[Forgot Password]
Login  Register Subscribe

23631

 
 

126941

 
 

98503

 
 

909

 
 

79321

 
 

109

Paid content will be excluded from the download.


Download | Alert*
OVAL

USN-761-1 -- php5 vulnerabilities

ID: oval:org.secpod.oval:def:700321Date: (C)2011-05-13   (M)2017-11-27
Class: PATCHFamily: unix




It was discovered that PHP did not sanitize certain error messages when display_errors is enabled, which could result in browsers becoming vulnerable to cross-site scripting attacks when processing the output. With cross-site scripting vulnerabilities, if a user were tricked into viewing server output during a crafted server request, a remote attacker could exploit this to modify the contents, or steal confidential data , within the same domain. It was discovered that PHP did not properly handle the mbstring.func_overload setting within .htaccess files when using virtual hosts. A virtual host administrator could use this flaw to cause settings to be applied to other virtual hosts on the same server. It was discovered that PHP did not properly handle certain malformed strings when being parsed by the json_decode function. A remote attacker could exploit this flaw and cause the PHP server to crash, resulting in a denial of service. This issue only affected Ubuntu 8.04 and 8.10

Platform:
Ubuntu 8.04
Ubuntu 6.06
Ubuntu 8.10
Product:
php5
Reference:
USN-761-1
CVE-2008-5814
CVE-2009-0754
CVE-2009-1271
CVE    3
CVE-2008-5814
CVE-2009-0754
CVE-2009-1271
CPE    3
cpe:/o:ubuntu:ubuntu_linux:8.04
cpe:/o:ubuntu:ubuntu_linux:6.06
cpe:/o:ubuntu:ubuntu_linux:8.10

© 2013 SecPod Technologies