• RSS
  • Twitter
  • FaceBook

Security Forums

Log in

FAQ | Search | Usergroups | Profile | Register | RSS | Posting Guidelines | Recent Posts

Heloo people !

Users browsing this topic:0 Security Fans, 0 Stealth Security Fans
Registered Security Fans: None
Post new topic   Reply to topic   Printer-friendly version    Networking/Security Forums Index -> Exploits // System Weaknesses

View previous topic :: View next topic  
Author Message
slashlinux
Just Arrived
Just Arrived


Joined: 19 Jul 2010
Posts: 0


Offline

PostPosted: Mon Jul 19, 2010 1:30 am    Post subject: Heloo people ! Reply with quote

I`m new here!

I have home debial linux server with all, apache, dovecot, dns....
and i have scaned my server with nessus !

And i get this :

Synopsis
The remote web server uses a version of PHP that is affected by
multiple flaws.

Description
According to its banner, the version of PHP installed on the remote
host is older than 5.2.12. Such versions may be affected by several
security issues :

- It is possible to bypass the 'safe_mode' configuration
setting using 'tempnam()'. (CVE-2009-3557)

- It is possible to bypass the 'open_basedir'
configuration setting using 'posix_mkfifo()'.
(CVE-2009-3558)

- Provided file uploading is enabled (it is by default),
an attacker can upload files using a POST request with
'multipart/form-data' content even if the target script
doesn't actually support file uploads per se. By
supplying a large number (15,000+) of files, he may be
able to cause the web server to stop responding while
it processes the file list. (CVE-2009-4017)

- Missing protection for '$_SESSION' from interrupt
corruption and improved 'session.save_path' check.
(CVE-2009-4143)

- Insufficient input string validation in the
'htmlspecialchars()' function. (CVE-2009-4142)

Solution
Upgrade to PHP version 5.2.12 or later.

See Also
http://www.nessus.org/u?57f2d08f
http://www.php.net/releases/5_2_12.php
http://www.php.net/ChangeLog-5.php#5.2.12

CVSS
6.8 (CVSS2#AV:N/AC:M/Au:N/CRazz/IRazz/ARazz)

Plugin Output
PHP version 5.2.9 appears to be running on the remote host based on
the following Server response header :

Server: Apache/2.2.15 (Unix) mod_ssl/2.2.15 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.9

CVE
CVE-2009-3557
CVE-2009-3558
CVE-2009-4017
CVE-2009-4142
CVE-2009-4143

BID
37389
37390

Xref
OSVDB:61208
OSVDB:61209
Secunia:37821

..................................



And where is the vulnerability? who is it?what exploit can i use ??
Back to top
View user's profile Send private message
Display posts from previous:   

Post new topic   Reply to topic   Printer-friendly version    Networking/Security Forums Index -> Exploits // System Weaknesses All times are GMT + 2 Hours
Page 1 of 1


 
Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum

Community Area

Log in | Register