[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1NEnZ2-0007He-T2@titan.mandriva.com>
Date: Sun, 29 Nov 2009 18:28:00 +0100
From: security@...driva.com
To: bugtraq@...urityfocus.com
Subject: [ MDVSA-2009:305 ] php
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDVSA-2009:305
http://www.mandriva.com/security/
_______________________________________________________________________
Package : php
Date : November 29, 2009
Affected: Corporate 3.0, Corporate 4.0, Multi Network Firewall 2.0
_______________________________________________________________________
Problem Description:
Some vulnerabilities were discovered and corrected in php:
PHP 5.2.11, and 5.3.x before 5.3.1, does not restrict the number
of temporary files created when handling a multipart/form-data POST
request, which allows remote attackers to cause a denial of service
(resource exhaustion), and makes it easier for remote attackers to
exploit local file inclusion vulnerabilities, via multiple requests,
related to lack of support for the max_file_uploads directive
(CVE-2009-4017).
The updated packages have been patched to correct these issues.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4017
_______________________________________________________________________
Updated Packages:
Corporate 3.0:
fdef0aab5f09878e3699418b72c214cd corporate/3.0/i586/libphp_common432-4.3.4-4.32.C30mdk.i586.rpm
5dd573cc5ce44c2aeea4c4b074d5dc0d corporate/3.0/i586/php432-devel-4.3.4-4.32.C30mdk.i586.rpm
c10153c08511a060cb0bd1fe62650244 corporate/3.0/i586/php-cgi-4.3.4-4.32.C30mdk.i586.rpm
dcf1106af7e2d85b3c97dfdcd1a389ff corporate/3.0/i586/php-cli-4.3.4-4.32.C30mdk.i586.rpm
31b7c19d5cc24d569f931a66dd189743 corporate/3.0/i586/php-ini-4.3.4-1.2.C30mdk.noarch.rpm
0edbc33999f0c3ea89274979bfaa1383 corporate/3.0/SRPMS/php-4.3.4-4.32.C30mdk.src.rpm
0f7d5371e221c065dae5df633a25b2bf corporate/3.0/SRPMS/php-ini-4.3.4-1.2.C30mdk.src.rpm
Corporate 3.0/X86_64:
57331f796957a2cdaf17ec1b7058893f corporate/3.0/x86_64/lib64php_common432-4.3.4-4.32.C30mdk.x86_64.rpm
9f081fb2c3760702dd20edec39542b68 corporate/3.0/x86_64/php432-devel-4.3.4-4.32.C30mdk.x86_64.rpm
e200e5a2f2c3f295d00f9af87b925f7b corporate/3.0/x86_64/php-cgi-4.3.4-4.32.C30mdk.x86_64.rpm
c5bd292c2bb5a8dcaa00f6f7494f827f corporate/3.0/x86_64/php-cli-4.3.4-4.32.C30mdk.x86_64.rpm
779611f1322a1c525eca29fbddd4d31a corporate/3.0/x86_64/php-ini-4.3.4-1.2.C30mdk.noarch.rpm
0edbc33999f0c3ea89274979bfaa1383 corporate/3.0/SRPMS/php-4.3.4-4.32.C30mdk.src.rpm
0f7d5371e221c065dae5df633a25b2bf corporate/3.0/SRPMS/php-ini-4.3.4-1.2.C30mdk.src.rpm
Corporate 4.0:
579acf668145864e21610ff1614faee1 corporate/4.0/i586/libphp4_common4-4.4.4-1.13.20060mlcs4.i586.rpm
79d3fb035f70c7d9360c5458788aec8a corporate/4.0/i586/php4-cgi-4.4.4-1.13.20060mlcs4.i586.rpm
54c94e3ca4521a6aef4d2273eb9ef140 corporate/4.0/i586/php4-cli-4.4.4-1.13.20060mlcs4.i586.rpm
2e014106d72fc661ccd430a5fc36e2ea corporate/4.0/i586/php4-devel-4.4.4-1.13.20060mlcs4.i586.rpm
4ba5982c7b2de7e64d84d9f9a72b187b corporate/4.0/i586/php4-ini-4.4.4-1.1.20060mlcs4.i586.rpm
24e1c9f9f2e18c9bd499b091b612451f corporate/4.0/SRPMS/php4-4.4.4-1.13.20060mlcs4.src.rpm
fc6ddef80946eab5c104d93c137cce6f corporate/4.0/SRPMS/php4-ini-4.4.4-1.1.20060mlcs4.src.rpm
Corporate 4.0/X86_64:
3673367f2065655c6c6956d46fe5cb40 corporate/4.0/x86_64/lib64php4_common4-4.4.4-1.13.20060mlcs4.x86_64.rpm
5d8073b77022027ae52807d9e6fa9ad0 corporate/4.0/x86_64/php4-cgi-4.4.4-1.13.20060mlcs4.x86_64.rpm
1b2fbdce98301d27f728291582fe1bb5 corporate/4.0/x86_64/php4-cli-4.4.4-1.13.20060mlcs4.x86_64.rpm
e63603fce6cd743e24a9daaea57e4158 corporate/4.0/x86_64/php4-devel-4.4.4-1.13.20060mlcs4.x86_64.rpm
0ebb3a50cac9be78aa58f70878172b37 corporate/4.0/x86_64/php4-ini-4.4.4-1.1.20060mlcs4.x86_64.rpm
24e1c9f9f2e18c9bd499b091b612451f corporate/4.0/SRPMS/php4-4.4.4-1.13.20060mlcs4.src.rpm
fc6ddef80946eab5c104d93c137cce6f corporate/4.0/SRPMS/php4-ini-4.4.4-1.1.20060mlcs4.src.rpm
Multi Network Firewall 2.0:
6d6ab3c75e122369a08072660fb34193 mnf/2.0/i586/libphp_common432-4.3.4-4.32.C30mdk.i586.rpm
d041d4fa041a72d09df0553db43ec372 mnf/2.0/i586/php432-devel-4.3.4-4.32.C30mdk.i586.rpm
6a549283056c664f895f8d3891667ff9 mnf/2.0/i586/php-cgi-4.3.4-4.32.C30mdk.i586.rpm
c20be6cce583ade37d6303b3e75d1c11 mnf/2.0/i586/php-cli-4.3.4-4.32.C30mdk.i586.rpm
d618ae651d9d6d7df2edcd6c0d8f09fc mnf/2.0/i586/php-ini-4.3.4-1.2.C30mdk.noarch.rpm
b583bb5e05e00e921d269e9fb57d0810 mnf/2.0/SRPMS/php-4.3.4-4.32.C30mdk.src.rpm
4bf37a9915cbafa029ad42d812a91937 mnf/2.0/SRPMS/php-ini-4.3.4-1.2.C30mdk.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iD8DBQFLEoOGmqjQ0CJFipgRAuAiAJwNJNHBoVWkNIQD8ZM8ahuPBXxS+QCgotx5
IvfPOpuN1y0a/GbDB4/Fp0M=
=fxQO
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists