Gentoo Archives: gentoo-announce

From: Raphael Marichez <falco@g.o>
To: gentoo-announce@l.g.o
Cc: full-disclosure@××××××××××××××.uk, bugtraq@×××××××××××××.com, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [Full-disclosure] [ GLSA 200703-21 ] PHP: Multiple vulnerabilities
Date: Tue, 20 Mar 2007 22:23:46
Message-Id: 20070320214009.GE24559@falco.falcal.net
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200703-21
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: High
8 Title: PHP: Multiple vulnerabilities
9 Date: March 20, 2007
10 Bugs: #153911
11 ID: 200703-21
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 PHP contains several vulnerabilities including a heap buffer overflow,
19 potentially leading to the remote execution of arbitrary code under
20 certain conditions.
21
22 Background
23 ==========
24
25 PHP is a widely-used general-purpose scripting language that is
26 especially suited for Web development and can be embedded into HTML.
27
28 Affected packages
29 =================
30
31 -------------------------------------------------------------------
32 Package / Vulnerable / Unaffected
33 -------------------------------------------------------------------
34 1 dev-lang/php < 5.2.1-r3 >= 5.2.1-r3
35 *>= 5.1.6-r11
36 *>= 4.4.6
37
38 Description
39 ===========
40
41 Several vulnerabilities were found in PHP by the Hardened-PHP Project
42 and other researchers. These vulnerabilities include a heap-based
43 buffer overflow in htmlentities() and htmlspecialchars() if called with
44 UTF-8 parameters, and an off-by-one error in str_ireplace(). Other
45 vulnerabilities were also found in the PHP4 branch, including possible
46 overflows, stack corruptions and a format string vulnerability in the
47 *print() functions on 64 bit systems.
48
49 Impact
50 ======
51
52 Remote attackers might be able to exploit these issues in PHP
53 applications making use of the affected functions, potentially
54 resulting in the execution of arbitrary code, Denial of Service,
55 execution of scripted contents in the context of the affected site,
56 security bypass or information leak.
57
58 Workaround
59 ==========
60
61 There is no known workaround at this time.
62
63 Resolution
64 ==========
65
66 All PHP users should upgrade to the latest version:
67
68 # emerge --sync
69 # emerge --ask --oneshot --verbose "dev-lang/php"
70
71 References
72 ==========
73
74 [ 1 ] CVE-2006-5465
75 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5465
76 [ 2 ] CVE-2007-0906
77 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0906
78 [ 3 ] CVE-2007-0907
79 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0907
80 [ 4 ] CVE-2007-0908
81 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0908
82 [ 5 ] CVE-2007-0909
83 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0909
84 [ 6 ] CVE-2007-0910
85 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0910
86 [ 7 ] CVE-2007-0911
87 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0911
88 [ 8 ] CVE-2007-0988
89 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0988
90 [ 9 ] CVE-2007-1286
91 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1286
92 [ 10 ] CVE-2007-1375
93 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1375
94 [ 11 ] CVE-2007-1376
95 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1376
96 [ 12 ] CVE-2007-1380
97 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1380
98 [ 13 ] CVE-2007-1383
99 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1383
100 [ 14 ] PHP 4.4.5 Release Announcement
101 http://www.php.net/releases/4_4_5.php
102 [ 15 ] PHP 5.2.1 Release Announcement
103 http://www.php.net/releases/5_2_1.php
104
105 Availability
106 ============
107
108 This GLSA and any updates to it are available for viewing at
109 the Gentoo Security Website:
110
111 http://security.gentoo.org/glsa/glsa-200703-21.xml
112
113 Concerns?
114 =========
115
116 Security is a primary focus of Gentoo Linux and ensuring the
117 confidentiality and security of our users machines is of utmost
118 importance to us. Any security concerns should be addressed to
119 security@g.o or alternatively, you may file a bug at
120 http://bugs.gentoo.org.
121
122 License
123 =======
124
125 Copyright 2007 Gentoo Foundation, Inc; referenced text
126 belongs to its owner(s).
127
128 The contents of this document are licensed under the
129 Creative Commons - Attribution / Share Alike license.
130
131 http://creativecommons.org/licenses/by-sa/2.5