LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: July 18th, 2014
Linux Advisory Watch: July 13th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Mandriva: Updated php packages fix multiple vulnerabilities Print E-mail
User Rating:      How can I rate this item?
Posted by Benjamin D. Thomas   
Mandrake A heap-based buffer overflow vulnerability was found in PHP's gd extension. A script that could be forced to process WBMP images from an untrusted source could result in arbitrary code execution (CVE-2007-1001). A DoS flaw was found in how PHP processed a deeply nested array. A remote attacker could cause the PHP intrerpreter to creash by submitting an input variable with a deeply nested array (CVE-2007-1285).
 _______________________________________________________________________
 
 Mandriva Linux Security Advisory                         MDKSA-2007:090
 http://www.mandriva.com/security/
 _______________________________________________________________________
 
 Package : php
 Date    : April 18, 2007
 Affected: 2007.1
 _______________________________________________________________________
 
 Problem Description:
 
 A heap-based buffer overflow vulnerability was found in PHP's gd
 extension.  A script that could be forced to process WBMP images
 from an untrusted source could result in arbitrary code execution
 (CVE-2007-1001).
 
 A DoS flaw was found in how PHP processed a deeply nested array.
 A remote attacker could cause the PHP intrerpreter to creash
 by submitting an input variable with a deeply nested array
 (CVE-2007-1285).
 
 The internal filter module in PHP in certain instances did not properly
 strip HTML tags, which allowed a remote attacker conduct cross-site
 scripting (XSS) attacks (CVE-2007-1454).
 
 A vulnerability in the way the mbstring extension set global variables
 was discovered where a script using the mb_parse_str() function to
 set global variables could be forced to to enable the register_globals
 configuration option, possibly resulting in global variable injection
 (CVE-2007-1583).
 
 A vulnerability in how PHP's mail() function processed header data was
 discovered.  If a script sent mail using a subject header containing
 a string from an untrusted source, a remote attacker could send bulk
 email to unintended recipients (CVE-2007-1718).
 
 Updated packages have been patched to correct these issues.  Also note
 that the default use of Suhosin helped to protect against some of
 these issues prior to patching.
 _______________________________________________________________________

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1001
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1285
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1454
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1583
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1718
 _______________________________________________________________________
 
 Updated Packages:
 
 Mandriva Linux 2007.1:
 a2a2d7b7103fdaefa792d445d22a65c3  2007.1/i586/libphp5_common5-5.2.1-4.1mdv2007.1.i586.rpm
 9aeac43a52784427a4feb19e1d266b50  2007.1/i586/php-cgi-5.2.1-4.1mdv2007.1.i586.rpm
 2b5d544dffdb4aa89d74109898205555  2007.1/i586/php-cli-5.2.1-4.1mdv2007.1.i586.rpm
 e57b07915a9f7baa656ca9f1eb7ddf1a  2007.1/i586/php-devel-5.2.1-4.1mdv2007.1.i586.rpm
 820500b3ffddc56ccbd59518a96f160a  2007.1/i586/php-fcgi-5.2.1-4.1mdv2007.1.i586.rpm
 4bf3300a9e01fa6a3c0c8ebb983f5046  2007.1/i586/php-filter-5.2.1-0.1mdv2007.1.i586.rpm
 e7765fa71f78bd86f7f12785c0f9cfd9  2007.1/i586/php-gd-5.2.1-1.1mdv2007.1.i586.rpm
 49798b443ac0053b48efa66685ecfc44  2007.1/i586/php-mbstring-5.2.1-1.1mdv2007.1.i586.rpm
 29f23607a64ba27a0038410a369fc5c0  2007.1/i586/php-openssl-5.2.1-4.1mdv2007.1.i586.rpm
 408130c6dac0f507a0b4068174a839d4  2007.1/i586/php-zlib-5.2.1-4.1mdv2007.1.i586.rpm 
 e3ac02eafad5c201bee1099689d18255  2007.1/SRPMS/php-5.2.1-4.1mdv2007.1.src.rpm
 99b6a369a952a88ee5ecb45685777fc6  2007.1/SRPMS/php-filter-5.2.1-0.1mdv2007.1.src.rpm
 87967aa8a608f6f832dc070bd8842237  2007.1/SRPMS/php-gd-5.2.1-1.1mdv2007.1.src.rpm
 c8f6ec004c7e19e0afe0eaf332b756ad  2007.1/SRPMS/php-mbstring-5.2.1-1.1mdv2007.1.src.rpm

 Mandriva Linux 2007.1/X86_64:
 75e3b41a9434c1603912e5a7ac4e729f  2007.1/x86_64/lib64php5_common5-5.2.1-4.1mdv2007.1.x86_64.rpm
 eb7fc029538ffda1cb559727bf9f28a6  2007.1/x86_64/php-cgi-5.2.1-4.1mdv2007.1.x86_64.rpm
 f2a9eae5208089fbb947269a059ef635  2007.1/x86_64/php-cli-5.2.1-4.1mdv2007.1.x86_64.rpm
 e8b51aded5740f8d77ebee58e13233c5  2007.1/x86_64/php-devel-5.2.1-4.1mdv2007.1.x86_64.rpm
 df8bdb532d4e7ac8a9e9a7a14293a603  2007.1/x86_64/php-fcgi-5.2.1-4.1mdv2007.1.x86_64.rpm
 ebef91bd51938b885377d8df7ebb34d0  2007.1/x86_64/php-filter-5.2.1-0.1mdv2007.1.x86_64.rpm
 c0d265c231fdeadc7800c95fa27b0fe2  2007.1/x86_64/php-gd-5.2.1-1.1mdv2007.1.x86_64.rpm
 4e8fc08c860aef6e5cb1dc786a19025a  2007.1/x86_64/php-mbstring-5.2.1-1.1mdv2007.1.x86_64.rpm
 5e2642693f86c41afa9123e7be9592c1  2007.1/x86_64/php-openssl-5.2.1-4.1mdv2007.1.x86_64.rpm
 e1117e3ab380560cb1135799573d3fad  2007.1/x86_64/php-zlib-5.2.1-4.1mdv2007.1.x86_64.rpm 
 e3ac02eafad5c201bee1099689d18255  2007.1/SRPMS/php-5.2.1-4.1mdv2007.1.src.rpm
 99b6a369a952a88ee5ecb45685777fc6  2007.1/SRPMS/php-filter-5.2.1-0.1mdv2007.1.src.rpm
 87967aa8a608f6f832dc070bd8842237  2007.1/SRPMS/php-gd-5.2.1-1.1mdv2007.1.src.rpm
 c8f6ec004c7e19e0afe0eaf332b756ad  2007.1/SRPMS/php-mbstring-5.2.1-1.1mdv2007.1.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  
 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Home router security holes to be exposed at Def Con 22 hacker meet up
Edward Snowden Calls on Hackers to Help Whistleblowers Leak More Secrets
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.