 679137780a6e0d02aad4560159000a84 mes5/x86_64/php-filter-5.3.22-0.2mdvmes5.2.x86_64.rpm\r\n 888af2b85ac622145ec925474b1d3a49 mes5/x86_64/php-fpm-5.3.22-0.2mdvmes5.2.x86_64.rpm\r\n c9a234580024ecac543b2ecc4fcb2fef mes5/x86_64/php-ftp-5.3.22-0.2mdvmes5.2.x86_64.rpm\r\n 92524520a8336b2434318b0b64f41531 mes5/x86_64/php-gd-5.3.22-0.2mdvmes5.2.x86_64.rpm\r\n 92d0b186fd04e22f4c7e5338a4b061c5 mes5/x86_64/php-gd-bundled-5.3.22-0.1mdvmes5.2.x86_64.rpm\r\n e10690662357eb63808f37d1542e93bc mes5/x86_64/php-gettext-5.3.22-0.2mdvmes5.2.x86_64.rpm\r\n 08fb25a23a41e272fc45154b4fcb5701 mes5/x86_64/php-gmp-5.3.22-0.2mdvmes5.2.x86_64.rpm\r\n 0271a2eae4c0e2e0ae9c63d1bf242b62 mes5/x86_64/php-hash-5.3.22-0.2mdvmes5.2.x86_64.rpm\r\n 2d7f4467f0f8f5ddb5451f975fd913f8 mes5/x86_64/php-iconv-5.3.22-0.2mdvmes5.2.x86_64.rpm\r\n ae2593447ea780a5536eb3e11eceda56 mes5/x86_64/php-imap-5.3.22-0.2mdvmes5.2.x86_64.rpm\r\n c01e35bb0abba96b2d3bc1d0d7b79aca mes5/x86_64/php-ini-5.3.22-0.1mdvmes5.2.x86_64.rpm\r\n e25a491f6362d1a73f30396f32c62f2c mes5/x86_64/php-intl-5.3.22-0.2mdvmes5.2.x86_64.rpm\r\n 2e592f0257e671ab69cbbd00ab2be668 mes5/x86_64/php-json-5.3.22-0.2mdvmes5.2.x86_64.rpm\r\n 0714154c93f036314bdfb57e71b0da3c mes5/x86_64/php-ldap-5.3.22-0.2mdvmes5.2.x86_64.rpm\r\n 85ae0c7a5b291c5556f364783114af39 mes5/x86_64/php-mbstring-5.3.22-0.2mdvmes5.2.x86_64.rpm\r\n 432827959c4cc60b2d5f4b724799ca7b mes5/x86_64/php-mcrypt-5.3.22-0.2mdvmes5.2.x86_64.rpm\r\n f343fb49bc6f43e86d657f31a41361c9 mes5/x86_64/php-mssql-5.3.22-0.2mdvmes5.2.x86_64.rpm\r\n e1f0e5e2f7b21be9645e5a71b9a3ea19 mes5/x86_64/php-mysql-5.3.22-0.2mdvmes5.2.x86_64.rpm\r\n 00f0c33101300bfdf0f66a1b5932e6ae mes5/x86_64/php-mysqli-5.3.22-0.2mdvmes5.2.x86_64.rpm\r\n becbfc5a0c08026d04922d59d6375682 mes5/x86_64/php-mysqlnd-5.3.22-0.2mdvmes5.2.x86_64.rpm\r\n 0576bd3c6c9f8149ae378d9b2c4390e3 mes5/x86_64/php-odbc-5.3.22-0.2mdvmes5.2.x86_64.rpm\r\n 3467a5af3fb08d9823ebb1db5915c533 mes5/x86_64/php-openssl-5.3.22-0.2mdvmes5.2.x86_64.rpm\r\n 8b78a370853974f819d735cf25464564 mes5/x86_64/php-pcntl-5.3.22-0.2mdvmes5.2.x86_64.rpm\r\n e3533b125e17b4cf18648547713effc0 mes5/x86_64/php-pdo-5.3.22-0.2mdvmes5.2.x86_64.rpm\r\n 4f9178fac0be804722af1d8badb6e7cc mes5/x86_64/php-pdo_dblib-5.3.22-0.2mdvmes5.2.x86_64.rpm\r\n f925e2310c3eee41b6cfeae1607f640f mes5/x86_64/php-pdo_mysql-5.3.22-0.2mdvmes5.2.x86_64.rpm\r\n 009e574314dda4333f82b005c0e8a710 mes5/x86_64/php-pdo_odbc-5.3.22-0.2mdvmes5.2.x86_64.rpm\r\n 3d8ad3c7834e43fc58700c60f355556f mes5/x86_64/php-pdo_pgsql-5.3.22-0.2mdvmes5.2.x86_64.rpm\r\n 23936cf1725d4cd2b433a75cccdaccf5 mes5/x86_64/php-pdo_sqlite-5.3.22-0.2mdvmes5.2.x86_64.rpm\r\n e977730acf0fa784bf7401a1072073e7 mes5/x86_64/php-pgsql-5.3.22-0.2mdvmes5.2.x86_64.rpm\r\n 5f587f766f006be3f4d16ed80e775ce8 mes5/x86_64/php-phar-5.3.22-0.2mdvmes5.2.x86_64.rpm\r\n 7dea85aecab942a292d77be400533a13 mes5/x86_64/php-posix-5.3.22-0.2mdvmes5.2.x86_64.rpm\r\n f63bc2e5f42a1f525fe30e2a744b95ab mes5/x86_64/php-pspell-5.3.22-0.2mdvmes5.2.x86_64.rpm\r\n 9e91ce79b3f72a204d1474e0ae51cd46 mes5/x86_64/php-readline-5.3.22-0.2mdvmes5.2.x86_64.rpm\r\n 8144bb4f32fe54eacd5a1f5758bb9975 mes5/x86_64/php-recode-5.3.22-0.2mdvmes5.2.x86_64.rpm\r\n d961d88991d073dbd2eae6b9dcf66f1b mes5/x86_64/php-session-5.3.22-0.2mdvmes5.2.x86_64.rpm\r\n 06866305f1e2d00e3ca71eb7b45c0349 mes5/x86_64/php-shmop-5.3.22-0.2mdvmes5.2.x86_64.rpm\r\n 6781164f95218c9a8dd8ca39c8e9cc0d mes5/x86_64/php-snmp-5.3.22-0.2mdvmes5.2.x86_64.rpm\r\n 984858f02a34193e83a1fa874e61ba02 mes5/x86_64/php-soap-5.3.22-0.2mdvmes5.2.x86_64.rpm\r\n a4963de622f17446cbb3ffa86179c396 