Gentoo Archives: gentoo-announce

From: Daniel Ahlberg <aliz@g.o>
To: gentoo-announce@g.o
Subject: GLSA: mod_php php
Date: Mon, 13 Jan 2003 15:27:47
Message-Id: 20030113145902.77BC25762@mail2.tamperd.net
1 -----BEGIN PGP SIGNED MESSAGE-----
2 Hash: SHA1
3
4 - - --------------------------------------------------------------------
5 GENTOO LINUX SECURITY ANNOUNCEMENT 200301-8
6 - - --------------------------------------------------------------------
7
8 PACKAGE : mod_php php
9 SUMMARY : buffer overflow
10 DATE    : 2003-01-13 15:01 UTC
11 EXPLOIT : remote
12
13 - - --------------------------------------------------------------------
14
15 - From advisory:
16
17 "If you use the wordwrap() function on user-supplied input, a
18 specially-crafted input can overflow the allocated buffer and
19 overwrite the heap. Exploit looks very difficult, but still
20 theoretically possible."
21
22 Read the full advisory at
23 http://marc.theaimsgroup.com/?l=bugtraq&m=104102689503192&w=2
24
25 SOLUTION
26
27 It is recommended that all Gentoo Linux users who are running
28 dev-php/php-4.2.3 and/or dev-php/mod_php-4.2.3 or earlier update
29 their systems as follows:
30
31 emerge rsync
32 emerge php
33
34 and/or
35
36 emerge mod_php
37
38 finish with:
39
40 emerge clean
41
42 - - --------------------------------------------------------------------
43 aliz@g.o - GnuPG key is available at www.gentoo.org/~aliz
44 rphillips@g.o
45 - - --------------------------------------------------------------------
46 -----BEGIN PGP SIGNATURE-----
47 Version: GnuPG v1.2.1 (GNU/Linux)
48
49 iD8DBQE+ItSXfT7nyhUpoZMRAkmYAKCU00hustnHo69YNYw0IwNezKQN7wCfWs9r
50 UPRKjcVEmXPuN6zq7wjSLYc=
51 =0qtv
52 -----END PGP SIGNATURE-----