[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1PcTM5-0001Yv-0W@titan.mandriva.com>
Date: Tue, 11 Jan 2011 02:49:00 +0100
From: security@...driva.com
To: full-disclosure@...ts.grok.org.uk
Subject: [ MDVSA-2011:004 ] php-phar
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDVSA-2011:004
http://www.mandriva.com/security/
_______________________________________________________________________
Package : php-phar
Date : January 10, 2011
Affected: Enterprise Server 5.0
_______________________________________________________________________
Problem Description:
A vulnerability has been found and corrected in php-phar:
Multiple format string vulnerabilities in the phar extension in PHP
5.3 before 5.3.2 allow context-dependent attackers to obtain sensitive
information (memory contents) and possibly execute arbitrary code
via a crafted phar:// URI that is not properly handled by the (1)
phar_stream_flush, (2) phar_wrapper_unlink, (3) phar_parse_url, or
(4) phar_wrapper_open_url functions in ext/phar/stream.c; and the (5)
phar_wrapper_open_dir function in ext/phar/dirstream.c, which triggers
errors in the php_stream_wrapper_log_error function (CVE-2010-2094).
The updated packages have been upgraded to the latest version (2.0.0)
and patched to correct this issue.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2094
_______________________________________________________________________
Updated Packages:
Mandriva Enterprise Server 5:
18ac572d36b85d01b8d2887b5ac66306 mes5/i586/php-phar-2.0.0-0.1mdvmes5.1.i586.rpm
66fed8527abc284d6b41e547fa9f7fe5 mes5/SRPMS/php-phar-2.0.0-0.1mdvmes5.1.src.rpm
Mandriva Enterprise Server 5/X86_64:
64664dc1a71b0b0df61a14faf178d737 mes5/x86_64/php-phar-2.0.0-0.1mdvmes5.1.x86_64.rpm
66fed8527abc284d6b41e547fa9f7fe5 mes5/SRPMS/php-phar-2.0.0-0.1mdvmes5.1.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iD8DBQFNK4v8mqjQ0CJFipgRAi0HAKDW8sKRC6nuVSZIUcvISH4wJ9BYPgCgxNKx
NRVMwDjjYWWLjWhl1UX1m+U=
=e10m
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists