Gentoo Archives: gentoo-announce

From: Raphael Marichez <falco@g.o>
To: gentoo-announce@l.g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××××.uk, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200608-28 ] PHP: Arbitary code execution
Date: Tue, 29 Aug 2006 15:24:39
Message-Id: 200608291703.58765@msgid.falco.bz
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200608-28
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: PHP: Arbitary code execution
9 Date: August 29, 2006
10 Bugs: #143126
11 ID: 200608-28
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 PHP contains a function that, when used, could allow a remote attacker
19 to execute arbitrary code.
20
21 Background
22 ==========
23
24 PHP is a widely-used general-purpose scripting language that is
25 especially suited for Web development and can be embedded into HTML.
26
27 Affected packages
28 =================
29
30 -------------------------------------------------------------------
31 Package / Vulnerable / Unaffected
32 -------------------------------------------------------------------
33 1 dev-lang/php < 5.1.4-r6 *>= 4.4.3-r1
34 >= 5.1.4-r6
35
36 Description
37 ===========
38
39 The sscanf() PHP function contains an array boundary error that can be
40 exploited to dereference a null pointer. This can possibly allow the
41 bypass of the safe mode protection by executing arbitrary code.
42
43 Impact
44 ======
45
46 A remote attacker might be able to exploit this vulnerability in PHP
47 applications making use of the sscanf() function, potentially resulting
48 in the execution of arbitrary code or the execution of scripted
49 contents in the context of the affected site.
50
51 Workaround
52 ==========
53
54 There is no known workaround at this time.
55
56 Resolution
57 ==========
58
59 All PHP 4.x users should upgrade to the latest version:
60
61 # emerge --sync
62 # emerge --ask --oneshot --verbose ">=dev-lang/php-4.4.3-r1"
63
64 All PHP 5.x users should upgrade to the latest version:
65
66 # emerge --sync
67 # emerge --ask --oneshot --verbose ">=dev-lang/php-5.1.4-r6"
68
69 References
70 ==========
71
72 [ 1 ] CVE-2006-4020
73 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4020
74
75 Availability
76 ============
77
78 This GLSA and any updates to it are available for viewing at
79 the Gentoo Security Website:
80
81 http://security.gentoo.org/glsa/glsa-200608-28.xml
82
83 Concerns?
84 =========
85
86 Security is a primary focus of Gentoo Linux and ensuring the
87 confidentiality and security of our users machines is of utmost
88 importance to us. Any security concerns should be addressed to
89 security@g.o or alternatively, you may file a bug at
90 http://bugs.gentoo.org.
91
92 License
93 =======
94
95 Copyright 2006 Gentoo Foundation, Inc; referenced text
96 belongs to its owner(s).
97
98 The contents of this document are licensed under the
99 Creative Commons - Attribution / Share Alike license.
100
101 http://creativecommons.org/licenses/by-sa/2.5