1 |
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
2 |
Gentoo Linux Security Advisory GLSA 200710-02 |
3 |
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
4 |
http://security.gentoo.org/ |
5 |
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
6 |
|
7 |
Severity: High |
8 |
Title: PHP: Multiple vulnerabilities |
9 |
Date: October 07, 2007 |
10 |
Bugs: #179158, #180556, #191034 |
11 |
ID: 200710-02 |
12 |
|
13 |
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
14 |
|
15 |
Synopsis |
16 |
======== |
17 |
|
18 |
PHP contains several vulnerabilities including buffer and integer |
19 |
overflows which could lead to the remote execution of arbitrary code. |
20 |
|
21 |
Background |
22 |
========== |
23 |
|
24 |
PHP is a widely-used general-purpose scripting language that is |
25 |
especially suited for Web development and can be embedded into HTML. |
26 |
|
27 |
Affected packages |
28 |
================= |
29 |
|
30 |
------------------------------------------------------------------- |
31 |
Package / Vulnerable / Unaffected |
32 |
------------------------------------------------------------------- |
33 |
1 dev-lang/php < 5.2.4_p20070914-r2 >= 5.2.4_p20070914-r2 |
34 |
|
35 |
Description |
36 |
=========== |
37 |
|
38 |
Several vulnerabilities were found in PHP. Mattias Bengtsson and Philip |
39 |
Olausson reported integer overflows in the gdImageCreate() and |
40 |
gdImageCreateTrueColor() functions of the GD library which can cause |
41 |
heap-based buffer overflows (CVE-2007-3996). Gerhard Wagner discovered |
42 |
an integer overflow in the chunk_split() function that can lead to a |
43 |
heap-based buffer overflow (CVE-2007-2872). Its incomplete fix caused |
44 |
incorrect buffer size calculation due to precision loss, also resulting |
45 |
in a possible heap-based buffer overflow (CVE-2007-4661 and |
46 |
CVE-2007-4660). A buffer overflow in the sqlite_decode_binary() of the |
47 |
SQLite extension found by Stefan Esser that was addressed in PHP 5.2.1 |
48 |
was not fixed correctly (CVE-2007-1887). |
49 |
|
50 |
Stefan Esser discovered an error in the zend_alter_ini_entry() function |
51 |
handling a memory_limit violation (CVE-2007-4659). Stefan Esser also |
52 |
discovered a flaw when handling interruptions with userspace error |
53 |
handlers that can be exploited to read arbitrary heap memory |
54 |
(CVE-2007-1883). Disclosure of sensitive memory can also be triggered |
55 |
due to insufficient boundary checks in the strspn() and strcspn() |
56 |
functions, an issue discovered by Mattias Bengtsson and Philip Olausson |
57 |
(CVE-2007-4657) |
58 |
|
59 |
Stefan Esser reported incorrect validation in the FILTER_VALIDATE_EMAIL |
60 |
filter of the Filter extension allowing arbitrary email header |
61 |
injection (CVE-2007-1900). NOTE: This CVE was referenced, but not fixed |
62 |
in GLSA 200705-19. |
63 |
|
64 |
Stanislav Malyshev found an error with unknown impact in the |
65 |
money_format() function when processing "%i" and "%n" tokens |
66 |
(CVE-2007-4658). zatanzlatan reported a buffer overflow in the |
67 |
php_openssl_make_REQ() function with unknown impact when providing a |
68 |
manipulated SSL configuration file (CVE-2007-4662). Possible memory |
69 |
corruption when trying to read EXIF data in exif_read_data() and |
70 |
exif_thumbnail() occurred with unknown impact. |
71 |
|
72 |
Several vulnerabilities that allow bypassing of open_basedir and other |
73 |
restrictions were reported, including the glob() function |
74 |
(CVE-2007-4663), the session_save_path(), ini_set(), and error_log() |
75 |
functions which can allow local command execution (CVE-2007-3378), |
76 |
involving the readfile() function (CVE-2007-3007), via the Session |
77 |
extension (CVE-2007-4652), via the MySQL extension (CVE-2007-3997) and |
78 |
in the dl() function which allows loading extensions outside of the |
79 |
specified directory (CVE-2007-4825). |
80 |
|
81 |
Multiple Denial of Service vulnerabilities were discovered, including a |
82 |
long "library" parameter in the dl() function (CVE-2007-4887), in |
83 |
several iconv and xmlrpc functions (CVE-2007-4840 and CVE-2007-4783), |
84 |
in the setlocale() function (CVE-2007-4784), in the glob() and |
85 |
fnmatch() function (CVE-2007-4782 and CVE-2007-3806), a floating point |
86 |
exception in the wordwrap() function (CVE-2007-3998), a stack |
87 |
exhaustion via deeply nested arrays (CVE-2007-4670), an infinite loop |
88 |
