Skip to content

Instantly share code, notes, and snippets.

@TheDoctor0
Created October 25, 2019 08:27
Show Gist options
  • Save TheDoctor0/8ee5960f9068bb51857eeda3515a98ee to your computer and use it in GitHub Desktop.
Save TheDoctor0/8ee5960f9068bb51857eeda3515a98ee to your computer and use it in GitHub Desktop.
<?xml version="1.0" encoding="UTF-8"?>
<result id="8f0d38b1-71e1-4bf0-8a28-9d78e7d54563">
<name>PHP 'timelib_meridian' Heap Based Buffer Overflow Vulnerability (Windows)</name>
<owner>
<name>admin</name>
</owner>
<comment />
<creation_time>2019-10-14T14:12:27Z</creation_time>
<modification_time>2019-10-14T14:12:27Z</modification_time>
<user_tags>
<count>0</count>
</user_tags>
<detection>
<result id="210e6eba-3462-4af1-8c58-ae3b30865b13">
<details>
<detail>
<name>product</name>
<value>cpe:/a:php:php:5.2.6</value>
</detail>
<detail>
<name>location</name>
<value>443/tcp</value>
</detail>
<detail>
<name>source_oid</name>
<value>1.3.6.1.4.1.25623.1.0.800109</value>
</detail>
<detail>
<name>source_name</name>
<value>PHP Version Detection (Remote)</value>
</detail>
</details>
</result>
</detection>
<host>
192.168.1.175
<asset asset_id="cd362f6b-e032-4e0b-8b5b-75d3add1bf09" />
</host>
<port>443/tcp</port>
<nvt oid="1.3.6.1.4.1.25623.1.0.812072">
<type>nvt</type>
<name>PHP 'timelib_meridian' Heap Based Buffer Overflow Vulnerability (Windows)</name>
<family>Buffer overflow</family>
<cvss_base>5.0</cvss_base>
<cve>CVE-2017-16642</cve>
<bid>101745</bid>
<xref>URL:http://php.net/ChangeLog-5.php, URL:http://php.net/ChangeLog-7.php, URL:https://bugs.php.net/bug.php?id=75055, URL:http://www.php.net</xref>
<tags>cvss_base_vector=AV:N/AC:L/Au:N/C:P/I:N/A:N|summary=This host is installed with PHP and is prone
to heap buffer overflow vulnerability.|vuldetect=Checks if a vulnerable version is present on the target host.|insight=The flaw exists due to an error in the date
extension's 'timelib_meridian' handling of 'front of' and 'back of' directives.|impact=Successfully exploiting this issue allow
attacker to execute arbitrary code with elevated privileges within the context
of a privileged process.|affected=PHP versions before 5.6.32, 7.x before 7.0.25,
and 7.1.x before 7.1.11|solution=Upgrade to PHP version 5.6.32, 7.0.25, 7.1.11,
or later.|solution_type=VendorFix|qod_type=remote_banner</tags>
<cert>
<cert_ref type="CERT-Bund" id="CB-K18/0270" />
<cert_ref type="CERT-Bund" id="CB-K18/0048" />
<cert_ref type="CERT-Bund" id="CB-K17/2123" />
<cert_ref type="DFN-CERT" id="DFN-CERT-2019-1737" />
<cert_ref type="DFN-CERT" id="DFN-CERT-2018-0835" />
<cert_ref type="DFN-CERT" id="DFN-CERT-2018-0733" />
<cert_ref type="DFN-CERT" id="DFN-CERT-2018-0290" />
<cert_ref type="DFN-CERT" id="DFN-CERT-2018-0055" />
<cert_ref type="DFN-CERT" id="DFN-CERT-2017-2219" />
</cert>
</nvt>
<scan_nvt_version>$Revision: 11983 $</scan_nvt_version>
<threat>Medium</threat>
<severity>5.0</severity>
<qod>
<value>80</value>
<type>remote_banner</type>
</qod>
<description>Installed version: 5.2.6
Fixed version: 5.6.32
Installation
path / port: 443/tcp</description>
</result>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment