php5.4.x缓冲区溢出,英文漏洞报告解读(一)——PHP 5.4.x < 5.4.32 Multiple Vulnerabilities...

Nessus扫描报告-----------------------------------------------------

----------------------------------------------------------------------------------------------------------

High

PHP 5.4.x < 5.4.32 Multiple Vulnerabilities

Description

According to its banner, the remote web server is running a version of PHP 5.4.x prior to 5.4.32. It is, therefore, affected by the following vulnerabilities :

- LibGD contains a NULL pointer dereference flaw in its ‘gdImageCreateFromXpm‘ function in the ‘gdxpm.c‘ file.

By using a specially crafted color mapping, a remote attacker could cause a denial of service.

(CVE-2014-2497)

- The original upstream patch for CVE-2013-7345 did not provide a complete solution. It is, therefore, still possible for a remote attacker to deploy a specially crafted input file to cause excessive resources to be used when trying to detect the file type using awk regular expression rules. This can cause a denial of service. (CVE-2014-3538)

- An integer overflow flaw exists in the ‘cdf.c‘ file. By using a specially crafted CDF file, a remote attacker could cause a denial of service. (CVE-2014-3587)

- There are multiple buffer overflow flaws in the ‘dns.c‘ file related to the ‘dns_get_record‘ and ‘dn_expand‘ functions. By using a specially crafted DNS record, a remote attacker could exploit these to cause a denial of service or execute arbitrary code. (CVE-2014-3597)

- A flaw exists in the ‘spl_dllist.c‘ file that may lead to a use-after-free condition in the SPL component when iterating over an object. An attacker could utilize this to cause a denial of service. (CVE-2014-4670)

- A flaw exists in the ‘spl_array.c‘ file that may lead to a use-after-free condition in the SPL component when handling the modification of objects while sorting. An attacker could utilize this to cause a denial of service. (CVE-2014-4698)

- There exist multiple flaws in the GD component within the ‘gd_ctx.c‘ file where user-supplied input is not properly validated to ensure that pathnames lack %00 sequences. By using specially crafted input, a remote attacker could overwrite arbitrary files.

(CVE-2014-5120)

Note that Nessus has not attempted to exploit these issues, but has instead relied only on the application‘s self-reported version number.

Solution

Upgrade to PHP version 5.4.32 or later.

----------------------------------------

漏洞报告中文对照:如有不妥之处欢迎指正------------------------------------------------

------------------------------------------------------------------------------------------------------------------------------------------------

漏洞标题:PHP 5.4.x <5.4.32多个漏洞

漏洞类型:通用型

漏洞等级:高危

简要描述:

根据其版本,不再支持在远程主机上安装PHP。

缺乏支持意味着供应商不会发布该产品的新安全补丁。因此,它可能包含安全漏洞。

详细细节:

根据其标题,远程Web服务器在5.4.32之前运行PHP 5.4.x版本。因此,它受到以下漏洞的影响:

- LibGD在‘gdxpm.c‘文件的‘gdImageCreateFromXpm‘函数中包含一个NULL指针解引用缺陷。

通过使用特制的颜色映射,远程攻击者可能会导致拒绝服务。

(CVE-2014-2497)

- CVE-2013-7345 的原始上游补丁未提供完整的解决方案。因此,远程攻击者仍然可以部署特制的输入文件,以便在尝试使用awk正则表达式规则检测文件类型时使用过多的资源。这可能会导致拒绝服务。(CVE-2014-3538)

- ‘cdf.c‘文件中存在整数溢出缺陷。通过使用特制的CDF文件,远程攻击者可能会导致拒绝服务。(CVE-2014-3587)

- ‘dns.c‘文件中存在多个与‘dns_get_record‘和‘dn_expand‘函数相关的缓冲区溢出缺陷。通过使用特制的DNS记录,远程攻击者可以利用这些记录来导致拒绝服务或执行任意代码。(CVE-2014-3597)

- ‘spl_dllist.c‘文件中存在一个缺陷,当在对象上进行迭代时,该缺陷可能导致SPL组件中的释放后使用条件。攻击者可以利用此漏洞导致拒绝服务。(CVE-2014-4670)

- ‘spl_array.c‘文件中存在一个缺陷,当在排序时处理对象的修改时,这可能导致SPL组件中的释放后使用条件。攻击者可以利用此漏洞导致拒绝服务。(CVE-2014-4698)

- ‘gd_ctx.c‘文件中的GD组件中存在多个缺陷,其中未正确验证用户提供的输入以确保路径名缺少%00序列。通过使用特制输入,远程攻击者可以覆盖任意文件。

(CVE-2014-5120)

修复方案:升级到PHP版本5.4.32或更高版本。

原文:https://www.cnblogs.com/Erma/p/9585039.html

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值