lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1HePPj-0006ek-6K@artemis.annvix.ca>
Date: Wed, 18 Apr 2007 23:42:39 -0600
From: security@...driva.com
To: full-disclosure@...ts.grok.org.uk
Subject: [ MDKSA-2007:088 ] - Updated php packages fix
	multiple vulnerabilities


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________
 
 Mandriva Linux Security Advisory                         MDKSA-2007:088
 http://www.mandriva.com/security/
 _______________________________________________________________________
 
 Package : php
 Date    : April 18, 2007
 Affected: Corporate 4.0
 _______________________________________________________________________
 
 Problem Description:
 
 A heap-based buffer overflow vulnerability was found in PHP's gd
 extension.  A script that could be forced to process WBMP images
 from an untrusted source could result in arbitrary code execution
 (CVE-2007-1001).
 
 A DoS flaw was found in how PHP processed a deeply nested array.
 A remote attacker could cause the PHP intrerpreter to creash
 by submitting an input variable with a deeply nested array
 (CVE-2007-1285).
 
 A vulnerability was discovered in the way PHP's unserialize() function
 processed data.  A remote attacker able to pass arbitrary data to
 PHP's unserialize() function could possibly execute arbitrary code
 as the apache user (CVE-2007-1286).
 
 A vulnerability in the way the mbstring extension set global variables
 was discovered where a script using the mb_parse_str() function to
 set global variables could be forced to to enable the register_globals
 configuration option, possibly resulting in global variable injection
 (CVE-2007-1583).
 
 A double-free flaw was found in the session_decode() function that
 could allow a remote attacker to potentially execute arbitrary code
 as the apache user if they are able to pass arbitrary data to PHP's
 session_decode() function (CVE-2007-1711).
 
 A vulnerability in how PHP's mail() function processed header data was
 discovered.  If a script sent mail using a subject header containing
 a string from an untrusted source, a remote attacker could send bulk
 email to unintended recipients (CVE-2007-1718).
 
 A buffer overflow in the sqlite_decode_function() in the bundled
 sqlite library could allow context-dependent attackers to execute
 arbitrary code (CVE-2007-1887).
 
 Updated packages have been patched to correct these issues.  Also note
 that the default use of the Hardened PHP patch helped to protect
 against some of these issues prior to patching.
 _______________________________________________________________________

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1001
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1285
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1286
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1583
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1711
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1718
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1887
 _______________________________________________________________________
 
 Updated Packages:
 
 Corporate 4.0:
 d5181607c0ef1bd993637fe129e8cc50  corporate/4.0/i586/libphp4_common4-4.4.4-1.5.20060mlcs4.i586.rpm
 06dfc54d6c06fe4f249dc08b08a84c16  corporate/4.0/i586/php4-cgi-4.4.4-1.5.20060mlcs4.i586.rpm
 7702c8ee1766d8420f3ab5ba61b32aff  corporate/4.0/i586/php4-cli-4.4.4-1.5.20060mlcs4.i586.rpm
 55947a4305717c4b598d769b601470d0  corporate/4.0/i586/php4-devel-4.4.4-1.5.20060mlcs4.i586.rpm
 1e38d7f1eee4ae39b7b2c3508202404e  corporate/4.0/i586/php4-gd-4.4.4-1.1.20060mlcs4.i586.rpm
 fb27bc94b043c155e59e06f289108795  corporate/4.0/i586/php4-mbstring-4.4.4-1.1.20060mlcs4.i586.rpm
 d2745977e89970f8208257099443efca  corporate/4.0/i586/php4-sqlite-1.0.3-5.1.20060mlcs4.i586.rpm 
 33a9318558d73c76f2fe6b896915dd8f  corporate/4.0/SRPMS/php4-4.4.4-1.5.20060mlcs4.src.rpm
 d26b3a8e4541768bc502f23b332649d7  corporate/4.0/SRPMS/php4-gd-4.4.4-1.1.20060mlcs4.src.rpm
 c4e4d17b70730850abe1c3898000cf04  corporate/4.0/SRPMS/php4-mbstring-4.4.4-1.1.20060mlcs4.src.rpm
 e691ab99a73fb2854cc4c9ab4114c845  corporate/4.0/SRPMS/php4-sqlite-1.0.3-5.1.20060mlcs4.src.rpm

 Corporate 4.0/X86_64:
 da32934c2e180b55246f31fc998d7d0c  corporate/4.0/x86_64/lib64php4_common4-4.4.4-1.5.20060mlcs4.x86_64.rpm
 c301b2fd29988da6aeedfcd9f3f46386  corporate/4.0/x86_64/php4-cgi-4.4.4-1.5.20060mlcs4.x86_64.rpm
 be0122face0922bf0cb59ed018efe052  corporate/4.0/x86_64/php4-cli-4.4.4-1.5.20060mlcs4.x86_64.rpm
 e1d6ee2c35271751d0a312a3b3baf98e  corporate/4.0/x86_64/php4-devel-4.4.4-1.5.20060mlcs4.x86_64.rpm
 86c6a934cde38aa4ae5ac12bfad9f590  corporate/4.0/x86_64/php4-gd-4.4.4-1.1.20060mlcs4.x86_64.rpm
 b4452673937777650b1d7db6c9145176  corporate/4.0/x86_64/php4-mbstring-4.4.4-1.1.20060mlcs4.x86_64.rpm
 e4062b3737eb9b8a2c9d463a48dc42bd  corporate/4.0/x86_64/php4-sqlite-1.0.3-5.1.20060mlcs4.x86_64.rpm 
 33a9318558d73c76f2fe6b896915dd8f  corporate/4.0/SRPMS/php4-4.4.4-1.5.20060mlcs4.src.rpm
 d26b3a8e4541768bc502f23b332649d7  corporate/4.0/SRPMS/php4-gd-4.4.4-1.1.20060mlcs4.src.rpm
 c4e4d17b70730850abe1c3898000cf04  corporate/4.0/SRPMS/php4-mbstring-4.4.4-1.1.20060mlcs4.src.rpm
 e691ab99a73fb2854cc4c9ab4114c845  corporate/4.0/SRPMS/php4-sqlite-1.0.3-5.1.20060mlcs4.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (GNU/Linux)

iD8DBQFGJta9mqjQ0CJFipgRAtE+AJ4yNz1Q+/Iil9Rdnhu+kirGDuWtLQCgyN99
fL1wH505ivHHjbzdkZUuP3I=
=oLAd
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