exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Debian Security Advisory 4353-1

Debian Security Advisory 4353-1
Posted Dec 11, 2018
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4353-1 - Multiple security issues were found in PHP, a widely-used open source denial of service/information disclosure when parsing malformed images, the Apache module allowed cross-site-scripting via the body of a insufficient input validation which can result in the execution of arbitrary shell commands in the imap_open() function and denial of service in the imap_mail() function.

tags | advisory, denial of service, arbitrary, shell, php, info disclosure
systems | linux, debian
advisories | CVE-2018-14851, CVE-2018-14883, CVE-2018-17082, CVE-2018-19518, CVE-2018-19935
SHA-256 | 98d965a957a19f94b8ce6435161a43984df2051692685d685860e9e645957bff

Debian Security Advisory 4353-1

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4353-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
December 10, 2018 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : php7.0
CVE ID : CVE-2018-14851 CVE-2018-14883 CVE-2018-17082
CVE-2018-19518 CVE-2018-19935

Multiple security issues were found in PHP, a widely-used open source
general purpose scripting language: The EXIF module was susceptible to
denial of service/information disclosure when parsing malformed images,
the Apache module allowed cross-site-scripting via the body of a
"Transfer-Encoding: chunked" request and the IMAP extension performed
insufficient input validation which can result in the execution of
arbitrary shell commands in the imap_open() function and denial of
service in the imap_mail() function.

For the stable distribution (stretch), these problems have been fixed in
version 7.0.33-0+deb9u1.

We recommend that you upgrade your php7.0 packages.

For the detailed security status of php7.0 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/php7.0

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
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AGAh
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close