PHP security update includes fixes for image processing vulnerabilities, buffer overflow, and denial of service. Also contains several bug fixes and performance improvements
Reporter | Title | Published | Views | Family All 67 |
---|---|---|---|---|
![]() | CentOS 4 : PHP (CESA-2005:406) | 8 Jan 200700:00 | – | nessus |
![]() | CentOS 3 : PHP (CESA-2005:405) | 3 Jul 200600:00 | – | nessus |
![]() | RHEL 4 : PHP (RHSA-2005:406) | 4 May 200500:00 | – | nessus |
![]() | RHEL 3 : PHP (RHSA-2005:405) | 29 Apr 200500:00 | – | nessus |
![]() | GLSA-200504-15 : PHP: Multiple vulnerabilities | 18 Apr 200500:00 | – | nessus |
![]() | Fedora Core 3 : php-4.3.11-2.4 (2005-315) | 12 Sep 200500:00 | – | nessus |
![]() | PHP Multiple Image Processing Functions File Handling DoS | 2 Apr 200500:00 | – | nessus |
![]() | Ubuntu 4.10 : php4 vulnerabilities (USN-105-1) | 15 Jan 200600:00 | – | nessus |
![]() | Ubuntu 4.10 : php4 vulnerabilities (USN-112-1) | 15 Jan 200600:00 | – | nessus |
![]() | SUSE-SA:2005:023: php4, php5 | 15 Apr 200500:00 | – | nessus |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
RedHat | any | s390x | php-gd | 4.3.9-3.6 | php-gd-4.3.9-3.6.s390x.rpm |
RedHat | any | i386 | php-pear | 4.3.9-3.6 | php-pear-4.3.9-3.6.i386.rpm |
RedHat | any | i386 | php-snmp | 4.3.9-3.6 | php-snmp-4.3.9-3.6.i386.rpm |
RedHat | any | ppc | php-snmp | 4.3.9-3.6 | php-snmp-4.3.9-3.6.ppc.rpm |
RedHat | any | x86_64 | php-imap | 4.3.9-3.6 | php-imap-4.3.9-3.6.x86_64.rpm |
RedHat | any | ia64 | php | 4.3.9-3.6 | php-4.3.9-3.6.ia64.rpm |
RedHat | any | ppc | php-devel | 4.3.9-3.6 | php-devel-4.3.9-3.6.ppc.rpm |
RedHat | any | s390 | php-snmp | 4.3.9-3.6 | php-snmp-4.3.9-3.6.s390.rpm |
RedHat | any | x86_64 | php-gd | 4.3.9-3.6 | php-gd-4.3.9-3.6.x86_64.rpm |
RedHat | any | ppc | php-ldap | 4.3.9-3.6 | php-ldap-4.3.9-3.6.ppc.rpm |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo