Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | |||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.891397 |
Kategorie: | Debian Local Security Checks |
Titel: | Debian LTS: Security Advisory for php5 (DLA-1397-1) |
Zusammenfassung: | Several vulnerabilities were found in PHP, a widely-used open source;general purpose scripting language:;;CVE-2018-7584;;A stack-buffer-overflow while parsing HTTP response results in copying a;large string and possible memory corruption and/or denial of service;;CVE-2018-10545;;Dumpable FPM child processes allow bypassing opcache access controls;resulting in potential information disclosure where one user can obtain;information about another user's running PHP applications;;CVE-2018-10546;;An invalid sequence of bytes can trigger an infinite loop in the stream;filter convert.iconv;;CVE-2018-10547;;A previous fix for CVE-2018-5712 may not be complete, resulting in an;additional vulnerability in the form of a reflected XSS in the PHAR 403;and 404 error pages;;CVE-2018-10548;;A malicious remote LDAP server can send a crafted response that will;cause a denial of service (NULL pointer dereference resulting in an;application crash);;CVE-2018-10549;;A crafted JPEG file can case an out-of-bounds read and heap buffer;overflow |
Beschreibung: | Summary: Several vulnerabilities were found in PHP, a widely-used open source general purpose scripting language: CVE-2018-7584 A stack-buffer-overflow while parsing HTTP response results in copying a large string and possible memory corruption and/or denial of service CVE-2018-10545 Dumpable FPM child processes allow bypassing opcache access controls resulting in potential information disclosure where one user can obtain information about another user's running PHP applications CVE-2018-10546 An invalid sequence of bytes can trigger an infinite loop in the stream filter convert.iconv CVE-2018-10547 A previous fix for CVE-2018-5712 may not be complete, resulting in an additional vulnerability in the form of a reflected XSS in the PHAR 403 and 404 error pages CVE-2018-10548 A malicious remote LDAP server can send a crafted response that will cause a denial of service (NULL pointer dereference resulting in an application crash) CVE-2018-10549 A crafted JPEG file can case an out-of-bounds read and heap buffer overflow Affected Software/OS: php5 on Debian Linux Solution: For Debian 8 'Jessie', these problems have been fixed in version 5.6.36+dfsg-0+deb8u1. We recommend that you upgrade your php5 packages. CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2018-5712 BugTraq ID: 102742 http://www.securityfocus.com/bid/102742 BugTraq ID: 104020 http://www.securityfocus.com/bid/104020 https://www.oracle.com/security-alerts/cpuapr2020.html https://lists.debian.org/debian-lts-announce/2018/01/msg00025.html RedHat Security Advisories: RHSA-2018:1296 https://access.redhat.com/errata/RHSA-2018:1296 RedHat Security Advisories: RHSA-2019:2519 https://access.redhat.com/errata/RHSA-2019:2519 http://www.securitytracker.com/id/1040363 https://usn.ubuntu.com/3566-1/ https://usn.ubuntu.com/3600-1/ https://usn.ubuntu.com/3600-2/ Common Vulnerability Exposure (CVE) ID: CVE-2018-7584 BugTraq ID: 103204 http://www.securityfocus.com/bid/103204 Debian Security Information: DSA-4240 (Google Search) https://www.debian.org/security/2018/dsa-4240 https://www.exploit-db.com/exploits/44846/ https://lists.debian.org/debian-lts-announce/2018/03/msg00030.html https://lists.debian.org/debian-lts-announce/2018/06/msg00005.html http://www.securitytracker.com/id/1041607 |
Copyright | Copyright (C) 2018 Greenbone Networks GmbH |
Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |