Gentoo Archives: gentoo-announce

From: Pierre-Yves Rofes <py@g.o>
To: gentoo-announce@l.g.o
Cc: full-disclosure@××××××××××××××.uk, bugtraq@×××××××××××××.com, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200712-05 ] PEAR::MDB2: Information disclosure
Date: Sun, 09 Dec 2007 21:27:28
Message-Id: 475C5ACA.5000602@gentoo.org
1 -----BEGIN PGP SIGNED MESSAGE-----
2 Hash: SHA1
3
4 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
5 Gentoo Linux Security Advisory GLSA 200712-05
6 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
7 http://security.gentoo.org/
8 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
9
10 Severity: Normal
11 Title: PEAR::MDB2: Information disclosure
12 Date: December 09, 2007
13 Bugs: #198446
14 ID: 200712-05
15
16 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
17
18 Synopsis
19 ========
20
21 A vulnerability when handling database input in PEAR::MDB2 allows
22 remote attackers to obtain sensitive information.
23
24 Background
25 ==========
26
27 PEAR::MDB2 is a database abstraction layer for PHP aimed to provide a
28 common API for all supported relational database management systems. A
29 LOB ("large object") is a database field holding binary data.
30
31 Affected packages
32 =================
33
34 -------------------------------------------------------------------
35 Package / Vulnerable / Unaffected
36 -------------------------------------------------------------------
37 1 dev-php/PEAR-MDB2 < 2.5.0_alpha1 >= 2.5.0_alpha1
38
39 Description
40 ===========
41
42 priyadi discovered that the request to store a URL string as a LOB is
43 treated as a request to retrieve and store the contents of the URL.
44
45 Impact
46 ======
47
48 If an application using PEAR::MDB2 allows input of LOB values via a web
49 form, remote attackers could use the application as an indirect proxy
50 or obtain sensitive information, including "file://" URLs local to the
51 web server.
52
53 Workaround
54 ==========
55
56 As a workaround, manually filter input before storing it as a LOB in
57 PEAR::MDB2.
58
59 Resolution
60 ==========
61
62 All PEAR::MDB2 users should upgrade to the latest version:
63
64 # emerge --sync
65 # emerge --ask --oneshot --verbose ">=dev-php/PEAR-MDB2-2.5.0_alpha1"
66
67 References
68 ==========
69
70 [ 1 ] CVE-2007-5934
71 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5934
72
73 Availability
74 ============
75
76 This GLSA and any updates to it are available for viewing at
77 the Gentoo Security Website:
78
79 http://security.gentoo.org/glsa/glsa-200712-05.xml
80
81 Concerns?
82 =========
83
84 Security is a primary focus of Gentoo Linux and ensuring the
85 confidentiality and security of our users machines is of utmost
86 importance to us. Any security concerns should be addressed to
87 security@g.o or alternatively, you may file a bug at
88 http://bugs.gentoo.org.
89
90 License
91 =======
92
93 Copyright 2007 Gentoo Foundation, Inc; referenced text
94 belongs to its owner(s).
95
96 The contents of this document are licensed under the
97 Creative Commons - Attribution / Share Alike license.
98
99 http://creativecommons.org/licenses/by-sa/2.5
100 -----BEGIN PGP SIGNATURE-----
101 Version: GnuPG v1.4.7 (GNU/Linux)
102 Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
103
104 iD8DBQFHXFrKuhJ+ozIKI5gRAr7yAJ9TRNm3H++jYrYI4uxe3IwvxpJjugCfYtz4
105 RKFBK9sjt6TNSeVjXVfn5PY=
106 =5dws
107 -----END PGP SIGNATURE-----
108 --
109 gentoo-announce@g.o mailing list