lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1HePkb-0006h9-5e@artemis.annvix.ca>
Date: Thu, 19 Apr 2007 00:04:13 -0600
From: security@...driva.com
To: bugtraq@...urityfocus.com
Subject: [ MDKSA-2007:090 ] - Updated php packages fix multiple vulnerabilities


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________
 
 Mandriva Linux Security Advisory                         MDKSA-2007:090
 http://www.mandriva.com/security/
 _______________________________________________________________________
 
 Package : php
 Date    : April 18, 2007
 Affected: 2007.1
 _______________________________________________________________________
 
 Problem Description:
 
 A heap-based buffer overflow vulnerability was found in PHP's gd
 extension.  A script that could be forced to process WBMP images
 from an untrusted source could result in arbitrary code execution
 (CVE-2007-1001).
 
 A DoS flaw was found in how PHP processed a deeply nested array.
 A remote attacker could cause the PHP intrerpreter to creash
 by submitting an input variable with a deeply nested array
 (CVE-2007-1285).
 
 The internal filter module in PHP in certain instances did not properly
 strip HTML tags, which allowed a remote attacker conduct cross-site
 scripting (XSS) attacks (CVE-2007-1454).
 
 A vulnerability in the way the mbstring extension set global variables
 was discovered where a script using the mb_parse_str() function to
 set global variables could be forced to to enable the register_globals
 configuration option, possibly resulting in global variable injection
 (CVE-2007-1583).
 
 A vulnerability in how PHP's mail() function processed header data was
 discovered.  If a script sent mail using a subject header containing
 a string from an untrusted source, a remote attacker could send bulk
 email to unintended recipients (CVE-2007-1718).
 
 Updated packages have been patched to correct these issues.  Also note
 that the default use of Suhosin helped to protect against some of
 these issues prior to patching.
 _______________________________________________________________________

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1001
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1285
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1454
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1583
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1718
 _______________________________________________________________________
 
 Updated Packages:
 
 Mandriva Linux 2007.1:
 a2a2d7b7103fdaefa792d445d22a65c3  2007.1/i586/libphp5_common5-5.2.1-4.1mdv2007.1.i586.rpm
 9aeac43a52784427a4feb19e1d266b50  2007.1/i586/php-cgi-5.2.1-4.1mdv2007.1.i586.rpm
 2b5d544dffdb4aa89d74109898205555  2007.1/i586/php-cli-5.2.1-4.1mdv2007.1.i586.rpm
 e57b07915a9f7baa656ca9f1eb7ddf1a  2007.1/i586/php-devel-5.2.1-4.1mdv2007.1.i586.rpm
 820500b3ffddc56ccbd59518a96f160a  2007.1/i586/php-fcgi-5.2.1-4.1mdv2007.1.i586.rpm
 4bf3300a9e01fa6a3c0c8ebb983f5046  2007.1/i586/php-filter-5.2.1-0.1mdv2007.1.i586.rpm
 e7765fa71f78bd86f7f12785c0f9cfd9  2007.1/i586/php-gd-5.2.1-1.1mdv2007.1.i586.rpm
 49798b443ac0053b48efa66685ecfc44  2007.1/i586/php-mbstring-5.2.1-1.1mdv2007.1.i586.rpm
 29f23607a64ba27a0038410a369fc5c0  2007.1/i586/php-openssl-5.2.1-4.1mdv2007.1.i586.rpm
 408130c6dac0f507a0b4068174a839d4  2007.1/i586/php-zlib-5.2.1-4.1mdv2007.1.i586.rpm 
 e3ac02eafad5c201bee1099689d18255  2007.1/SRPMS/php-5.2.1-4.1mdv2007.1.src.rpm
 99b6a369a952a88ee5ecb45685777fc6  2007.1/SRPMS/php-filter-5.2.1-0.1mdv2007.1.src.rpm
 87967aa8a608f6f832dc070bd8842237  2007.1/SRPMS/php-gd-5.2.1-1.1mdv2007.1.src.rpm
 c8f6ec004c7e19e0afe0eaf332b756ad  2007.1/SRPMS/php-mbstring-5.2.1-1.1mdv2007.1.src.rpm

 Mandriva Linux 2007.1/X86_64:
 75e3b41a9434c1603912e5a7ac4e729f  2007.1/x86_64/lib64php5_common5-5.2.1-4.1mdv2007.1.x86_64.rpm
 eb7fc029538ffda1cb559727bf9f28a6  2007.1/x86_64/php-cgi-5.2.1-4.1mdv2007.1.x86_64.rpm
 f2a9eae5208089fbb947269a059ef635  2007.1/x86_64/php-cli-5.2.1-4.1mdv2007.1.x86_64.rpm
 e8b51aded5740f8d77ebee58e13233c5  2007.1/x86_64/php-devel-5.2.1-4.1mdv2007.1.x86_64.rpm
 df8bdb532d4e7ac8a9e9a7a14293a603  2007.1/x86_64/php-fcgi-5.2.1-4.1mdv2007.1.x86_64.rpm
 ebef91bd51938b885377d8df7ebb34d0  2007.1/x86_64/php-filter-5.2.1-0.1mdv2007.1.x86_64.rpm
 c0d265c231fdeadc7800c95fa27b0fe2  2007.1/x86_64/php-gd-5.2.1-1.1mdv2007.1.x86_64.rpm
 4e8fc08c860aef6e5cb1dc786a19025a  2007.1/x86_64/php-mbstring-5.2.1-1.1mdv2007.1.x86_64.rpm
 5e2642693f86c41afa9123e7be9592c1  2007.1/x86_64/php-openssl-5.2.1-4.1mdv2007.1.x86_64.rpm
 e1117e3ab380560cb1135799573d3fad  2007.1/x86_64/php-zlib-5.2.1-4.1mdv2007.1.x86_64.rpm 
 e3ac02eafad5c201bee1099689d18255  2007.1/SRPMS/php-5.2.1-4.1mdv2007.1.src.rpm
 99b6a369a952a88ee5ecb45685777fc6  2007.1/SRPMS/php-filter-5.2.1-0.1mdv2007.1.src.rpm
 87967aa8a608f6f832dc070bd8842237  2007.1/SRPMS/php-gd-5.2.1-1.1mdv2007.1.src.rpm
 c8f6ec004c7e19e0afe0eaf332b756ad  2007.1/SRPMS/php-mbstring-5.2.1-1.1mdv2007.1.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (GNU/Linux)

iD8DBQFGJtwnmqjQ0CJFipgRAhMsAKCORTCS969CbEP1bMiIUpPqkIXHCACdFGAd
ngX17q5SRWoiQyfNvJEhBnw=
=4qw+
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