summaryrefslogtreecommitdiffstats
path: root/website/DTSA/DTSA-39-1.html
blob: 6d390a2e9532848f3d993e2a63a41d1d02c89261 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
    <html><head><meta http-equiv="Content-Type" content="text/html; charset=iso8859-1">
    <title>Debian testing security team - Advisory</title>
    <link type="text/css" rel="stylesheet" href="../style.css">
    <link rel="shortcut icon" href="http://www.debian.org/favicon.ico">
    </head>
    <body>
    <div align="center">
    <a href="http://www.debian.org/">

     <img src="http://www.debian.org/logos/openlogo-nd-50.png" border="0" hspace="0" vspace="0" alt=""></a>
    <a href="http://www.debian.org/">
     <img src="http://www.debian.org/Pics/debian.png" border="0" hspace="0" vspace="0" alt="Debian Project"></a>
    </div>
    <br />
    <table class="reddy" width="100%">
    <tr>
    <td class="reddy">
    <img src="http://www.debian.org/Pics/red-upperleft.png" align="left" border="0" hspace="0" vspace="0"
     alt="" width="15" height="16"></td>

    <td rowspan="2" class="reddy">Debian testing security team - Advisory</td>
    <td class="reddy">
    <img src="http://www.debian.org/Pics/red-upperright.png" align="right" border="0" hspace="0" vspace="0"
     alt="" width="16" height="16"></td>
    </tr>
    <tr>
    <td class="reddy">
    <img src="http://www.debian.org/Pics/red-lowerleft.png" align="left" border="0" hspace="0" vspace="0"
     alt="" width="16" height="16"></td>
    <td class="reddy">

    <img src="http://www.debian.org/Pics/red-lowerright.png" align="right" border="0" hspace="0" vspace="0"
     alt="" width="15" height="16"></td>
    </tr>
    </table>