mes5/x86_64/php-sockets-5.3.22-0.2mdvmes5.2.x86_64.rpm\r\n 58c915451aa786d297a7b5e1cc98ca3e mes5/x86_64/php-sqlite3-5.3.22-0.2mdvmes5.2.x86_64.rpm\r\n e467d8adc845ee614cdf5951c39587e2 mes5/x86_64/php-sqlite-5.3.22-0.2mdvmes5.2.x86_64.rpm\r\n 95bea66a03948b9d5d3e74146308b6a2 mes5/x86_64/php-sybase_ct-5.3.22-0.2mdvmes5.2.x86_64.rpm\r\n ed30c4b991e2e825bf8a58297ef3cae7 mes5/x86_64/php-sysvmsg-5.3.22-0.2mdvmes5.2.x86_64.rpm\r\n bdf9a7f5f07d1254136dadcb73c2c1b5 mes5/x86_64/php-sysvsem-5.3.22-0.2mdvmes5.2.x86_64.rpm\r\n 072b9dd827d213f935aa60d6df5a55b6 mes5/x86_64/php-sysvshm-5.3.22-0.2mdvmes5.2.x86_64.rpm\r\n ea643096502908d509bd9d7b478b0e12 mes5/x86_64/php-tidy-5.3.22-0.2mdvmes5.2.x86_64.rpm\r\n bf066933a9cd5fe58ed8e3da09f612dc mes5/x86_64/php-tokenizer-5.3.22-0.2mdvmes5.2.x86_64.rpm\r\n 174a08e7d615522a04a3984e1aac5c72 mes5/x86_64/php-wddx-5.3.22-0.2mdvmes5.2.x86_64.rpm\r\n c0bd7da50e09d8406417de10a61a0eab mes5/x86_64/php-xml-5.3.22-0.2mdvmes5.2.x86_64.rpm\r\n 3069a3cc9859b0e6d98c5f1c177c2fd8 mes5/x86_64/php-xmlreader-5.3.22-0.2mdvmes5.2.x86_64.rpm\r\n ebc2f88e03fb3fb660baf0723f2baeff mes5/x86_64/php-xmlrpc-5.3.22-0.2mdvmes5.2.x86_64.rpm\r\n fe57d53176b9795f96ec9fc8dc66fef1 mes5/x86_64/php-xmlwriter-5.3.22-0.2mdvmes5.2.x86_64.rpm\r\n 13d33494f640055c96593771089bfb27 mes5/x86_64/php-xsl-5.3.22-0.2mdvmes5.2.x86_64.rpm\r\n be090c3abbb410a7330127579bd4dd18 mes5/x86_64/php-zip-5.3.22-0.2mdvmes5.2.x86_64.rpm\r\n 287cc9b90cc9b1e03ab4b443b1ef5d58 mes5/x86_64/php-zlib-5.3.22-0.2mdvmes5.2.x86_64.rpm \r\n 1d2010c0a7429d421662dd155b3adf7d mes5/SRPMS/apache-mod_php-5.3.22-0.1mdvmes5.2.src.rpm\r\n fdf261c0482bfd9441303354feb12e73 mes5/SRPMS/php-5.3.22-0.2mdvmes5.2.src.rpm\r\n 4dd7e34ddd738a51d52e1aa405c606a7 mes5/SRPMS/php-apc-3.1.13-0.3mdvmes5.2.src.rpm\r\n dbebfa3bfa67532e99f818c13ba43295 mes5/SRPMS/php-eaccelerator-0.9.6.1-0.9mdvmes5.2.src.rpm\r\n c90ca244ed28c306f352b18f8b830405 mes5/SRPMS/php-gd-bundled-5.3.22-0.1mdvmes5.2.src.rpm\r\n 2239e3d32cce5f0dd4e422285934015e mes5/SRPMS/php-ini-5.3.22-0.1mdvmes5.2.src.rpm\r\n _______________________________________________________________________\r\n\r\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\r\n of md5 checksums and GPG signatures is performed automatically for you.\r\n\r\n All packages are signed by Mandriva for security. You can obtain the\r\n GPG public key of the Mandriva Security Team by executing:\r\n\r\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\r\n\r\n You can view other update advisories for Mandriva Linux at:\r\n\r\n http://www.mandriva.com/security/advisories\r\n\r\n If you want to report vulnerabilities, please contact\r\n\r\n security_(at)_mandriva.com\r\n _______________________________________________________________________\r\n\r\n Type Bits/KeyID Date User ID\r\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\r\n <security*mandriva.com>\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG v1.4.11 (GNU/Linux)\r\n\r\niD8DBQFRLykWmqjQ0CJFipgRAhVcAKCoTEg8gsrFaL0tRSH7SKnm1lHytwCePZbz\r\nFnp5XCFIHCbPRVhRtkIVQC0=\r\n=M1S0\r\n-----END PGP SIGNATURE-----\r\n", "edition": 1, "modified": "2013-03-02T00:00:00", "published": "2013-03-02T00:00:00", "id": "SECURITYVULNS:DOC:29110", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:29110", "title": "[ MDVSA-2013:016 ] php", "type": "securityvulns", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-08-31T11:10:48", "bulletinFamily": "software", "cvelist": ["CVE-2013-4248", "CVE-2009-2408"], "description": "\r\n\r\n-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA1\r\n\r\n _______________________________________________________________________\r\n\r\n Mandriva Linux Security Advisory MDVSA-2013:221\r\n http://www.mandriva.com/en/support/security/\r\n _______________________________________________________________________\r\n\r\n Package : php\r\n Date : August 27, 2013\r\n Affected: Business Server 1.0, Enterprise Server 5.0\r\n _______________________________________________________________________\r\n\r\n Problem Description:\r\n\r\n A vulnerability has been discovered and corrected in php:\r\n \r\n The openssl_x509_parse function in openssl.c in the OpenSSL module in\r\n PHP before 5.4.18 and 5.5.x before 5.5.2 does not properly handle a\r\n '\0' character in a domain name in the Subject Alternative Name field\r\n of an X.509 certificate, which allows man-in-the-middle attackers\r\n to spoof arbitrary SSL servers via a crafted certificate issued by a\r\n legitimate Certification Authority, a related issue to CVE-2009-2408\r\n (CVE-2013-4248).\r\n \r\n Additionally a patch has been applied to fix an UMR (Unitialized\r\n Memory Read) bug in the original fix for CVE-2013-4248.\r\n \r\n The updated packages have been patched to correct these issues.\r\n _______________________________________________________________________\r\n\r\n References:\r\n\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4248\r\n http://git.php.net/?p=php-src.git;a=commit;h=dcea4ec698dcae39b7bba6f6aa08933cbfee6755\r\n http://git.php.net/?p=php-src.git;a=commit;h=c1c49d6e3983c9ce0b43ffe7bf6e03b809ed048b\r\n _______________________________________________________________________\r\n\r\n Updated Packages:\r\n\r\n Mandriva Enterprise Server 5:\r\n 9522568c062c1b74258ba8f04197201d mes5/i586/libphp5_common5-5.3.27-0.2mdvmes5.2.i586.rpm\r\n ee79a4a91c2fe059a1c1058fd496c6ca mes5/i586/php-bcmath-5.3.27-0.2mdvmes5.2.i586.rpm\r\n 087316707a0c73f171d7c281625ed462 mes5/i586/php-bz2-5.3.27-0.2mdvmes5.2.i586.rpm\r\n e80640530ad4eaf5217c08e020a927ba mes5/i586/php-calendar-5.3.27-0.2mdvmes5.2.i586.rpm\r\n 011f39b5c4e43070b1a6c63dc9878dc6 mes5/i586/php-cgi-5.3.27-0.2mdvmes5.2.i586.rpm\r\n 07da1fb7a6b98cde29b95ad2fb918d48 mes5/i586/php-cli-5.3.27-0.2mdvmes5.2.i586.rpm\r\n 450e65f4218aa8bace8daafa715b570d mes5/i586/php-ctype-5.3.27-0.2mdvmes5.2.i586.rpm\r\n ff8806539f3a58123938432b74fbd9e9 mes5/i586/php-curl-5.3.27-0.2mdvmes5.2.i586.rpm\r\n 974e4986e35da332fb598ec01b2163f3 mes5/i586/php-dba-5.3.27-0.2mdvmes5.2.i586.rpm\r\n e1a4498607d219eecf9994aeb704242c mes5/i586/php-devel-5.3.27-0.2mdvmes5.2.i586.rpm\r\n f26f985df42ff4a8437380c4a991f361 mes5/i586/php-doc-5.3.27-0.2mdvmes5.2.i586.rpm\r\n 0bea7db56aaa67bc2021f8ce12fd068a mes5/i586/php-dom-5.3.27-0.2mdvmes5.2.i586.rpm\r\n 7e421a071010e45e0d85752a890a4f88 mes5/i586/php-enchant-5.3.27-0.2mdvmes5.2.i586.rpm\r\n cfea7470b606d0e6f3d34dfe7c1e22f0 mes5/i586/php-exif-5.3.27-0.2mdvmes5.2.i586.rpm\r\n eedae065db74a5d1b41a6087947ea993 mes5/i586/php-fileinfo-5.3.27-0.2mdvmes5.2.i586.rpm\r\n 6dc117b21808600ebb02333189f09c95 mes5/i586/php-filter-5.3.27-0.2mdvmes5.2.i586.rpm\r\n 17419ceef0ee25efc89c06f3fc826939 mes5/i586/php-fpm-5.3.27-0.2mdvmes5.2.i586.rpm\r\n 26856eeb5ce9f8ea6bde61a78ad45479 mes5/i586/php-ftp-5.3.27-0.2mdvmes5.2.i586.rpm\r\n de90e7b5c4c5b6ef457b3f0efea42886 mes5/i586/php-gd-5.3.27-0.2mdvmes5.2.i586.rpm\r\n 50d991ced393383e97929638e848b048 mes5/i586/php-gettext-5.3.27-0.2mdvmes5.2.i586.rpm\r\n 3ac443211787b94861f81c5a9a98734d mes5/i586/php-gmp-5.3.27-0.2mdvmes5.2.i586.rpm\r\n 6edcdb859c9215d1c0e0c92de5ca3cac mes5/i586/php-hash-5.3.27-0.2mdvmes5.2.i586.rpm\r\n ab321552dcc3085fe31e7f29d4de0b6a mes5/i586/php-iconv-5.3.27-0.2mdvmes5.2.i586.rpm\r\n b7e493d12252b54070479a2d9ccd8ac2 mes5/i586/php-imap-5.3.27-0.2mdvmes5.2.i586.rpm\r\n ad83e937b22040c603bd6e968e79beb7 mes5/i586/php-intl-5.3.27-0.2mdvmes5.2.i586.rpm\r\n 78cf163200b423a9aac5fe380762ba42 mes5/i586/php-json-5.3.27-0.2mdvmes5.2.i586.rpm\r\n 0baf177b403ea176d01e572976c81747 mes5/i586/php-ldap-5.3.27-0.2mdvmes5.2.i586.rpm\r\n 6d9c85798460835b6d275e17e580a8b0 mes5/i586/php-mbstring-5.3.27-0.2mdvmes5.2.i586.rpm\r\n c0b792ea66300f57daf7139db9e5d89f mes5/i586/php-mcrypt-5.3.27-0.2mdvmes5.2.i586.rpm\r\n 301fe150328bda45ed5430844a7da39b mes5/i586/php-mssql-5.3.27-0.2mdvmes5.2.i586.rpm\r\n 9fa6148ce30482fae326dd60f9e9618e mes5/i586/php-mysql-5.3.27-0.2mdvmes5.2.i586.rpm\r\n e5540fbb36f724644f726073b59a4cb6 mes5/i586/php-mysqli-5.3.27-0.2mdvmes5.2.i586.rpm\r\n fb9d68321723f646a105bf8958ecda88 mes5/i586/php-mysqlnd-5.3.27-0.2mdvmes5.2.i586.rpm\r\n a934ca5f5e74745c165a6a50ca8ce39f mes5/i586/php-odbc-5.3.27-0.2mdvmes5.2.i586.rpm\r\n 61e70a92095220c98445f5d08ede365f mes5/i586/php-openssl-5.3.27-0.2mdvmes5.2.i586.rpm\r\n f5f5a86b1aed957cd442d0470ad39bdd mes5/i586/php-pcntl-5.3.27-0.2mdvmes5.2.i586.rpm\r\n f6a0475623d7511ac44f76392dd27aba mes5/i586/php-pdo-5.3.27-0.2mdvmes5.2.i586.rpm\r\n 09aca6a837261f67f8e55716dc13a2df mes5/i586/php-pdo_dblib-5.3.27-0.2mdvmes5.2.i586.rpm\r\n 2560fa0bab93084ce9259e9a471c7cde mes5/i586/php-pdo_mysql-5.3.27-0.2mdvmes5.2.i586.rpm\r\n 66084abf8e971cca6fd553fa3f970cc9 mes5/i586/php-pdo_odbc-5.3.27-0.2mdvmes5.2.i586.rpm\r\n 4865c663c19530c3410d63b2dbab2dfa mes5/i586/php-pdo_pgsql-5.3.27-0.2mdvmes5.2.i586.rpm\r\n 4069db4ce674263daab4be69a9c98fad mes5/i586/php-pdo_sqlite-5.3.27-0.2mdvmes5.2.i586.rpm\r\n 5a7e510a9cff2b54d66aba551c88b619 mes5/i586/php-pgsql-5.3.27-0.2mdvmes5.2.i586.rpm\r\n 7ce446d96cb77c519db77fddbd4a1e13 mes5/i586/php-phar-5.3.27-0.2mdvmes5.2.i586.rpm\r\n ab60e337bf4efce012af627ffc25421f mes5/i586/php-posix-5.3.27-0.2mdvmes5.2.i586.rpm\r\n d0d4bc5ac744483d58cfcdcb01046e55 mes5/i586/php-pspell-5.3.27-0.2mdvmes5.2.i586.rpm\r\n f4ef91c5554f0afa1a768f7a104309b6 mes5/i586/php-readline-5.3.27-0.2mdvmes5.2.i586.rpm\r\n a18c79e591b21027837eee6a555994bc mes5/i586/php-recode-5.3.27-0.2mdvmes5.2.i586.rpm\r\n 36b2f724c574dbb53a464000ecce8add mes5/i586/php-session-5.3.27-0.2mdvmes5.2.i586.rpm\r\n 712014dd67b460527bd1b9a33923636c mes5/i586/php-shmop-5.3.27-0.2mdvmes5.2.i586.rpm\r\n f2c1515bbfd825f9c636c37e5fde24e2 mes5/i586/php-snmp-5.3.27-0.2mdvmes5.2.i586.rpm\r\n a9efe2839d9ab91900c6b53b115b517a mes5/i586/php-soap-5.3.27-0.2mdvmes5.2.i586.rpm\r\n b9c19ff27d36ef80e19443d6046ee729 mes5/i586/php-sockets-5.3.27-0.2mdvmes5.2.i586.rpm\r\n b0f3e8ba18aed7605b68e115b588aedf mes5/i586/php-sqlite3-5.3.27-0.2mdvmes5.2.i586.rpm\r\n 9aa28ff47c656b2edba20ebff83fc2ea mes5/i586/php-sqlite-5.3.27-0.2mdvmes5.2.i586.rpm\r\n 5084455cfa227b7f5e904f426454f204 mes5/i586/php-sybase_ct-5.3.27-0.2mdvmes5.2.i586.rpm\r\n 2034a6e1b7ab1357b1600ee8f424114f mes5/i586/php-sysvmsg-5.3.27-0.2mdvmes5.2.i586.rpm\r\n 57850d3b0d95836f09a065cce7b54b56 mes5/i586/php-sysvsem-5.3.27-0.2mdvmes5.2.i586.rpm\r\n ebf98bde8e1c3eb3a75ba43a2c4d8e29 mes5/i586/php-sysvshm-5.3.27-0.2mdvmes5.2.i586.rpm\r\n 04a5aff732744bde0e214f8a1e3824b4 mes5/i586/php-tidy-5.3.27-0.2mdvmes5.2.i586.rpm\r\n 5c01f7bd63083a4ffa4de3b5118e7ea3 mes5/i586/php-tokenizer-5.3.27-0.2mdvmes5.2.i586.rpm\r\n b1f9995f70eb692f04a59d4484af7d94 mes5/i586/php-wddx-5.3.27-0.2mdvmes5.2.i586.rpm\r\n 3b8847ab1227e6146c632f094efb266e mes5/i586/php-xml-5.3.27-0.2mdvmes5.2.i586.rpm\r\n 235b2e2854585d1da07290c4af5c2d7e mes5/i586/php-xmlreader-5.3.27-0.2mdvmes5.2.i586.rpm\r\n f8a9a4a7ce9d4a9b0cd982b3820f30e6 mes5/i586/php-xmlrpc-5.3.27-0.2mdvmes5.2.i586.rpm\r\n 7ba0160dae5239e9101ad2bef85323b1 mes5/i586/php-xmlwriter-5.3.27-0.2mdvmes5.2.i586.rpm\r\n 4ae59b5b3f8068fc26b03e5a644b9676 mes5/i586/php-xsl-5.3.27-0.2mdvmes5.2.i586.rpm\r\n f6f6e4700b2c46d0ac741077f4df432f mes5/i586/php-zip-5.3.27-0.2mdvmes5.2.i586.rpm\r\n ac721a2926210c9274a2ce65035bf8aa mes5/i586/php-zlib-5.3.27-0.2mdvmes5.2.i586.rpm \r\n 54cff75cbb936b17102cffd5f8ae6d0e mes5/SRPMS/php-5.3.27-0.2mdvmes5.2.src.rpm\r\n\r\n Mandriva Enterprise Server 5/X86_64:\r\n 43107ce9589d5319d06325fd8d9c841b mes5/x86_64/lib64php5_common5-5.3.27-0.2mdvmes5.2.x86_64.rpm\r\n 6ccc4388fd22f6a93610760264f37f7d mes5/x86_64/php-bcmath-5.3.27-0.2mdvmes5.2.x86_64.rpm\r\n 4a2073281f73c23bbd020a03f47dfc44 mes5/x86_64/php-bz2-5.3.27-0.2mdvmes5.2.x86_64.rpm\r\n f0c77135f95350899cc1424f78f209b2 mes5/x86_64/php-calendar-5.3.27-0.2mdvmes5.2.x86_64.rpm\r\n 0db2d9af7a62620b36c4da3292cd2436 mes5/x86_64/php-cgi-5.3.27-0.2mdvmes5.2.x86_64.rpm\r\n ba8ec0871306235163759d68ef341027 mes5/x86_64/php-cli-5.3.27-0.2mdvmes5.2.x86_64.rpm\r\n 77379d429dad3f0f47f1d90e16d67c02 mes5/x86_64/php-ctype-5.3.27-0.2mdvmes5.2.x86_64.rpm\r\n 694d4fad3f568ca779523cc8b6e1f95a mes5/x86_64/php-curl-5.3.27-0.2mdvmes5.2.x86_64.rpm\r\n 29fc1af0767c3b51824056afdbd5a614 mes5/x86_64/php-dba-5.3.27-0.2mdvmes5.2.x86_64.rpm\r\n 4aca90fb13dcea3db19e34b14c49f0b5 mes5/x86_64/php-devel-5.3.27-0.2mdvmes5.2.x86_64.rpm\r\n 6b6e484f9091f8193f7835a3dc2f780e mes5/x86_64/php-doc-5.3.27-0.2mdvmes5.2.x86_64.rpm\r\n 7e651dd9aa8f19d89b112d00e0e555eb mes5/x86_64/php-dom-5.3.27-0.2mdvmes5.2.x86_64.rpm\r\n 80362e5a776cef221686e6a46b8f7cb2 mes5/x86_64/php-enchant-5.3.27-0.2mdvmes5.2.x86_64.rpm\r\n d4b26a11fd6020a57e4b53f4dffee02c mes5/x86_64/php-exif-5.3.27-0.2mdvmes5.2.x86_64.rpm\r\n fe46c2216bd26c66c7e0d78bdce2313f mes5/x86_64/php-fileinfo-5.3.27-0.2mdvmes5.2.x86_64.rpm\r\n f410cdba923f757be659b3e68355ca87 mes5/x86_64/php-filter-5.3.27-0.2mdvmes5.2.x86_64.rpm\r\n 5e7633ca1f2945533de1dbce9b2bf348 mes5/x86_64/php-fpm-5.3.27-0.2mdvmes5.2.x86_64.rpm\r\n 6150f1351a728b4baa3702b378b72bef mes5/x86_64/php-ftp-5.3.27-0.2mdvmes5.2.x86_64.rpm\r\n e54dd79aacb6e1015bdaa3b6c04cc9b0 mes5/x86_64/php-gd-5.3.27-0.2mdvmes5.2.x86_64.rpm\r\n 1a2c8cb7fdebb2e938518592e48ce0cb mes5/x86_64/php-gettext-5.3.27-0.2mdvmes5.2.x86_64.rpm\r\n 85aec066ae2a7c619a83b3b5ffe63d5e mes5/x86_64/php-gmp-5.3.27-0.2mdvmes5.2.x86_64.rpm\r\n 9ec84234ec94d1a1cd692a0becd125c7 mes5/x86_64/php-hash-5.3.27-0.2mdvmes5.2.x86_64.rpm\r\n 0bb61a34953858f8e788221c1720e7d8 mes5/x86_64/php-iconv-5.3.27-0.2mdvmes5.2.x86_64.rpm\r\n 2da02ea72d51f931d8d721111df01d05 mes5/x86_64/php-imap-5.3.27-0.2mdvmes5.2.x86_64.rpm\r\n 32c74852b06828b789d48bc203eac732 mes5/x86_64/php-intl-5.3.27-0.2mdvmes5.2.x86_64.rpm\r\n 8968efcc7b7c3d489dc004e7f630c406 mes5/x86_64/php-json-5.3.27-0.2mdvmes5.2.x86_64.rpm\r\n 03459bd058b6ceda6f07bfca4c63e7f4 mes5/x86_64/php-ldap-5.3.27-0.2mdvmes5.2.x86_64.rpm\r\n df0f95951d987c09c554849db6d39adc mes5/x86_64/php-mbstring-5.3.27-0.2mdvmes5.2.x86_64.rpm\r\n d9141eb9d79ac5b4d94d46cfe31bff7f mes5/x86_64/php-mcrypt-5.3.27-0.2mdvmes5.2.x86_64.rpm\r\n d69777dfaaf057573627bc6ff0e83a6b mes5/x86_64/php-mssql-5.3.27-0.2mdvmes5.2.x86_64.rpm\r\n cc77b76107deafce648c44c9fa310509 mes5/x86_64/php-mysql-5.3.27-0.2mdvmes5.2.x86_64.rpm\r\n 6072066a13d744c942712123d049f67c mes5/x86_64/php-mysqli-5.3.27-0.2mdvmes5.2.x86_64.rpm\r\n 2aae6e46e3b43c234bde35762b731181 mes5/x86_64/php-mysqlnd-5.3.27-0.2mdvmes5.2.x86_64.rpm\r\n a61bd2935fca9470fe7b6a0f762c1fd5 mes5/x86_64/php-odbc-5.3.27-0.2mdvmes5.2.x86_64.rpm\r\n 47d239f571dc79455d52740367888434 mes5/x86_64/php-openssl-5.3.27-0.2mdvmes5.2.x86_64.rpm\r\n fa98bd515a8aef18b13d09f9d2d35722 mes5/x86_64/php-pcntl-5.3.27-0.2mdvmes5.2.x86_64.rpm\r\n 4e7a5929dbf29b63778280bff6691513 mes5/x86_64/php-pdo-5.3.27-0.2mdvmes5.2.x86_64.rpm\r\n 767aa360ce805aece27bdb306ce7b76d mes5/x86_64/php-pdo_dblib-5.3.27-0.2mdvmes5.2.x86_64.rpm\r\n a01d7d569e5ee5da0b64656d9e047355 mes5/x86_64/php-pdo_mysql-5.3.27-0.2mdvmes5.2.x86_64.rpm\r\n 5f6d7865675940ccb48664df41f3a0fa mes5/x86_64/php-pdo_odbc-5.3.27-0.2mdvmes5.2.x86_64.rpm\r\n 5c2643792b4e5bd58d227bd30c09f943 mes5/x86_64/php-pdo_pgsql-5.3.27-0.2mdvmes5.2.x86_64.rpm\r\n e74baf91780193db1eee6bc6ed040348 mes5/x86_64/php-pdo_sqlite-5.3.27-0.2mdvmes5.2.x86_64.rpm\r\n 31b8ed6f42d8eafc20ee090642d96eb1 mes5/x86_64/php-pgsql-5.3.27-0.2mdvmes5.2.x86_64.rpm\r\n d9a8fab251729c49b9dc161f11f176f5 mes5/x86_64/php-phar-5.3.27-0.2mdvmes5.2.x86_64.rpm\r\n 471e4e7e282650b8ee09641140863c33 mes5/x86_64/php-posix-5.3.27-0.2mdvmes5.2.x86_64.rpm\r\n 57dbbb0c2cf32eadd45c4f1b4bdc29c7 mes5/x86_64/php-pspell-5.3.27-0.2mdvmes5.2.x86_64.rpm\r\n 5e1041cd335884398ff1f108b106f9c3 mes5/x86_64/php-readline-5.3.27-0.2mdvmes5.2.x86_64.rpm\r\n 4eacf55b046e2fb4ebcc82e22c223102 mes5/x86_64/php-recode-5.3.27-0.2mdvmes5.2.x86_64.rpm\r\n b474a62656076fe7f4ee5e64f04a0df0 mes5/x86_64/php-session-5.3.27-0.2mdvmes5.2.x86_64.rpm\r\n 25332990897ea091d4300032616e05e3 mes5/x86_64/php-shmop-5.3.27-0.2mdvmes5.2.x86_64.rpm\r\n 7927ed92e24ef3df130a33f81afe3d25 mes5/x86_64/php-snmp-5.3.27-0.2mdvmes5.2.x86_64.rpm\r\n d7553a3925327ccd142733412879432d mes5/x86_64/php-soap-5.3.27-0.2mdvmes5.2.x86_64.rpm\r\n 30b2ba0c9ab73e5e186ba0371ad86599 mes5/x86_64/php-sockets-5.3.27-0.2mdvmes5.2.x86_64.rpm\r\n 185ac053237dbab22d9434cf540b4b23 mes5/x86_64/php-sqlite3-5.3.27-0.2mdvmes5.2.x86_64.rpm\r\n 54f72bbffa2201f316cacdcf2023fde9 mes5/x86_64/php-sqlite-5.3.27-0.2mdvmes5.2.x86_64.rpm\r\n fcee56110471ce2868aee03d1923f9aa mes5/x86_64/php-sybase_ct-5.3.27-0.2mdvmes5.2.x86_64.rpm\r\n 285ddbeaef7b6c2263778fca80a7e268 mes5/x86_64/php-sysvmsg-5.3.27-0.2mdvmes5.2.x86_64.rpm\r\n 17ab26517e3c83f32492dc15feb332ee mes5/x86_64/php-sysvsem-5.3.27-0.2mdvmes5.2.x86_64.rpm\r\n 124d078e4cb1d9b1abb1e06e2d0f7591 mes5/x86_64/php-sysvshm-5.3.27-0.2mdvmes5.2.x86_64.rpm\r\n ad807b130aad6084fe8141e8fb0a492e mes5/x86_64/php-tidy-5.3.27-0.2mdvmes5.2.x86_64.rpm\r\n adf5f741653b646db4af1bdfb375e750 mes5/x86_64/php-tokenizer-5.3.27-0.2mdvmes5.2.x86_64.rpm\r\n 90b5142710ed4ecf7bbb03fa41b245f2 mes5/x86_64/php-wddx-5.3.27-0.2mdvmes5.2.x86_64.rpm\r\n 25ab18323c1f065febf5808747caa1d6 mes5/x86_64/php-xml-5.3.27-0.2mdvmes5.2.x86_64.rpm\r\n fa5e5e15db05aea4d3b1b8ba70b94b84 mes5/x86_64/php-xmlreader-5.3.27-0.2mdvmes5.2.x86_64.rpm\r\n 8b069a26d39e2126cca64c5e1f7dd962 mes5/x86_64/php-xmlrpc-5.3.27-0.2mdvmes5.2.x86_64.rpm\r\n 55e632f0b0382d6c55d722cc1405f73c mes5/x86_64/php-xmlwriter-5.3.27-0.2mdvmes5.2.x86_64.rpm\r\n 971db1c0cd113e0168aad043e227ed4c mes5/x86_64/php-xsl-5.3.27-0.2mdvmes5.2.x86_64.rpm\r\n 5eb03ed8550218f41e8661da0679b45c mes5/x86_64/php-zip-5.3.27-0.2mdvmes5.2.x86_64.rpm\r\n 1a2ba37adc3afc7935a6b0c5cb1d2d29 mes5/x86_64/php-zlib-5.3.27-0.2mdvmes5.2.x86_64.rpm \r\n 54cff75cbb936b17102cffd5f8ae6d0e mes5/SRPMS/php-5.3.27-0.2mdvmes5.2.src.rpm\r\n\r\n Mandriva Business Server 1/X86_64:\r\n ed48a5a2462c0ce41c29d8f087ffdd69 mbs1/x86_64/apache-mod_php-5.3.27-1.2.mbs1.x86_64.rpm\r\n 910ae99f3710aa835c7793b3d57b5abf mbs1/x86_64/lib64php5_common5-5.3.27-1.2.mbs1.x86_64.rpm\r\n 1081ffcf7d0d721d89366347450e45cf