Jump to content
Compatible Support Forums
Sign in to follow this  
news

[Security Announce] [ MDVSA-2010:007 ] php

Recommended Posts

This is a multi-part message in MIME format...

 

------------=_1263596071-24326-3486

 

 

-----BEGIN PGP SIGNED MESSAGE-----

Hash: SHA1

 

_______________________________________________________________________

 

Mandriva Linux Security Advisory MDVSA-2010:007

http://www.mandriva.com/security/

_______________________________________________________________________

 

Package : php

Date : January 15, 2010

Affected: Multi Network Firewall 2.0

_______________________________________________________________________

 

Problem Description:

 

Multiple vulnerabilities has been found and corrected in php:

 

The (1) htmlentities and (2) htmlspecialchars functions in PHP before

5.2.5 accept partial multibyte sequences, which has unknown impact and

attack vectors, a different issue than CVE-2006-5465 (CVE-2007-5898).

 

The zend_restore_ini_entry_cb function in zend_ini.c in PHP 5.3.0,

5.2.10, and earlier versions allows context-specific attackers to

obtain sensitive information (memory contents) and cause a PHP crash

by using the ini_set function to declare a variable, then using the

ini_restore function to restore the variable (CVE-2009-2626).

 

The htmlspecialchars function in PHP before 5.2.12 does not properly

handle (1) overlong UTF-8 sequences, (2) invalid Shift_JIS sequences,

and (3) invalid EUC-JP sequences, which allows remote attackers to

conduct cross-site scripting (XSS) attacks by placing a crafted byte

sequence before a special character (CVE-2009-4142).

 

The updated packages have been patched to correct these issues.

_______________________________________________________________________

 

References:

 

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5898

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2626

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4142

_______________________________________________________________________

 

Updated Packages:

 

Multi Network Firewall 2.0:

1ddeed79a1b5c4a821c62d96ca322f4c mnf/2.0/i586/libphp_common432-4.3.4-4.33.M20mdk.i586.rpm

0957c4c8799e51f3d6aac4325e588ba2 mnf/2.0/i586/php432-devel-4.3.4-4.33.M20mdk.i586.rpm

62ec35d74c7fa3456259544d865b9d67 mnf/2.0/i586/php-cgi-4.3.4-4.33.M20mdk.i586.rpm

86998301bc37c4bd4224f7d676b08c0e mnf/2.0/i586/php-cli-4.3.4-4.33.M20mdk.i586.rpm

ad1c06bb89ee5a525ab00012b4eadec5 mnf/2.0/SRPMS/php-4.3.4-4.33.M20mdk.src.rpm

_______________________________________________________________________

 

To upgrade automatically use MandrivaUpdate or urpmi. The verification

of md5 checksums and GPG signatures is performed automatically for you.

 

All packages are signed by Mandriva for security. You can obtain the

GPG public key of the Mandriva Security Team by executing:

 

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 

You can view other update advisories for Mandriva Linux at:

 

http://www.mandriva.com/security/advisories

 

If you want to report vulnerabilities, please contact

 

security_(at)_mandriva.com

_______________________________________________________________________

 

Type Bits/KeyID Date User ID

pub 1024D/22458A98 2000-07-10 Mandriva Security Team

 

-----BEGIN PGP SIGNATURE-----

Version: GnuPG v1.4.9 (GNU/Linux)

 

iD8DBQFLUMeumqjQ0CJFipgRAtqOAJ9S/Za20dNallYsGOis+Dk5VJaLqwCgv9D3

mQPRoPPNqlUXtE28X84FOrI=

=fu2F

-----END PGP SIGNATURE-----

 

 

------------=_1263596071-24326-3486

Content-Type: text/plain; name="message-footer.txt"

Content-Disposition: inline; filename="message-footer.txt"

Content-Transfer-Encoding: 8bit

 

To unsubscribe, send a email to sympa ( -at -) mandrivalinux.org

with this subject : unsubscribe security-announce

_______________________________________________________

Want to buy your Pack or Services from Mandriva?

Go to http://www.mandrivastore.com

Join the Club : http://www.mandrivaclub.com

_______________________________________________________

 

------------=_1263596071-24326-3486--

 

 

Share this post


Link to post

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now
Sign in to follow this  

×