Anfälligkeitssuche        Suche in 219043 CVE Beschreibungen
und 99761 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.57313
Kategorie:Turbolinux Local Security Tests
Titel:Turbolinux TLSA-2006-23 (php)
Zusammenfassung:NOSUMMARY
Beschreibung:Description:

The remote host is missing an update to php
announced via advisory TLSA-2006-23.

PHP is an HTML-embedded scripting language.
Buffer overflow vulnerability exists in the sscanf function in the php.

The vulnerability may allow remote attackers to execute arbitrary code.

Solution: Please use the turbopkg (zabom) tool to apply the update.
https://secure1.securityspace.com/smysecure/catid.html?in=TLSA-2006-23

Risk factor : Medium

CVSS Score:
4.6

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2006-4020
BugTraq ID: 19415
http://www.securityfocus.com/bid/19415
Bugtraq: 20060804 php local buffer underflow could lead to arbitary code execution (Google Search)
http://www.securityfocus.com/archive/1/442438/30/0/threaded
http://security.gentoo.org/glsa/glsa-200608-28.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2006:144
http://www.plain-text.info/sscanf_bug.txt
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11062
http://www.redhat.com/support/errata/RHSA-2006-0669.html
http://www.redhat.com/support/errata/RHSA-2006-0682.html
RedHat Security Advisories: RHSA-2006:0688
http://rhn.redhat.com/errata/RHSA-2006-0688.html
RedHat Security Advisories: RHSA-2006:0736
http://rhn.redhat.com/errata/RHSA-2006-0736.html
http://securitytracker.com/id?1016984
http://secunia.com/advisories/21403
http://secunia.com/advisories/21467
http://secunia.com/advisories/21546
http://secunia.com/advisories/21608
http://secunia.com/advisories/21683
http://secunia.com/advisories/21768
http://secunia.com/advisories/21847
http://secunia.com/advisories/22004
http://secunia.com/advisories/22039
http://secunia.com/advisories/22069
http://secunia.com/advisories/22440
http://secunia.com/advisories/22487
http://secunia.com/advisories/22538
http://secunia.com/advisories/23247
SGI Security Advisory: 20061001-01-P
ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.asc
http://securityreason.com/securityalert/1341
SuSE Security Announcement: SUSE-SA:2006:052 (Google Search)
http://www.novell.com/linux/security/advisories/2006_52_php.html
SuSE Security Announcement: SUSE-SR:2006:019 (Google Search)
http://www.novell.com/linux/security/advisories/2006_19_sr.html
SuSE Security Announcement: SUSE-SR:2006:020 (Google Search)
http://www.novell.com/linux/security/advisories/2006_20_sr.html
SuSE Security Announcement: SUSE-SR:2006:022 (Google Search)
http://www.novell.com/linux/security/advisories/2006_22_sr.html
http://www.ubuntu.com/usn/usn-342-1
http://www.vupen.com/english/advisories/2006/3193
CopyrightCopyright (c) 2006 E-Soft Inc. http://www.securityspace.com

Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2024 E-Soft Inc. Alle Rechte vorbehalten.