mbs1/x86_64/php-bcmath-5.3.27-1.2.mbs1.x86_64.rpm\r\n 14bdac478b235e0ef75e473c6d6237e1 mbs1/x86_64/php-bz2-5.3.27-1.2.mbs1.x86_64.rpm\r\n d0bd85df5f32ac0a4918a7770867ce24 mbs1/x86_64/php-calendar-5.3.27-1.2.mbs1.x86_64.rpm\r\n c2993771d8c11e29b383d8c130d036c3 mbs1/x86_64/php-cgi-5.3.27-1.2.mbs1.x86_64.rpm\r\n be1915c0ded7f878a4765d358f24deae mbs1/x86_64/php-cli-5.3.27-1.2.mbs1.x86_64.rpm\r\n 0fe20b0cb516e919404a62d21862608c mbs1/x86_64/php-ctype-5.3.27-1.2.mbs1.x86_64.rpm\r\n 7a6798f835548a62f871e9532bc1049e mbs1/x86_64/php-curl-5.3.27-1.2.mbs1.x86_64.rpm\r\n 366387cab1de57ca141224fb627e8145 mbs1/x86_64/php-dba-5.3.27-1.2.mbs1.x86_64.rpm\r\n 8a0e5325e3b0c03331673516aff3f8d5 mbs1/x86_64/php-devel-5.3.27-1.2.mbs1.x86_64.rpm\r\n 3bf2a96cce0298812a041db428a8f29b mbs1/x86_64/php-dom-5.3.27-1.2.mbs1.x86_64.rpm\r\n f753e6d886195ff49f8f833a4367bef0 mbs1/x86_64/php-enchant-5.3.27-1.2.mbs1.x86_64.rpm\r\n f56d3adf20fd33bf0d5ac127ed9f42d4 mbs1/x86_64/php-exif-5.3.27-1.2.mbs1.x86_64.rpm\r\n a1d031efd04813750954d5aa38467202 mbs1/x86_64/php-fileinfo-5.3.27-1.2.mbs1.x86_64.rpm\r\n a76dd8675b5bf00c3d628db9f7ce4120 mbs1/x86_64/php-filter-5.3.27-1.2.mbs1.x86_64.rpm\r\n f908ef1c2eeead15c17b12321feb4b71 mbs1/x86_64/php-fpm-5.3.27-1.2.mbs1.x86_64.rpm\r\n a01c34af3a140160f56157a00435ccb8 mbs1/x86_64/php-ftp-5.3.27-1.2.mbs1.x86_64.rpm\r\n fe992dc5098ac174a501172d6fef1957 mbs1/x86_64/php-gd-5.3.27-1.2.mbs1.x86_64.rpm\r\n 2705e0f4aa1c34dd75aa30d03808098f mbs1/x86_64/php-gettext-5.3.27-1.2.mbs1.x86_64.rpm\r\n bdf286923b5b4d3ca0523fc4e233c7db mbs1/x86_64/php-gmp-5.3.27-1.2.mbs1.x86_64.rpm\r\n 8441abd97842ac07af273e607df2dfb2 mbs1/x86_64/php-hash-5.3.27-1.2.mbs1.x86_64.rpm\r\n f614379a359802fd7c89c81b801dc488 mbs1/x86_64/php-iconv-5.3.27-1.2.mbs1.x86_64.rpm\r\n b10524a832dba9fd94ea241d41dacb1f mbs1/x86_64/php-imap-5.3.27-1.2.mbs1.x86_64.rpm\r\n ef35e3180765164f20d8b14562b028ab mbs1/x86_64/php-ini-5.3.27-1.2.mbs1.x86_64.rpm\r\n d292e89d23eed589dc79e2cf54243248 mbs1/x86_64/php-intl-5.3.27-1.2.mbs1.x86_64.rpm\r\n 528bee061fc273c63e61e3d56656bea9 mbs1/x86_64/php-json-5.3.27-1.2.mbs1.x86_64.rpm\r\n 7c573ef443dd6b937e4898edf5fafaae mbs1/x86_64/php-ldap-5.3.27-1.2.mbs1.x86_64.rpm\r\n f7892986c90ed8e41288baedd9ec7dff mbs1/x86_64/php-mbstring-5.3.27-1.2.mbs1.x86_64.rpm\r\n 0a99bda38077b807326d5e6be65342ca mbs1/x86_64/php-mcrypt-5.3.27-1.2.mbs1.x86_64.rpm\r\n 17c5c49edc1c7cab83f728cecddd51dc mbs1/x86_64/php-mssql-5.3.27-1.2.mbs1.x86_64.rpm\r\n 4300a1a744ac503419c7ea24c077bbd2 mbs1/x86_64/php-mysql-5.3.27-1.2.mbs1.x86_64.rpm\r\n b62ab82fd0c626da95dd9e9ee8e5896e mbs1/x86_64/php-mysqli-5.3.27-1.2.mbs1.x86_64.rpm\r\n def536d614a30188340133b87cea8352 mbs1/x86_64/php-mysqlnd-5.3.27-1.2.mbs1.x86_64.rpm\r\n 74e234b5b6585944b8b559dc8b89d19e mbs1/x86_64/php-odbc-5.3.27-1.2.mbs1.x86_64.rpm\r\n 28e681cd0dc6f82c49f0b948933721ab mbs1/x86_64/php-openssl-5.3.27-1.2.mbs1.x86_64.rpm\r\n 06abeb5d73789b0fdc535413100665d9 mbs1/x86_64/php-pcntl-5.3.27-1.2.mbs1.x86_64.rpm\r\n c88577be0395d80a1e4847e969ca1c8f mbs1/x86_64/php-pdo-5.3.27-1.2.mbs1.x86_64.rpm\r\n 8722ba468b72ad5640a5139b9d749849 mbs1/x86_64/php-pdo_dblib-5.3.27-1.2.mbs1.x86_64.rpm\r\n a050ecf72bc51aae337d57ce2b0192e6 mbs1/x86_64/php-pdo_mysql-5.3.27-1.2.mbs1.x86_64.rpm\r\n 07967310a1eab6f91e7f48507b6537d8 mbs1/x86_64/php-pdo_odbc-5.3.27-1.2.mbs1.x86_64.rpm\r\n ebb16d9b114b8774235a94a538e61db9 mbs1/x86_64/php-pdo_pgsql-5.3.27-1.2.mbs1.x86_64.rpm\r\n a4fbe04a42a7a40e40a4865a4ffa3be9 mbs1/x86_64/php-pdo_sqlite-5.3.27-1.2.mbs1.x86_64.rpm\r\n 6fede9d10ea034a7ccfcafcc77641f14 mbs1/x86_64/php-pgsql-5.3.27-1.2.mbs1.x86_64.rpm\r\n