Heloo people !

Networking/Security Forums -> Exploits // System Weaknesses

Author: slashlinux PostPosted: Mon Jul 19, 2010 1:30 am    Post subject: Heloo people !
    ----
I`m new here!

I have home debial linux server with all, apache, dovecot, dns....
and i have scaned my server with nessus !

And i get this :

Synopsis
The remote web server uses a version of PHP that is affected by
multiple flaws.

Description
According to its banner, the version of PHP installed on the remote
host is older than 5.2.12. Such versions may be affected by several
security issues :

- It is possible to bypass the 'safe_mode' configuration
setting using 'tempnam()'. (CVE-2009-3557)

- It is possible to bypass the 'open_basedir'
configuration setting using 'posix_mkfifo()'.
(CVE-2009-3558)

- Provided file uploading is enabled (it is by default),
an attacker can upload files using a POST request with
'multipart/form-data' content even if the target script
doesn't actually support file uploads per se. By
supplying a large number (15,000+) of files, he may be
able to cause the web server to stop responding while
it processes the file list. (CVE-2009-4017)

- Missing protection for '$_SESSION' from interrupt
corruption and improved 'session.save_path' check.
(CVE-2009-4143)

- Insufficient input string validation in the
'htmlspecialchars()' function. (CVE-2009-4142)

Solution
Upgrade to PHP version 5.2.12 or later.

See Also
http://www.nessus.org/u?57f2d08f
http://www.php.net/releases/5_2_12.php
http://www.php.net/ChangeLog-5.php#5.2.12

CVSS
6.8 (CVSS2#AV:N/AC:M/Au:N/CRazz/IRazz/ARazz)

Plugin Output
PHP version 5.2.9 appears to be running on the remote host based on
the following Server response header :

Server: Apache/2.2.15 (Unix) mod_ssl/2.2.15 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.9

CVE
CVE-2009-3557
CVE-2009-3558
CVE-2009-4017
CVE-2009-4142
CVE-2009-4143

BID
37389
37390

Xref
OSVDB:61208
OSVDB:61209
Secunia:37821

..................................



And where is the vulnerability? who is it?what exploit can i use ??



Networking/Security Forums -> Exploits // System Weaknesses


output generated using printer-friendly topic mod, All times are GMT + 2 Hours

Page 1 of 1

Powered by phpBB 2.0.x © 2001 phpBB Group