[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247974

 
 

909

 
 

194654

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

USN-761-1 -- php5 vulnerabilities

ID: oval:org.secpod.oval:def:700321Date: (C)2011-05-13   (M)2024-02-19
Class: PATCHFamily: unix




It was discovered that PHP did not sanitize certain error messages when display_errors is enabled, which could result in browsers becoming vulnerable to cross-site scripting attacks when processing the output. With cross-site scripting vulnerabilities, if a user were tricked into viewing server output during a crafted server request, a remote attacker could exploit this to modify the contents, or steal confidential data , within the same domain. It was discovered that PHP did not properly handle the mbstring.func_overload setting within .htaccess files when using virtual hosts. A virtual host administrator could use this flaw to cause settings to be applied to other virtual hosts on the same server. It was discovered that PHP did not properly handle certain malformed strings when being parsed by the json_decode function. A remote attacker could exploit this flaw and cause the PHP server to crash, resulting in a denial of service. This issue only affected Ubuntu 8.04 and 8.10

Platform:
Ubuntu 8.04
Ubuntu 6.06
Ubuntu 8.10
Product:
php5
Reference:
USN-761-1
CVE-2008-5814
CVE-2009-0754
CVE-2009-1271
CVE    3
CVE-2008-5814
CVE-2009-0754
CVE-2009-1271
CPE    3
cpe:/o:ubuntu:ubuntu_linux:8.04
cpe:/o:ubuntu:ubuntu_linux:8.10
cpe:/o:ubuntu:ubuntu_linux:6.06

© SecPod Technologies