File: gentoo_GLSA-200402-01.nasl

package info (click to toggle)
nessus-plugins 2.2.8-1.1
  • links: PTS
  • area: main
  • in suites: etch, etch-m68k
  • size: 15,508 kB
  • ctags: 251
  • sloc: sh: 8,346; ansic: 4,452; pascal: 3,089; perl: 704; makefile: 172; php: 1
file content (69 lines) | stat: -rw-r--r-- 2,581 bytes parent folder | download | duplicates (2)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
# This script was automatically generated from 
#  http://www.gentoo.org/security/en/glsa/glsa-200402-01.xml
# It is released under the Nessus Script Licence.
# The messages are release under the Creative Commons - Attribution /
# Share Alike license. See http://creativecommons.org/licenses/by-sa/2.0/
#
# Avisory is copyright 2001-2005 Gentoo Foundation, Inc.
# GLSA2nasl Convertor is copyright 2004 Michel Arboi <mikhail@nessus.org>

if (! defined_func('bn_random')) exit(0);

if (description)
{
 script_id(14445);
 script_version("$Revision: 1.2 $");
 script_xref(name: "GLSA", value: "200402-01");

 desc = 'The remote host is affected by the vulnerability described in GLSA-200402-01
(PHP setting leaks from .htaccess files on virtual hosts)


    If the server configuration "php.ini" file has
    "register_globals = on" and a request is made to one virtual host
    (which has "php_admin_flag register_globals off") and the next
    request is sent to the another virtual host (which does not have the
    setting) through the same apache child, the setting will persist.
  
Impact

    Depending on the server and site, an attacker may be able to exploit
    global variables to gain access to reserved areas, such as MySQL passwords,
    or this vulnerability may simply cause a lack of functionality. As a
    result, users are urged to upgrade their PHP installations.
    Gentoo ships PHP with "register_globals" set to "off"
    by default.
    This issue affects both servers running Apache 1.x and servers running
    Apache 2.x.
  
Workaround

    No immediate workaround is available; a software upgrade is required.
  
References:
    http://bugs.php.net/bug.php?id=25753


Solution: 
    All users are recommended to upgrade their PHP installation to 4.3.4-r4:
    # emerge sync
    # emerge -pv ">=dev-php/mod_php-4.3.4-r4"
    # emerge ">=dev-php/mod_php-4.3.4-r4"
  

Risk factor : Medium
';
 script_description(english: desc);
 script_copyright(english: "(C) 2005 Michel Arboi <mikhail@nessus.org>");
 script_name(english: "[GLSA-200402-01] PHP setting leaks from .htaccess files on virtual hosts");
 script_category(ACT_GATHER_INFO);
 script_family(english: "Gentoo Local Security Checks");
 script_dependencies("ssh_get_info.nasl");
 script_require_keys('Host/Gentoo/qpkg-list');
 script_summary(english: 'PHP setting leaks from .htaccess files on virtual hosts');
 exit(0);
}

include('qpkg.inc');
if (qpkg_check(package: "dev-php/mod_php", unaffected: make_list("ge 4.3.4-r4"), vulnerable: make_list("lt 4.3.4-r4")
)) { security_warning(0); exit(0); }