what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Mandriva Linux Security Advisory 2010-025

Mandriva Linux Security Advisory 2010-025
Posted Jan 26, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-025 - Multiple vulnerabilities were discovered and corrected in php-pear. Argument injection vulnerability in the sendmail implementation of the Mail::Send method (Mail/sendmail.php) in the Mail package 1.1.14 f for PEAR allows remote attackers to read and write arbitrary files via a crafted parameter, and possibly other parameters, a different vulnerability than CVE-2009-4023. Packages for 2008.0 are provided for Corporate Desktop 2008.0 customers. The updated packages have been patched to correct these issues.

tags | advisory, remote, arbitrary, php, vulnerability
systems | linux, mandriva
advisories | CVE-2009-4023, CVE-2009-4111
SHA-256 | 5f25e471637759cc8181b0216c625c69d6faeab30fa48e8d0988c3ea8ca5be0a

Mandriva Linux Security Advisory 2010-025

Change Mirror Download

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2010:025
http://www.mandriva.com/security/
_______________________________________________________________________

Package : php-pear-Mail
Date : January 25, 2010
Affected: 2008.0, 2009.0, 2009.1, 2010.0, Corporate 4.0,
Enterprise Server 5.0
_______________________________________________________________________

Problem Description:

Multiple vulnerabilities were discovered and corrected in php-pear
(Mail):

Argument injection vulnerability in the sendmail implementation of
the Mail::Send method (Mail/sendmail.php) in the Mail package 1.1.14
for PEAR allows remote attackers to read and write arbitrary files
via a crafted parameter, a different vector than CVE-2009-4111
(CVE-2009-4023).

Argument injection vulnerability in Mail/sendmail.php in the Mail
package 1.1.14, 1.2.0b2, and possibly other versions for PEAR allows
remote attackers to read and write arbitrary files via a crafted
parameter, and possibly other parameters, a different vulnerability
than CVE-2009-4023 (CVE-2009-4111).

Packages for 2008.0 are provided for Corporate Desktop 2008.0
customers.

The updated packages have been patched to correct these issues.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4023
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4111
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2008.0:
943289b9ea09700ecaf5512c50d380d3 2008.0/i586/php-pear-5.2.4-1.1mdv2008.0.noarch.rpm
f77090cf65f4ade44835a112d4fc67e0 2008.0/SRPMS/php-pear-5.2.4-1.1mdv2008.0.src.rpm

Mandriva Linux 2008.0/X86_64:
bfd61ade59779825fa62126c05f5967a 2008.0/x86_64/php-pear-5.2.4-1.1mdv2008.0.noarch.rpm
f77090cf65f4ade44835a112d4fc67e0 2008.0/SRPMS/php-pear-5.2.4-1.1mdv2008.0.src.rpm

Mandriva Linux 2009.0:
aacca8d19653ea6a82a248f604abbd0b 2009.0/i586/php-pear-5.2.6-6.1mdv2009.0.noarch.rpm
9468e00db376dab4664d665377b79fca 2009.0/SRPMS/php-pear-5.2.6-6.1mdv2009.0.src.rpm

Mandriva Linux 2009.0/X86_64:
202b8122c1ec7ef90f0355f99b3c7686 2009.0/x86_64/php-pear-5.2.6-6.1mdv2009.0.noarch.rpm
9468e00db376dab4664d665377b79fca 2009.0/SRPMS/php-pear-5.2.6-6.1mdv2009.0.src.rpm

Mandriva Linux 2009.1:
2e2ae9f59bc3ac527362b5c0776236fe 2009.1/i586/php-pear-5.2.9-1.1mdv2009.1.noarch.rpm
82b814b71169f985b1b977ba60d5bd59 2009.1/SRPMS/php-pear-5.2.9-1.1mdv2009.1.src.rpm

Mandriva Linux 2009.1/X86_64:
0115517a560174cac95a19cbd17ed745 2009.1/x86_64/php-pear-5.2.9-1.1mdv2009.1.noarch.rpm
82b814b71169f985b1b977ba60d5bd59 2009.1/SRPMS/php-pear-5.2.9-1.1mdv2009.1.src.rpm

Mandriva Linux 2010.0:
6f42b2e519d40d7fa304a3dc451c1c58 2010.0/i586/php-pear-Mail-1.2.0-0.b1.2.1mdv2010.0.noarch.rpm
7bb574ae5c1660a3a0cd5a2deff3586f 2010.0/SRPMS/php-pear-Mail-1.2.0-0.b1.2.1mdv2010.0.src.rpm

Mandriva Linux 2010.0/X86_64:
f7401a8fdd2b526c806532fcb75271e3 2010.0/x86_64/php-pear-Mail-1.2.0-0.b1.2.1mdv2010.0.noarch.rpm
7bb574ae5c1660a3a0cd5a2deff3586f 2010.0/SRPMS/php-pear-Mail-1.2.0-0.b1.2.1mdv2010.0.src.rpm

Corporate 4.0:
a948abe7ef93f8e60f91d52f5e0aaee4 corporate/4.0/i586/php-pear-5.1.4-3.2.20060mlcs4.noarch.rpm
d8fca1fee69801c2b0c3de51fcb8ba8d corporate/4.0/SRPMS/php-pear-5.1.4-3.2.20060mlcs4.src.rpm

Corporate 4.0/X86_64:
3f1684a400312f5912cc80e235c083ec corporate/4.0/x86_64/php-pear-5.1.4-3.2.20060mlcs4.noarch.rpm
d8fca1fee69801c2b0c3de51fcb8ba8d corporate/4.0/SRPMS/php-pear-5.1.4-3.2.20060mlcs4.src.rpm

Mandriva Enterprise Server 5:
6bdc54b90afd9bea13d663c76efe9c3e mes5/i586/php-pear-5.2.6-6.1mdvmes5.noarch.rpm
4bb9c64b927033aa2125a7893f29e943 mes5/SRPMS/php-pear-5.2.6-6.1mdvmes5.src.rpm

Mandriva Enterprise Server 5/X86_64:
419935609521cbfc30b4161e483bdd13 mes5/x86_64/php-pear-5.2.6-6.1mdvmes5.noarch.rpm
4bb9c64b927033aa2125a7893f29e943 mes5/SRPMS/php-pear-5.2.6-6.1mdvmes5.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFLXY9EmqjQ0CJFipgRAgCSAKCxY6087+jE38VM/U281f9g2aQXUwCfclj1
XZ+gf39nUGYCvYDE53udca4=
=jEIK
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close