exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 15005

Secunia Security Advisory 15005
Posted May 27, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for php. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

tags | advisory, denial of service, php, vulnerability
systems | linux, fedora
SHA-256 | 97f4ee43c1f9d4b1ae8b2db05b275f783774a8f79d3596bcfcedcad15130dedb

Secunia Security Advisory 15005

Change Mirror Download

----------------------------------------------------------------------

Want a new IT Security job?

Vacant positions at Secunia:
http://secunia.com/secunia_vacancies/

----------------------------------------------------------------------

TITLE:
Fedora update for php

SECUNIA ADVISORY ID:
SA15005

VERIFY ADVISORY:
http://secunia.com/advisories/15005/

CRITICAL:
Highly critical

IMPACT:
DoS, System access

WHERE:
>From remote

OPERATING SYSTEM:
Fedora Core 3
http://secunia.com/product/4222/

DESCRIPTION:
Fedora has issued an update for php. This fixes some vulnerabilities,
which can be exploited by malicious people to cause a DoS (Denial of
Service) and potentially compromise a vulnerable system.

For more information:
SA14792

SOLUTION:
Apply updated packages.

Fedora Core 3:
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/

37ba9891122583c69a5086c9d2fd2102 SRPMS/php-4.3.11-2.4.src.rpm
5f55d6dba7e02348783348b6759242f9 x86_64/php-4.3.11-2.4.x86_64.rpm
6a78adae0f8f9bba54387847b100fd96
x86_64/php-devel-4.3.11-2.4.x86_64.rpm
c078f4c78928558bac77a8b182cbabb2
x86_64/php-pear-4.3.11-2.4.x86_64.rpm
e437dcd4b70e0df01febae880a5bc70f
x86_64/php-imap-4.3.11-2.4.x86_64.rpm
1dbef89de378f779061e49e8cb2d0e94
x86_64/php-ldap-4.3.11-2.4.x86_64.rpm
d5ae259075870e63d316229604957da8
x86_64/php-mysql-4.3.11-2.4.x86_64.rpm
a451afd4a2349c35c423db1905a768c9
x86_64/php-pgsql-4.3.11-2.4.x86_64.rpm
2e66b7cf8d2e933a069cec155c183f31
x86_64/php-odbc-4.3.11-2.4.x86_64.rpm
cfe08c4c4f8d43a7818aa8b48325ecd1
x86_64/php-snmp-4.3.11-2.4.x86_64.rpm
a51bfe897fae0a405ed2b6903cddcd50
x86_64/php-domxml-4.3.11-2.4.x86_64.rpm
0716c2c04d3bba58731b32d3d65e6770
x86_64/php-xmlrpc-4.3.11-2.4.x86_64.rpm
0eedc210d61bb40387b14061ead7d417
x86_64/php-mbstring-4.3.11-2.4.x86_64.rpm
ef1b4ca7890d51e8d75a890b4fd7fe60
x86_64/php-ncurses-4.3.11-2.4.x86_64.rpm
4dc74e7d7fd46e2ec241c12d25451c21 x86_64/php-gd-4.3.11-2.4.x86_64.rpm
b5156d2cadc5fcd4bee9a86e7610b211
x86_64/debug/php-debuginfo-4.3.11-2.4.x86_64.rpm
bd225ddda74ef2431da1ee38eb85871b i386/php-4.3.11-2.4.i386.rpm
40a45386cd76b9386efd22e09be8467a i386/php-devel-4.3.11-2.4.i386.rpm
421d85b05c9aab1d1eba602f39f50c6a i386/php-pear-4.3.11-2.4.i386.rpm
3553b774daa0a991be9eaae9815c0ddb i386/php-imap-4.3.11-2.4.i386.rpm
d102699b4264c735af2cfa0a305c9cca i386/php-ldap-4.3.11-2.4.i386.rpm
326bb7af88a83aeff7937601fbe35835 i386/php-mysql-4.3.11-2.4.i386.rpm
d917f68f2c53192eec915854c11432b8 i386/php-pgsql-4.3.11-2.4.i386.rpm
9721e9f984e8e56cdad453f5ab03182e i386/php-odbc-4.3.11-2.4.i386.rpm
8853467943485b20226e82cffb1dd321 i386/php-snmp-4.3.11-2.4.i386.rpm
c414f1735ae0fa589f20db0a8dfa88e0 i386/php-domxml-4.3.11-2.4.i386.rpm
ecfbcbb670aa6e764bd3d4c4d1a51a3c i386/php-xmlrpc-4.3.11-2.4.i386.rpm
a5d78f1be3481e3f08e634bee8141f0f
i386/php-mbstring-4.3.11-2.4.i386.rpm
8a89a49c4e7e9b94067885eaa0953bb8
i386/php-ncurses-4.3.11-2.4.i386.rpm
ce51c0cda3d383b2feb27082fbfe06be i386/php-gd-4.3.11-2.4.i386.rpm
54b1730c9ce4b17df7a8f3531f27cc83
i386/debug/php-debuginfo-4.3.11-2.4.i386.rpm

OTHER REFERENCES:
SA14792:
http://secunia.com/advisories/14792/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    0 Files
  • 5
    Mar 5th
    0 Files
  • 6
    Mar 6th
    0 Files
  • 7
    Mar 7th
    0 Files
  • 8
    Mar 8th
    0 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    0 Files
  • 12
    Mar 12th
    0 Files
  • 13
    Mar 13th
    0 Files
  • 14
    Mar 14th
    0 Files
  • 15
    Mar 15th
    0 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    0 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    0 Files
  • 21
    Mar 21st
    0 Files
  • 22
    Mar 22nd
    0 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close