-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDKSA-2007:090 http://www.mandriva.com/security/ _______________________________________________________________________ Package : php Date : April 18, 2007 Affected: 2007.1 _______________________________________________________________________ Problem Description: A heap-based buffer overflow vulnerability was found in PHP's gd extension. A script that could be forced to process WBMP images from an untrusted source could result in arbitrary code execution (CVE-2007-1001). A DoS flaw was found in how PHP processed a deeply nested array. A remote attacker could cause the PHP intrerpreter to creash by submitting an input variable with a deeply nested array (CVE-2007-1285). The internal filter module in PHP in certain instances did not properly strip HTML tags, which allowed a remote attacker conduct cross-site scripting (XSS) attacks (CVE-2007-1454). A vulnerability in the way the mbstring extension set global variables was discovered where a script using the mb_parse_str() function to set global variables could be forced to to enable the register_globals configuration option, possibly resulting in global variable injection (CVE-2007-1583). A vulnerability in how PHP's mail() function processed header data was discovered. If a script sent mail using a subject header containing a string from an untrusted source, a remote attacker could send bulk email to unintended recipients (CVE-2007-1718). Updated packages have been patched to correct these issues. Also note that the default use of Suhosin helped to protect against some of these issues prior to patching. _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1001 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1285 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1454 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1583 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1718 _______________________________________________________________________ Updated Packages: Mandriva Linux 2007.1: a2a2d7b7103fdaefa792d445d22a65c3 2007.1/i586/libphp5_common5-5.2.1-4.1mdv2007.1.i586.rpm 9aeac43a52784427a4feb19e1d266b50 2007.1/i586/php-cgi-5.2.1-4.1mdv2007.1.i586.rpm 2b5d544dffdb4aa89d74109898205555 2007.1/i586/php-cli-5.2.1-4.1mdv2007.1.i586.rpm e57b07915a9f7baa656ca9f1eb7ddf1a 2007.1/i586/php-devel-5.2.1-4.1mdv2007.1.i586.rpm 820500b3ffddc56ccbd59518a96f160a 2007.1/i586/php-fcgi-5.2.1-4.1mdv2007.1.i586.rpm 4bf3300a9e01fa6a3c0c8ebb983f5046 2007.1/i586/php-filter-5.2.1-0.1mdv2007.1.i586.rpm e7765fa71f78bd86f7f12785c0f9cfd9 2007.1/i586/php-gd-5.2.1-1.1mdv2007.1.i586.rpm 49798b443ac0053b48efa66685ecfc44 2007.1/i586/php-mbstring-5.2.1-1.1mdv2007.1.i586.rpm 29f23607a64ba27a0038410a369fc5c0 2007.1/i586/php-openssl-5.2.1-4.1mdv2007.1.i586.rpm 408130c6dac0f507a0b4068174a839d4 2007.1/i586/php-zlib-5.2.1-4.1mdv2007.1.i586.rpm e3ac02eafad5c201bee1099689d18255 2007.1/SRPMS/php-5.2.1-4.1mdv2007.1.src.rpm 99b6a369a952a88ee5ecb45685777fc6 2007.1/SRPMS/php-filter-5.2.1-0.1mdv2007.1.src.rpm 87967aa8a608f6f832dc070bd8842237 2007.1/SRPMS/php-gd-5.2.1-1.1mdv2007.1.src.rpm c8f6ec004c7e19e0afe0eaf332b756ad 2007.1/SRPMS/php-mbstring-5.2.1-1.1mdv2007.1.src.rpm Mandriva Linux 2007.1/X86_64: 75e3b41a9434c1603912e5a7ac4e729f 2007.1/x86_64/lib64php5_common5-5.2.1-4.1mdv2007.1.x86_64.rpm eb7fc029538ffda1cb559727bf9f28a6 2007.1/x86_64/php-cgi-5.2.1-4.1mdv2007.1.x86_64.rpm f2a9eae5208089fbb947269a059ef635 2007.1/x86_64/php-cli-5.2.1-4.1mdv2007.1.x86_64.rpm e8b51aded5740f8d77ebee58e13233c5 2007.1/x86_64/php-devel-5.2.1-4.1mdv2007.1.x86_64.rpm df8bdb532d4e7ac8a9e9a7a14293a603 2007.1/x86_64/php-fcgi-5.2.1-4.1mdv2007.1.x86_64.rpm ebef91bd51938b885377d8df7ebb34d0 2007.1/x86_64/php-filter-5.2.1-0.1mdv2007.1.x86_64.rpm c0d265c231fdeadc7800c95fa27b0fe2 2007.1/x86_64/php-gd-5.2.1-1.1mdv2007.1.x86_64.rpm 4e8fc08c860aef6e5cb1dc786a19025a 2007.1/x86_64/php-mbstring-5.2.1-1.1mdv2007.1.x86_64.rpm 5e2642693f86c41afa9123e7be9592c1 2007.1/x86_64/php-openssl-5.2.1-4.1mdv2007.1.x86_64.rpm e1117e3ab380560cb1135799573d3fad 2007.1/x86_64/php-zlib-5.2.1-4.1mdv2007.1.x86_64.rpm e3ac02eafad5c201bee1099689d18255 2007.1/SRPMS/php-5.2.1-4.1mdv2007.1.src.rpm 99b6a369a952a88ee5ecb45685777fc6 2007.1/SRPMS/php-filter-5.2.1-0.1mdv2007.1.src.rpm 87967aa8a608f6f832dc070bd8842237 2007.1/SRPMS/php-gd-5.2.1-1.1mdv2007.1.src.rpm c8f6ec004c7e19e0afe0eaf332b756ad 2007.1/SRPMS/php-mbstring-5.2.1-1.1mdv2007.1.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.7 (GNU/Linux) iD8DBQFGJtwnmqjQ0CJFipgRAhMsAKCORTCS969CbEP1bMiIUpPqkIXHCACdFGAd ngX17q5SRWoiQyfNvJEhBnw= =4qw+ -----END PGP SIGNATURE-----