Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | |||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.892261 |
Kategorie: | Debian Local Security Checks |
Titel: | Debian LTS: Security Advisory for php5 (DLA-2261-1) |
Zusammenfassung: | The remote host is missing an update for the 'php5'; package(s) announced via the DLA-2261-1 advisory. |
Beschreibung: | Summary: The remote host is missing an update for the 'php5' package(s) announced via the DLA-2261-1 advisory. Vulnerability Insight: It has been discovered, that a vulnerability in php5, a server-side, HTML-embedded scripting language, could lead to exhausted disk space on the server. When using overly long filenames or field names, a memory limit could be hit which results in stopping the upload but not cleaning up behind. Further the embedded version of 'file' is vulnerable to CVE-2019-18218. As it can not be exploited the same in php5 as in file, this issue is not handled as an own CVE but just as a bug, that has been fixed here (restrict the number of CDF_VECTOR elements to prevent a heap-based buffer overflow (4-byte out-of-bounds write)). Affected Software/OS: 'php5' package(s) on Debian Linux. Solution: For Debian 8 'Jessie', this problem has been fixed in version 5.6.40+dfsg-0+deb8u12. We recommend that you upgrade your php5 packages. CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2019-11048 Common Vulnerability Exposure (CVE) ID: CVE-2019-18218 |
Copyright | Copyright (C) 2020 Greenbone Networks GmbH |
Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |