[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <200611142217.38959.bofh@softmedia.info>
Date: Tue, 14 Nov 2006 22:17:34 +0100
From: Marcello Barnaba <bofh@...tmedia.info>
To: bugtraq@...urityfocus.com
Subject: Re: Advisory 14/2006: Dotdeb PHP Email Header Injection Vulnerability
On Tuesday 14 November 2006 17:32, Stefan Esser wrote:
> Application: Dotdeb PHP < 5.2.0 Rev 3
> Severity: Calling PHP scripts with special crafted URLs
> can result in arbitrary email header injection
> Risk: Critical
> Vendor Status: Vendor has fixed this with Dotdeb PHP 5.2.0 rev 3
As far as I can see, the package diff for php4.4.4
http://packages.dotdeb.org/dists/stable/php4/source/php4_4.4.4-0.dotdeb.1.diff.gz
contains the vulnerable patch as well.
I wasn't unable to find a security contact (or even A contact) on dotdeb's web
site, nor I could find a version control system from which i could abstract
easily the security patch in order to easily backport it myself.
As a dotdeb user i'm a bit disappointed, but i also know that's because i
didn't check when i chose dotdeb as my php4 backporter for sarge, so i have
very little to complain.
Anyway, will the maintainer provide updated php4 packages as well?
For those of you interested in upgrading today, here is a diff between the
php4 mail patch and the new php5 mail patch: http://ca.pastebin.com/824455
--
pub 1024D/8D2787EF 723C 7CA3 3C19 2ACE 6E20 9CC1 9956 EB3C 8D27 87EF
Content of type "application/pgp-signature" skipped
Powered by blists - more mailing lists