Critical security update for PHP due to buffer overflow flaw in parsing deeply nested XML document
Reporter | Title | Published | Views | Family All 166 |
---|---|---|---|---|
![]() | Memory corruption | 13 Jul 201313:10 | – | prion |
![]() | RedHat Update for php RHSA-2013:1049-01 | 6 Sep 201300:00 | – | openvas |
![]() | Fedora Update for php FEDORA-2013-12977 | 20 Aug 201300:00 | – | openvas |
![]() | Debian Security Advisory DSA 2723-1 (php5 - heap corruption) | 17 Jul 201300:00 | – | openvas |
![]() | Mageia: Security Advisory (MGASA-2013-0216) | 28 Jan 202200:00 | – | openvas |
![]() | Mageia: Security Advisory (MGASA-2013-0233) | 28 Jan 202200:00 | – | openvas |
![]() | CentOS Update for php CESA-2013:1049 centos6 | 16 Jul 201300:00 | – | openvas |
![]() | CentOS Update for php53 CESA-2013:1050 centos5 | 16 Jul 201300:00 | – | openvas |
![]() | RedHat Update for php53 RHSA-2013:1050-01 | 6 Sep 201300:00 | – | openvas |
![]() | Amazon Linux: Security Advisory (ALAS-2013-212) | 8 Sep 201500:00 | – | openvas |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
RedHat | 4 | ia64 | php-pgsql | 4.3.9-3.37.el4 | php-pgsql-4.3.9-3.37.el4.ia64.rpm |
RedHat | 4 | ia64 | php-xmlrpc | 4.3.9-3.37.el4 | php-xmlrpc-4.3.9-3.37.el4.ia64.rpm |
RedHat | 4 | i386 | php-imap | 4.3.9-3.37.el4 | php-imap-4.3.9-3.37.el4.i386.rpm |
RedHat | 4 | x86_64 | php-imap | 4.3.9-3.37.el4 | php-imap-4.3.9-3.37.el4.x86_64.rpm |
RedHat | 4 | x86_64 | php-gd | 4.3.9-3.37.el4 | php-gd-4.3.9-3.37.el4.x86_64.rpm |
RedHat | 4 | i386 | php-snmp | 4.3.9-3.37.el4 | php-snmp-4.3.9-3.37.el4.i386.rpm |
RedHat | 4 | x86_64 | php-xmlrpc | 4.3.9-3.37.el4 | php-xmlrpc-4.3.9-3.37.el4.x86_64.rpm |
RedHat | 4 | ia64 | php-snmp | 4.3.9-3.37.el4 | php-snmp-4.3.9-3.37.el4.ia64.rpm |
RedHat | 4 | i386 | php-odbc | 4.3.9-3.37.el4 | php-odbc-4.3.9-3.37.el4.i386.rpm |
RedHat | 4 | ia64 | php-gd | 4.3.9-3.37.el4 | php-gd-4.3.9-3.37.el4.ia64.rpm |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo