Gentoo Archives: gentoo-announce

From: Thierry Carrez <koon@g.o>
To: gentoo-announce@l.g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××××.uk, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200507-15 ] PHP: Script injection through XML-RPC
Date: Fri, 15 Jul 2005 14:42:01
Message-Id: 42D7C74D.1050407@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200507-15
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: High
8 Title: PHP: Script injection through XML-RPC
9 Date: July 15, 2005
10 Bugs: #97655
11 ID: 200507-15
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 PHP includes an XML-RPC implementation which allows remote attackers to
19 execute arbitrary PHP script commands.
20
21 Background
22 ==========
23
24 PHP is a general-purpose scripting language widely used to develop
25 web-based applications. It can run inside a web server using the
26 mod_php module or the CGI version of PHP, or can run stand-alone in a
27 CLI.
28
29 Affected packages
30 =================
31
32 -------------------------------------------------------------------
33 Package / Vulnerable / Unaffected
34 -------------------------------------------------------------------
35 1 dev-php/php < 4.4.0 >= 4.4.0
36
37 Description
38 ===========
39
40 James Bercegay has discovered that the XML-RPC implementation in PHP
41 fails to sanitize input passed in an XML document, which is used in an
42 "eval()" statement.
43
44 Impact
45 ======
46
47 A remote attacker could exploit the XML-RPC vulnerability to execute
48 arbitrary PHP script code by sending specially crafted XML data to
49 applications making use of this XML-RPC implementation.
50
51 Workaround
52 ==========
53
54 There is no known workaround at this time.
55
56 Resolution
57 ==========
58
59 All PHP users should upgrade to the latest version:
60
61 # emerge --sync
62 # emerge --ask --oneshot --verbose ">=dev-php/php-4.4.0"
63
64 References
65 ==========
66
67 [ 1 ] CAN-2005-1921
68 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1921
69
70 Availability
71 ============
72
73 This GLSA and any updates to it are available for viewing at
74 the Gentoo Security Website:
75
76 http://security.gentoo.org/glsa/glsa-200507-15.xml
77
78 Concerns?
79 =========
80
81 Security is a primary focus of Gentoo Linux and ensuring the
82 confidentiality and security of our users machines is of utmost
83 importance to us. Any security concerns should be addressed to
84 security@g.o or alternatively, you may file a bug at
85 http://bugs.gentoo.org.
86
87 License
88 =======
89
90 Copyright 2005 Gentoo Foundation, Inc; referenced text
91 belongs to its owner(s).
92
93 The contents of this document are licensed under the
94 Creative Commons - Attribution / Share Alike license.
95
96 http://creativecommons.org/licenses/by-sa/2.0

Attachments

File name MIME type
signature.asc application/pgp-signature