exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Mandriva Linux Security Advisory 2007.090

Mandriva Linux Security Advisory 2007.090
Posted Apr 20, 2007
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - A slew of PHP vulnerabilities have been patched for 2007.0.

tags | advisory, php, vulnerability
systems | linux, mandriva
advisories | CVE-2007-1001, CVE-2007-1285, CVE-2007-1454, CVE-2007-1718, CVE-2007-1583
SHA-256 | 170fdf6f224bc714d6fc44d1ff2d7dccc2c0c3039c8c74302c1eb7ea38ee5a2a

Mandriva Linux Security Advisory 2007.090

Change Mirror Download

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDKSA-2007:090
http://www.mandriva.com/security/
_______________________________________________________________________

Package : php
Date : April 18, 2007
Affected: 2007.1
_______________________________________________________________________

Problem Description:

A heap-based buffer overflow vulnerability was found in PHP's gd
extension. A script that could be forced to process WBMP images
from an untrusted source could result in arbitrary code execution
(CVE-2007-1001).

A DoS flaw was found in how PHP processed a deeply nested array.
A remote attacker could cause the PHP intrerpreter to creash
by submitting an input variable with a deeply nested array
(CVE-2007-1285).

The internal filter module in PHP in certain instances did not properly
strip HTML tags, which allowed a remote attacker conduct cross-site
scripting (XSS) attacks (CVE-2007-1454).

A vulnerability in the way the mbstring extension set global variables
was discovered where a script using the mb_parse_str() function to
set global variables could be forced to to enable the register_globals
configuration option, possibly resulting in global variable injection
(CVE-2007-1583).

A vulnerability in how PHP's mail() function processed header data was
discovered. If a script sent mail using a subject header containing
a string from an untrusted source, a remote attacker could send bulk
email to unintended recipients (CVE-2007-1718).

Updated packages have been patched to correct these issues. Also note
that the default use of Suhosin helped to protect against some of
these issues prior to patching.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1001
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1285
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1454
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1583
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1718
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2007.1:
a2a2d7b7103fdaefa792d445d22a65c3 2007.1/i586/libphp5_common5-5.2.1-4.1mdv2007.1.i586.rpm
9aeac43a52784427a4feb19e1d266b50 2007.1/i586/php-cgi-5.2.1-4.1mdv2007.1.i586.rpm
2b5d544dffdb4aa89d74109898205555 2007.1/i586/php-cli-5.2.1-4.1mdv2007.1.i586.rpm
e57b07915a9f7baa656ca9f1eb7ddf1a 2007.1/i586/php-devel-5.2.1-4.1mdv2007.1.i586.rpm
820500b3ffddc56ccbd59518a96f160a 2007.1/i586/php-fcgi-5.2.1-4.1mdv2007.1.i586.rpm
4bf3300a9e01fa6a3c0c8ebb983f5046 2007.1/i586/php-filter-5.2.1-0.1mdv2007.1.i586.rpm
e7765fa71f78bd86f7f12785c0f9cfd9 2007.1/i586/php-gd-5.2.1-1.1mdv2007.1.i586.rpm
49798b443ac0053b48efa66685ecfc44 2007.1/i586/php-mbstring-5.2.1-1.1mdv2007.1.i586.rpm
29f23607a64ba27a0038410a369fc5c0 2007.1/i586/php-openssl-5.2.1-4.1mdv2007.1.i586.rpm
408130c6dac0f507a0b4068174a839d4 2007.1/i586/php-zlib-5.2.1-4.1mdv2007.1.i586.rpm
e3ac02eafad5c201bee1099689d18255 2007.1/SRPMS/php-5.2.1-4.1mdv2007.1.src.rpm
99b6a369a952a88ee5ecb45685777fc6 2007.1/SRPMS/php-filter-5.2.1-0.1mdv2007.1.src.rpm
87967aa8a608f6f832dc070bd8842237 2007.1/SRPMS/php-gd-5.2.1-1.1mdv2007.1.src.rpm
c8f6ec004c7e19e0afe0eaf332b756ad 2007.1/SRPMS/php-mbstring-5.2.1-1.1mdv2007.1.src.rpm

Mandriva Linux 2007.1/X86_64:
75e3b41a9434c1603912e5a7ac4e729f 2007.1/x86_64/lib64php5_common5-5.2.1-4.1mdv2007.1.x86_64.rpm
eb7fc029538ffda1cb559727bf9f28a6 2007.1/x86_64/php-cgi-5.2.1-4.1mdv2007.1.x86_64.rpm
f2a9eae5208089fbb947269a059ef635 2007.1/x86_64/php-cli-5.2.1-4.1mdv2007.1.x86_64.rpm
e8b51aded5740f8d77ebee58e13233c5 2007.1/x86_64/php-devel-5.2.1-4.1mdv2007.1.x86_64.rpm
df8bdb532d4e7ac8a9e9a7a14293a603 2007.1/x86_64/php-fcgi-5.2.1-4.1mdv2007.1.x86_64.rpm
ebef91bd51938b885377d8df7ebb34d0 2007.1/x86_64/php-filter-5.2.1-0.1mdv2007.1.x86_64.rpm
c0d265c231fdeadc7800c95fa27b0fe2 2007.1/x86_64/php-gd-5.2.1-1.1mdv2007.1.x86_64.rpm
4e8fc08c860aef6e5cb1dc786a19025a 2007.1/x86_64/php-mbstring-5.2.1-1.1mdv2007.1.x86_64.rpm
5e2642693f86c41afa9123e7be9592c1 2007.1/x86_64/php-openssl-5.2.1-4.1mdv2007.1.x86_64.rpm
e1117e3ab380560cb1135799573d3fad 2007.1/x86_64/php-zlib-5.2.1-4.1mdv2007.1.x86_64.rpm
e3ac02eafad5c201bee1099689d18255 2007.1/SRPMS/php-5.2.1-4.1mdv2007.1.src.rpm
99b6a369a952a88ee5ecb45685777fc6 2007.1/SRPMS/php-filter-5.2.1-0.1mdv2007.1.src.rpm
87967aa8a608f6f832dc070bd8842237 2007.1/SRPMS/php-gd-5.2.1-1.1mdv2007.1.src.rpm
c8f6ec004c7e19e0afe0eaf332b756ad 2007.1/SRPMS/php-mbstring-5.2.1-1.1mdv2007.1.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (GNU/Linux)

iD8DBQFGJtwnmqjQ0CJFipgRAhMsAKCORTCS969CbEP1bMiIUpPqkIXHCACdFGAd
ngX17q5SRWoiQyfNvJEhBnw=
=4qw+
-----END PGP SIGNATURE-----

Login or Register to add favorites

File Archive:

June 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    0 Files
  • 2
    Jun 2nd
    0 Files
  • 3
    Jun 3rd
    18 Files
  • 4
    Jun 4th
    21 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    57 Files
  • 7
    Jun 7th
    6 Files
  • 8
    Jun 8th
    0 Files
  • 9
    Jun 9th
    0 Files
  • 10
    Jun 10th
    12 Files
  • 11
    Jun 11th
    27 Files
  • 12
    Jun 12th
    38 Files
  • 13
    Jun 13th
    16 Files
  • 14
    Jun 14th
    14 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close