Gentoo Archives: gentoo-announce

From: Raphael Marichez <falco@g.o>
To: gentoo-announce@g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××××.uk, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200710-02 ] PHP: Multiple vulnerabilities
Date: Sun, 07 Oct 2007 09:51:08
Message-Id: 20071007092406.GY17139@falco.falcal.net
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200710-02
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: High
8 Title: PHP: Multiple vulnerabilities
9 Date: October 07, 2007
10 Bugs: #179158, #180556, #191034
11 ID: 200710-02
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 PHP contains several vulnerabilities including buffer and integer
19 overflows which could lead to the remote execution of arbitrary code.
20
21 Background
22 ==========
23
24 PHP is a widely-used general-purpose scripting language that is
25 especially suited for Web development and can be embedded into HTML.
26
27 Affected packages
28 =================
29
30 -------------------------------------------------------------------
31 Package / Vulnerable / Unaffected
32 -------------------------------------------------------------------
33 1 dev-lang/php < 5.2.4_p20070914-r2 >= 5.2.4_p20070914-r2
34
35 Description
36 ===========
37
38 Several vulnerabilities were found in PHP. Mattias Bengtsson and Philip
39 Olausson reported integer overflows in the gdImageCreate() and
40 gdImageCreateTrueColor() functions of the GD library which can cause
41 heap-based buffer overflows (CVE-2007-3996). Gerhard Wagner discovered
42 an integer overflow in the chunk_split() function that can lead to a
43 heap-based buffer overflow (CVE-2007-2872). Its incomplete fix caused
44 incorrect buffer size calculation due to precision loss, also resulting
45 in a possible heap-based buffer overflow (CVE-2007-4661 and
46 CVE-2007-4660). A buffer overflow in the sqlite_decode_binary() of the
47 SQLite extension found by Stefan Esser that was addressed in PHP 5.2.1
48 was not fixed correctly (CVE-2007-1887).
49
50 Stefan Esser discovered an error in the zend_alter_ini_entry() function
51 handling a memory_limit violation (CVE-2007-4659). Stefan Esser also
52 discovered a flaw when handling interruptions with userspace error
53 handlers that can be exploited to read arbitrary heap memory
54 (CVE-2007-1883). Disclosure of sensitive memory can also be triggered
55 due to insufficient boundary checks in the strspn() and strcspn()
56 functions, an issue discovered by Mattias Bengtsson and Philip Olausson
57 (CVE-2007-4657)
58
59 Stefan Esser reported incorrect validation in the FILTER_VALIDATE_EMAIL
60 filter of the Filter extension allowing arbitrary email header
61 injection (CVE-2007-1900). NOTE: This CVE was referenced, but not fixed
62 in GLSA 200705-19.
63
64 Stanislav Malyshev found an error with unknown impact in the
65 money_format() function when processing "%i" and "%n" tokens
66 (CVE-2007-4658). zatanzlatan reported a buffer overflow in the
67 php_openssl_make_REQ() function with unknown impact when providing a
68 manipulated SSL configuration file (CVE-2007-4662). Possible memory
69 corruption when trying to read EXIF data in exif_read_data() and
70 exif_thumbnail() occurred with unknown impact.
71
72 Several vulnerabilities that allow bypassing of open_basedir and other
73 restrictions were reported, including the glob() function
74 (CVE-2007-4663), the session_save_path(), ini_set(), and error_log()
75 functions which can allow local command execution (CVE-2007-3378),
76 involving the readfile() function (CVE-2007-3007), via the Session
77 extension (CVE-2007-4652), via the MySQL extension (CVE-2007-3997) and
78 in the dl() function which allows loading extensions outside of the
79 specified directory (CVE-2007-4825).
80
81 Multiple Denial of Service vulnerabilities were discovered, including a
82 long "library" parameter in the dl() function (CVE-2007-4887), in
83 several iconv and xmlrpc functions (CVE-2007-4840 and CVE-2007-4783),
84 in the setlocale() function (CVE-2007-4784), in the glob() and
85 fnmatch() function (CVE-2007-4782 and CVE-2007-3806), a floating point
86 exception in the wordwrap() function (CVE-2007-3998), a stack
87 exhaustion via deeply nested arrays (CVE-2007-4670), an infinite loop
88 caused by a specially crafted PNG image in the png_read_info() function
89 of libpng (CVE-2007-2756) and several issues related to array
90 conversion.
91
92 Impact
93 ======
94
95 Remote attackers might be able to exploit these issues in PHP
96 applications making use of the affected functions, potentially
97 resulting in the execution of arbitrary code, Denial of Service,
98 execution of scripted contents in the context of the affected site,
99 security bypass or information leak.
100
101 Workaround
102 ==========
103
104 There is no known workaround at this time.
105
106 Resolution
107 ==========
108
109 All PHP users should upgrade to the latest version:
110
111 # emerge --sync
112 # emerge --ask --oneshot --verbose ">=dev-lang/php-5.2.4_p20070914-r2"
113
114 References
115 ==========
116
117 [ 1 ] CVE-2007-1883
118 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1883
119 [ 2 ] CVE-2007-1887
120 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1887
121 [ 3 ] CVE-2007-1900
122 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1900
123 [ 4 ] CVE-2007-2756
124 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2756
125 [ 5 ] CVE-2007-2872
126 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2872
127 [ 6 ] CVE-2007-3007
128 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3007
129 [ 7 ] CVE-2007-3378
130 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3378
131 [ 8 ] CVE-2007-3806
132 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3806
133 [ 9 ] CVE-2007-3996
134 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3996
135 [ 10 ] CVE-2007-3997
136 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3997
137 [ 11 ] CVE-2007-3998
138 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3998
139 [ 12 ] CVE-2007-4652
140 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4652
141 [ 13 ] CVE-2007-4657
142 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4657
143 [ 14 ] CVE-2007-4658
144 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4658
145 [ 15 ] CVE-2007-4659
146 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4659
147 [ 16 ] CVE-2007-4660
148 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4660
149 [ 17 ] CVE-2007-4661
150 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4661
151 [ 18 ] CVE-2007-4662
152 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4662
153 [ 19 ] CVE-2007-4663
154 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4663
155 [ 20 ] CVE-2007-4670
156 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4670
157 [ 21 ] CVE-2007-4727
158 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4727
159 [ 22 ] CVE-2007-4782
160 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4782
161 [ 23 ] CVE-2007-4783
162 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4783
163 [ 24 ] CVE-2007-4784
164 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4784
165 [ 25 ] CVE-2007-4825
166 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4825
167 [ 26 ] CVE-2007-4840
168 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4840
169 [ 27 ] CVE-2007-4887
170 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4887
171 [ 28 ] GLSA 200705-19
172 http://www.gentoo.org/security/en/glsa/glsa-200705-19.xml
173
174 Availability
175 ============
176
177 This GLSA and any updates to it are available for viewing at
178 the Gentoo Security Website:
179
180 http://security.gentoo.org/glsa/glsa-200710-02.xml
181
182 Concerns?
183 =========
184
185 Security is a primary focus of Gentoo Linux and ensuring the
186 confidentiality and security of our users machines is of utmost
187 importance to us. Any security concerns should be addressed to
188 security@g.o or alternatively, you may file a bug at
189 http://bugs.gentoo.org.
190
191 License
192 =======
193
194 Copyright 2007 Gentoo Foundation, Inc; referenced text
195 belongs to its owner(s).
196
197 The contents of this document are licensed under the
198 Creative Commons - Attribution / Share Alike license.
199
200 http://creativecommons.org/licenses/by-sa/2.5