a466ccade0502575b1103a8f11c87693 mbs1/x86_64/php-phar-5.3.27-1.2.mbs1.x86_64.rpm\r\n 7be38aa2ca6b6e9e2b45645b357d0e04 mbs1/x86_64/php-posix-5.3.27-1.2.mbs1.x86_64.rpm\r\n b2096ad42e2320b9be7ba42e163206be mbs1/x86_64/php-readline-5.3.27-1.2.mbs1.x86_64.rpm\r\n fa3cede7bd55851c051852bf9269955d mbs1/x86_64/php-recode-5.3.27-1.2.mbs1.x86_64.rpm\r\n ee29312c970d36df0734c0ce76f31e21 mbs1/x86_64/php-session-5.3.27-1.2.mbs1.x86_64.rpm\r\n d5b995890ac3794b303fdbc2e94c9462 mbs1/x86_64/php-shmop-5.3.27-1.2.mbs1.x86_64.rpm\r\n fc6b82ab789bd4c49c1d626f46ff46b4 mbs1/x86_64/php-snmp-5.3.27-1.2.mbs1.x86_64.rpm\r\n a29111ecbd2482fa2d4aeed2d796754b mbs1/x86_64/php-soap-5.3.27-1.2.mbs1.x86_64.rpm\r\n aba23c9c10a002a526222475b5cfa4e9 mbs1/x86_64/php-sockets-5.3.27-1.2.mbs1.x86_64.rpm\r\n f02c6e7d88487a4eff9ba5308c820618 mbs1/x86_64/php-sqlite3-5.3.27-1.2.mbs1.x86_64.rpm\r\n c03b057c103f112af19c1632cd5d2d36 mbs1/x86_64/php-sqlite-5.3.27-1.2.mbs1.x86_64.rpm\r\n b2921aee9f7bc7223d42d514c4634951 mbs1/x86_64/php-sybase_ct-5.3.27-1.2.mbs1.x86_64.rpm\r\n 43155e935ce6aa2e76149ef644e6609b mbs1/x86_64/php-sysvmsg-5.3.27-1.2.mbs1.x86_64.rpm\r\n 9a535bf170bad2afb10291fc839d961b mbs1/x86_64/php-sysvsem-5.3.27-1.2.mbs1.x86_64.rpm\r\n 6eda94ddff8a3c5f1e4018aba5ec948f mbs1/x86_64/php-sysvshm-5.3.27-1.2.mbs1.x86_64.rpm\r\n 7e465019a69e334cb4121884ff00425b mbs1/x86_64/php-tidy-5.3.27-1.2.mbs1.x86_64.rpm\r\n 915076cc2f87c698bbc87fe9a283bf77 mbs1/x86_64/php-tokenizer-5.3.27-1.2.mbs1.x86_64.rpm\r\n 73813c638bdd03efe4bb7aef3b1f50d9 mbs1/x86_64/php-wddx-5.3.27-1.2.mbs1.x86_64.rpm\r\n f53567428839b5ff2d4750200a3ebd4c mbs1/x86_64/php-xml-5.3.27-1.2.mbs1.x86_64.rpm\r\n 088a7995c210d3542906923b9d9d7c4b mbs1/x86_64/php-xmlreader-5.3.27-1.2.mbs1.x86_64.rpm\r\n 00759329632a0dc5f41e9c5cd52c5210 mbs1/x86_64/php-xmlrpc-5.3.27-1.2.mbs1.x86_64.rpm\r\n 1afcc1fdb1c9a605f58100f87acdd435 mbs1/x86_64/php-xmlwriter-5.3.27-1.2.mbs1.x86_64.rpm\r\n bcc1343417c47107b47cb2295e390cc6 mbs1/x86_64/php-xsl-5.3.27-1.2.mbs1.x86_64.rpm\r\n 62c5d40509306fec6f857b8774192568 mbs1/x86_64/php-zip-5.3.27-1.2.mbs1.x86_64.rpm\r\n 34b3344b4d339b1f63dbad49349f82b0 mbs1/x86_64/php-zlib-5.3.27-1.2.mbs1.x86_64.rpm \r\n 813af7ad851d967aba848d04031f0e74 mbs1/SRPMS/php-5.3.27-1.2.mbs1.src.rpm\r\n _______________________________________________________________________\r\n\r\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\r\n of md5 checksums and GPG signatures is performed automatically for you.\r\n\r\n All packages are signed by Mandriva for security. You can obtain the\r\n GPG public key of the Mandriva Security Team by executing:\r\n\r\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\r\n\r\n You can view other update advisories for Mandriva Linux at:\r\n\r\n http://www.mandriva.com/en/support/security/advisories/\r\n\r\n If you want to report vulnerabilities, please contact\r\n\r\n security_(at)_mandriva.com\r\n _______________________________________________________________________\r\n\r\n Type Bits/KeyID Date User ID\r\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\r\n <security*mandriva.com>\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG v1.4.12 (GNU/Linux)\r\n\r\niD8DBQFSHISsmqjQ0CJFipgRAsIbAJ9p4SEojWkhMQ3usZw4YhNeGtyB+gCdGSOK\r\nFy96USKRpp41i7J4Wml/Hgk=\r\n=LNQS\r\n-----END PGP SIGNATURE-----\r\n", "edition": 1, "modified": "2013-08-28T00:00:00", "published": "2013-08-28T00:00:00", "id": "SECURITYVULNS:DOC:29719", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:29719", "title": "[ MDVSA-2013:221 ] php", "type": "securityvulns", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}]}