caused by a specially crafted PNG image in the png_read_info() function |
89 |
of libpng (CVE-2007-2756) and several issues related to array |
90 |
conversion. |
91 |
|
92 |
Impact |
93 |
====== |
94 |
|
95 |
Remote attackers might be able to exploit these issues in PHP |
96 |
applications making use of the affected functions, potentially |
97 |
resulting in the execution of arbitrary code, Denial of Service, |
98 |
execution of scripted contents in the context of the affected site, |
99 |
security bypass or information leak. |
100 |
|
101 |
Workaround |
102 |
========== |
103 |
|
104 |
There is no known workaround at this time. |
105 |
|
106 |
Resolution |
107 |
========== |
108 |
|
109 |
All PHP users should upgrade to the latest version: |
110 |
|
111 |
# emerge --sync |
112 |
# emerge --ask --oneshot --verbose ">=dev-lang/php-5.2.4_p20070914-r2" |
113 |
|
114 |
References |
115 |
========== |
116 |
|
117 |
[ 1 ] CVE-2007-1883 |
118 |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1883 |
119 |
[ 2 ] CVE-2007-1887 |
120 |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1887 |
121 |
[ 3 ] CVE-2007-1900 |
122 |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1900 |
123 |
[ 4 ] CVE-2007-2756 |
124 |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2756 |
125 |
[ 5 ] CVE-2007-2872 |
126 |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2872 |
127 |
[ 6 ] CVE-2007-3007 |
128 |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3007 |
129 |
[ 7 ] CVE-2007-3378 |
130 |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3378 |
131 |
[ 8 ] CVE-2007-3806 |
132 |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3806 |
133 |
[ 9 ] CVE-2007-3996 |
134 |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3996 |
135 |
[ 10 ] CVE-2007-3997 |
136 |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3997 |
137 |
[ 11 ] CVE-2007-3998 |
138 |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3998 |
139 |
[ 12 ] CVE-2007-4652 |
140 |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4652 |
141 |
[ 13 ] CVE-2007-4657 |
142 |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4657 |
143 |
[ 14 ] CVE-2007-4658 |
144 |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4658 |
145 |
[ 15 ] CVE-2007-4659 |
146 |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4659 |
147 |
[ 16 ] CVE-2007-4660 |
148 |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4660 |
149 |
[ 17 ] CVE-2007-4661 |
150 |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4661 |
151 |
[ 18 ] CVE-2007-4662 |
152 |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4662 |
153 |
[ 19 ] CVE-2007-4663 |
154 |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4663 |
155 |
[ 20 ] CVE-2007-4670 |
156 |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4670 |
157 |
[ 21 ] CVE-2007-4727 |
158 |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4727 |
159 |
[ 22 ] CVE-2007-4782 |
160 |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4782 |
161 |
[ 23 ] CVE-2007-4783 |
162 |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4783 |
163 |
[ 24 ] CVE-2007-4784 |
164 |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4784 |
165 |
[ 25 ] CVE-2007-4825 |
166 |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4825 |
167 |
[ 26 ] CVE-2007-4840 |
168 |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4840 |
169 |
[ 27 ] CVE-2007-4887 |
170 |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4887 |
171 |
[ 28 ] GLSA 200705-19 |
172 |
http://www.gentoo.org/security/en/glsa/glsa-200705-19.xml |
173 |
|
174 |
Availability |
175 |
============ |
176 |
|
177 |
This GLSA and any updates to it are available for viewing at |
178 |
the Gentoo Security Website: |
179 |
|
180 |
http://security.gentoo.org/glsa/glsa-200710-02.xml |
181 |
|
182 |
Concerns? |
183 |
========= |
184 |
|
185 |
Security is a primary focus of Gentoo Linux and ensuring the |
186 |
confidentiality and security of our users machines is of utmost |
187 |
importance to us. Any security concerns should be addressed to |
188 |
security@g.o or alternatively, you may file a bug at |
189 |
http://bugs.gentoo.org. |
190 |
|
191 |
License |
192 |
======= |
193 |
|
194 |
Copyright 2007 Gentoo Foundation, Inc; referenced text |
195 |
belongs to its owner(s). |
196 |
|
197 |
The contents of this document are licensed under the |
198 |
Creative Commons - Attribution / Share Alike license. |
199 |
|
200 |
http://creativecommons.org/licenses/by-sa/2.5 |