<!-- header -->
<h2>DTSA-39-1</h2>
<dl>
<dt>Date Reported:</dt>
<dd>May 28th, 2007</dd>
<dt>Affected Package:</dt>
<dd><a href='http://packages.debian.org/src:php5'>php5</a></dd>
<dt>Vulnerability:</dt>
<dd>several vulnerabilities</dd>
<dt>Problem-Scope:</dt>
<dd>remote</dd>
<dt>Debian-specific:</dt>
<dd>No<br></dd>
<dt>CVE:</dt>
<dd>
<a href='http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1286'>CVE-2007-1286</a> 
<a href='http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1375'>CVE-2007-1375</a> 
<a href='http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1376'>CVE-2007-1376</a> 
<a href='http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1380'>CVE-2007-1380</a> 
<a href='http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1453'>CVE-2007-1453</a> 
<a href='http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1454'>CVE-2007-1454</a> 
<a href='http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1521'>CVE-2007-1521</a> 
<a href='http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1583'>CVE-2007-1583</a> 
<a href='http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1700'>CVE-2007-1700</a> 
<a href='http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1718'>CVE-2007-1718</a> 
<a href='http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1777'>CVE-2007-1777</a> 
<a href='http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1824'>CVE-2007-1824</a> 
<a href='http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1887'>CVE-2007-1887</a> 
<a href='http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1889'>CVE-2007-1889</a> 
<a href='http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1900'>CVE-2007-1900</a> 
<a href='http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2509'>CVE-2007-2509</a> 
<a href='http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2510'>CVE-2007-2510</a> 
<a href='http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2511'>CVE-2007-2511</a> 
<br></dd>
<br><dt>More information:</dt>
<dd>Several remote vulnerabilities have been discovered in PHP, a&nbsp;<br>
server-side, HTML-embedded scripting language, which may lead to the&nbsp;<br>
execution of arbitrary code. The Common Vulnerabilities and Exposures&nbsp;<br>
project identifies the following problems:&nbsp;<br>
&nbsp;<br>
CVE-2007-1286&nbsp;<br>
    Stefan Esser discovered an overflow in the object reference handling&nbsp;<br>
    code of the unserialize() function, which allows the execution of&nbsp;<br>
    arbitrary code if malformed input is passed from an application.&nbsp;<br>
&nbsp;<br>
CVE-2007-1375&nbsp;<br>
    Stefan Esser discovered that an integer overflow in the substr_compare()&nbsp;<br>
    function allows information disclosure of heap memory.&nbsp;<br>
&nbsp;<br>
CVE-2007-1376&nbsp;<br>
    Stefan Esser discovered that insufficient validation of shared memory&nbsp;<br>
    functions allows the disclosure of heap memory.&nbsp;<br>
&nbsp;<br>
CVE-2007-1380&nbsp;<br>
    Stefan Esser discovered that the session handler performs&nbsp;<br>
    insufficient validation of variable name length values, which allows&nbsp;<br>
    information disclosure through a heap information leak.&nbsp;<br>
&nbsp;<br>
CVE-2007-1453&nbsp;<br>
    Stefan Esser discovered that the filtering framework performs insufficient&nbsp;<br>
    input validation, which allows the execution of arbitrary code through a&nbsp;<br>
    buffer underflow.&nbsp;<br>
&nbsp;<br>
CVE-2007-1454&nbsp;<br>
    Stefan Esser discovered that the filtering framework can be bypassed &nbsp;<br>
    with a special whitespace character.&nbsp;<br>
&nbsp;<br>
CVE-2007-1521&nbsp;<br>
    Stefan Esser discovered a double free vulnerability in the&nbsp;<br>
    session_regenerate_id() function, which allows the execution of&nbsp;<br>
    arbitrary code. &nbsp;<br>
&nbsp;<br>
CVE-2007-1583&nbsp;<br>
    Stefan Esser discovered that a programming error in the mb_parse_str()&nbsp;<br>
    function allows the activation of "register_globals".&nbsp;<br>
&nbsp;<br>
CVE-2007-1700&nbsp;<br>
    Stefan Esser discovered that the session extension incorrectly maintains&nbsp;<br>
    the reference count of session variables, which allows the execution of&nbsp;<br>
    arbitrary code.&nbsp;<br>
&nbsp;<br>
CVE-2007-1718&nbsp;<br>
    Stefan Esser discovered that the mail() function performs&nbsp;<br>
    insufficient validation of folded mail headers, which allows mail&nbsp;<br>
    header injection.&nbsp;<br>
&nbsp;<br>
CVE-2007-1777&nbsp;<br>
    Stefan Esser discovered that the extension to handle ZIP archives&nbsp;<br>
    performs insufficient length checks, which allows the execution of&nbsp;<br>
    arbitrary code.&nbsp;<br>
&nbsp;<br>
CVE-2007-1824&nbsp;<br>
    Stefan Esser discovered an off-by-one in the filtering framework, which&nbsp;<br>
    allows the execution of arbitrary code.&nbsp;<br>
&nbsp;<br>
CVE-2007-1887&nbsp;<br>
    Stefan Esser discovered that a buffer overflow in the sqlite extension&nbsp;<br>
    allows the execution of arbitrary code.&nbsp;<br>
&nbsp;<br>
CVE-2007-1889&nbsp;<br>
    Stefan Esser discovered that the PHP memory manager performs an&nbsp;<br>
    incorrect type cast, which allows the execution of arbitrary code&nbsp;<br>
    through buffer overflows. &nbsp;<br>
&nbsp;<br>
CVE-2007-1900&nbsp;<br>
    Stefan Esser discovered that incorrect validation in the email filter&nbsp;<br>
    extension allowed the injection of mail headers.&nbsp;<br>
&nbsp;<br>
CVE-2007-2509&nbsp;<br>
    It was discovered that missing input sanitising inside the ftp&nbsp;<br>
    extension permits an attacker to execute arbitrary FTP commands.&nbsp;<br>
    This requires the attacker to already have access to the FTP&nbsp;<br>
    server.&nbsp;<br>
&nbsp;<br>
CVE-2007-2510&nbsp;<br>
    It was discovered that a buffer overflow in the SOAP extension permits&nbsp;<br>
    the execution of arbitrary code.&nbsp;<br>
&nbsp;<br>
CVE-2007-2511&nbsp;<br>
    A buffer overflow was discovered in the user_filter_factory_create.&nbsp;<br>
</dd>
<br><dt>For the testing distribution (lenny) this is fixed in version 5.2.0-10+lenny1</dt>
<dt>For the unstable distribution (sid) this is fixed in version 5.2.2-1</dt>
<br><dt>This upgrade is recommended if you use php5.<dt>
<br><dt>If you have the secure testing lines in your sources.list, you can update by running this command as root:</dt>

<dd>apt-get update && apt-get upgrade</dd>
<br>

<br>
<dt>To use the Debian testing security archive, add the following lines to your /etc/apt/sources.list:<dt>
<br>
<dd>deb http://security.debian.org/ testing/updates main contrib non-free</dd>
<dd>deb-src http://security.debian.org/ testing/updates main contrib non-free</dd>
<br>

<!-- footer -->
<hr>
<a href="http://validator.w3.org/check?uri=referer">
    <img border="0" src="http://www.w3.org/Icons/valid-html401" alt="Valid HTML 4.01!" height="31" width="88"></a>
    <a href="http://jigsaw.w3.org/css-validator/check/referer">
    <img border="0" src="http://jigsaw.w3.org/css-validator/images/vcss" alt="Valid CSS!"
     height="31" width="88"></a>


</body></html>

© 2014-2024 Faster IT GmbH | imprint | privacy policy