Interpretation of English Vulnerability report (i)--php 5.4.x < 5.4.32 multiple vulnerabilities

Source: Internet
Author: User
Tags spl cve nessus scan

---------------------------------nessus Scan Report-----------------------------------------------------
----------------------------------------------------------------------------------------------------------
High
PHP 5.4.x < 5.4.32 multiple vulnerabilities
Description
According to it banner, the remote Web server is running a version of PHP 5.4.x prior to 5.4.32. It is, therefore, affected by the following vulnerabilities:
-LIBGD contains a NULL pointer dereference flaw in it ' gdimagecreatefromxpm ' function in the ' gdxpm.c ' file.
By using a specially crafted color mapping, a remote attacker could cause a denial of service.
(cve-2014-2497)-The original upstream patch for cve-2013-7345 do not provide a complete solution. It is, therefore, still possible for a remote attacker to deploy a specially crafted input file to cause excessive RESOURC Es to is used when trying to detect the file type using awk regular expression rules. This can cause a denial of service. (cve-2014-3538)
-an integer overflow flaw exists in the ' cdf.c ' file. By using a specially crafted CDF file, a remote attacker could cause a denial of service. (cve-2014-3587)
-There is multiple buffer overflow flaws in the ' dns.c ' file related to the ' Dns_get_record ' and ' Dn_expand ' functions. By using a specially crafted DNS record, a remote attacker could exploit these to cause a denial of service or execute ARB Itrary code. (cve-2014-3597)
-A flaw exists in the ' spl_dllist.c ' file, the May leads to A use-after-free condition in the SPL component when iterating Over an object. An attacker could utilize this to cause a denial of service. (cve-2014-4670)
-A flaw exists in the ' spl_array.c ' file, the May leads to A use-after-free condition in the SPL component when handling t He modification of objects while sorting. An attacker could utilize this to cause a denial of service. (cve-2014-4698)
-there exist multiple flaws in the GD component within the ' gd_ctx.c ' file where user-supplied input was not properly Vali Dated to ensure that pathnames lack%00 sequences. By using specially crafted input, a remote attacker could overwrite arbitrary files.
(cve-2014-5120) Note that Nessus have not attempted to exploit these issues, but have instead relied only on the application ' s self-reported Version number.
Solution
Upgrade to PHP version 5.4.32 or later.
----------------------------------------Vulnerability Report Chinese control: If there is something wrong, please correct me------------------------------------------------
--------------------------------------------------------------------------------------------------------------- ---------------------------------
Vulnerability title: PHP 5.4.x <5.4.32 multiple vulnerabilities
Vulnerability type: general-purpose
Vulnerability level: High risk
Brief description:
The installation of PHP on a remote host is no longer supported by its version.
Lack of support means that the vendor will not release new security patches for the product. Therefore, it may contain security vulnerabilities.
Detailed details:
Depending on its title, the remote Web server runs the PHP 5.4.x version before 5.4.32. Therefore, it is affected by the following vulnerabilities:
-LIBGD contains a null pointer dereference defect in the ' gdimagecreatefromxpm ' function of the ' gdxpm.c ' file.
By using a specially crafted color map, a remote attacker could cause a denial of service.
(cve-2014-2497)
-The original upstream patch of cve-2013-7345 does not provide a complete solution. As a result, remote attackers can still deploy specially crafted input files to use too many resources when trying to detect file types using awk regular expression rules. This may result in a denial of service. (cve-2014-3538)
-an integer overflow flaw exists in the ' cdf.c ' file. A remote attacker could cause a denial of service by using a specially crafted CDF file. (cve-2014-3587)
-There are multiple buffer overflow defects associated with ' dns_get_record ' and ' Dn_expand ' functions in the ' dns.c ' file. By using specially crafted DNS records, remote attackers can use these records to cause a denial of service or to execute arbitrary code. (cve-2014-3597)
-There is a flaw in the ' spl_dllist.c ' file that can cause a post-release usage condition in the SPL assembly when iterating over the object. An attacker could exploit this vulnerability to cause a denial of service. (cve-2014-4670)
-There is a flaw in the ' spl_array.c ' file, which can result in a post-release usage condition in the SPL component when the object is processed for modification at sort time. An attacker could exploit this vulnerability to cause a denial of service. (cve-2014-4698)
-There are multiple defects in the GD component in the ' gd_ctx.c ' file, where the user-supplied input is not properly validated to ensure that the path name is missing the%00 sequence. Remote attackers can overwrite arbitrary files by using specially crafted inputs.
(cve-2014-5120)
Fix scenario: Upgrade to PHP version 5.4.32 or later.

Interpretation of English Vulnerability report (i)--php 5.4.x < 5.4.32 multiple vulnerabilities

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.