[<prev] [next>] [day] [month] [year] [list]
Message-ID: <4626413e.dLqkUb+HI1OiUlFN%announce-noreply@rpath.com>
Date: Wed, 18 Apr 2007 12:03:10 -0400
From: rPath Update Announcements <announce-noreply@...th.com>
To: security-announce@...ts.rpath.com, update-announce@...ts.rpath.com
Cc: lwn@....net, full-disclosure@...ts.grok.org.uk, bugtraq@...urityfocus.com
Subject: rPSA-2007-0073-1 php php-mysql php-pgsql
rPath Security Advisory: 2007-0073-1
Published: 2007-04-18
Products: rPath Linux 1
Rating: Severe
Exposure Level Classification:
Remote System User Deterministic Unauthorized Access
Updated Versions:
php=/conary.rpath.com@rpl:devel//1/4.3.11-15.10-1
php-mysql=/conary.rpath.com@rpl:devel//1/4.3.11-15.10-1
php-pgsql=/conary.rpath.com@rpl:devel//1/4.3.11-15.10-1
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1285
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1286
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1583
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1711
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1001
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0455
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0906
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0910
https://issues.rpath.com/browse/RPL-1268
Description:
Previous versions of the php package are vulnerable to many attacks,
the worst of which enable various remote attackers to run arbitrary
code as the "apache" user. These vulnerabilities are exposed by a
wide variety of applications written in the PHP language.
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists