[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

MDVSA-2011:165 -- Mandriva php

ID: oval:org.secpod.oval:def:301125Date: (C)2012-01-07   (M)2024-04-29
Class: PATCHFamily: unix




Multiple vulnerabilities has been identified and fixed in php: Use-after-free vulnerability in the substr_replace function in PHP 5.3.6 and earlier allows context-dependent attackers to cause a denial of service or possibly have unspecified other impact by using the same variable for multiple arguments . The ZipArchive::addGlob and ZipArchive::addPattern functions in ext/zip/php_zip.c in PHP 5.3.6 allow context-dependent attackers to cause a denial of service via certain flags arguments, as demonstrated by GLOB_ALTDIRFUNC and GLOB_APPEND . Stack-based buffer overflow in the socket_connect function in ext/sockets/sockets.c in PHP 5.3.3 through 5.3.6 might allow context-dependent attackers to execute arbitrary code via a long pathname for a UNIX socket . The rfc1867_post_handler function in main/rfc1867.c in PHP before 5.3.7 does not properly restrict filenames in multipart/form-data POST requests, which allows remote attackers to conduct absolute path traversal attacks, and possibly create or overwrite arbitrary files, via a crafted upload request, related to a file path injection vulnerability. crypt_blowfish before 1.1, as used in PHP before 5.3.7 on certain platforms, does not properly handle 8-bit characters, which makes it easier for context-dependent attackers to determine a cleartext password by leveraging knowledge of a password hash . PHP before 5.3.7 does not properly check the return values of the malloc, calloc, and realloc library functions, which allows context-dependent attackers to cause a denial of service or trigger a buffer overflow by leveraging the ability to provide an arbitrary value for a function argument, related to ext/curl/interface.c, ext/date/lib/parse_date.c, ext/date/lib/parse_iso_intervals.c, ext/date/lib/parse_tz.c, ext/date/lib/timelib.c, ext/pdo_odbc/pdo_odbc.c, ext/reflection/php_reflection.c, ext/soap/php_sdl.c, ext/xmlrpc/libxmlrpc/base64.c, TSRM/tsrm_win32.c, and the strtotime function . PHP before 5.3.7 does not properly implement the error_log function, which allows context-dependent attackers to cause a denial of service via unspecified vectors . Buffer overflow in the crypt function in PHP before 5.3.7 allows context-dependent attackers to have an unspecified impact via a long salt argument, a different vulnerability than CVE-2011-2483 . The updated php packages have been upgraded to 5.3.8 which is not vulnerable to these issues. Additionally some of the PECL extensions has been upgraded and/or rebuilt for the new php version.

Platform:
Mandriva Linux 2010.1
Product:
php
Reference:
MDVSA-2011:165
CVE-2011-3268
CVE-2011-3267
CVE-2011-3182
CVE-2011-2483
CVE-2011-2202
CVE-2011-1938
CVE-2011-1657
CVE-2011-1148
CVE    8
CVE-2011-1657
CVE-2011-3182
CVE-2011-1148
CVE-2011-3267
...
CPE    1
cpe:/o:mandriva:linux:2010.1

© SecPod Technologies