|
|
|
<?xml version="1.0" encoding="utf-8"?>
|
|
|
|
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
|
|
|
<glsa id="200511-08">
|
|
|
|
<title>PHP: Multiple vulnerabilities</title>
|
|
|
|
<synopsis>
|
|
|
|
PHP suffers from multiple issues, resulting in security functions bypass,
|
|
|
|
local Denial of service, cross-site scripting or PHP variables overwrite.
|
|
|
|
</synopsis>
|
|
|
|
<product type="ebuild">PHP</product>
|
|
|
|
<announced>2005-11-13</announced>
|
|
|
|
<revised>2005-11-13: 01</revised>
|
|
|
|
<bug>107602</bug>
|
|
|
|
<bug>111032</bug>
|
|
|
|
<access>remote and local</access>
|
|
|
|
<affected>
|
|
|
|
<package name="dev-php/php" auto="yes" arch="*">
|
|
|
|
<unaffected range="rge">4.3.11-r4</unaffected>
|
|
|
|
<unaffected range="ge">4.4.0-r4</unaffected>
|
|
|
|
<vulnerable range="lt">4.4.0-r4</vulnerable>
|
|
|
|
</package>
|
|
|
|
<package name="dev-php/mod_php" auto="yes" arch="*">
|
|
|
|
<unaffected range="rge">4.3.11-r4</unaffected>
|
|
|
|
<unaffected range="ge">4.4.0-r8</unaffected>
|
|
|
|
<vulnerable range="lt">4.4.0-r8</vulnerable>
|
|
|
|
</package>
|
|
|
|
<package name="dev-php/php-cgi" auto="yes" arch="*">
|
|
|
|
<unaffected range="rge">4.3.11-r5</unaffected>
|
|
|
|
<unaffected range="ge">4.4.0-r5</unaffected>
|
|
|
|
<vulnerable range="lt">4.4.0-r5</vulnerable>
|
|
|
|
</package>
|
|
|
|
</affected>
|
|
|
|
<background>
|
|
|
|
<p>
|
|
|
|
PHP is a general-purpose scripting language widely used to develop
|
|
|
|
web-based applications. It can run inside a web server using the
|
|
|
|
mod_php module or the CGI version and also stand-alone in a CLI.
|
|
|
|
</p>
|
|
|
|
</background>
|
|
|
|
<description>
|
|
|
|
<p>
|
|
|
|
Multiple vulnerabilities have been found and fixed in PHP:
|
|
|
|
</p>
|
|
|
|
<ul>
|
|
|
|
<li>a possible $GLOBALS variable overwrite problem through file
|
|
|
|
upload handling, extract() and import_request_variables()
|
|
|
|
(CVE-2005-3390)</li>
|
|
|
|
<li>a local Denial of Service through the use of
|
|
|
|
the session.save_path option (CVE-2005-3319)</li>
|
|
|
|
<li>an issue with
|
|
|
|
trailing slashes in allowed basedirs (CVE-2005-3054)</li>
|
|
|
|
<li>an issue
|
|
|
|
with calling virtual() on Apache 2, allowing to bypass safe_mode and
|
|
|
|
open_basedir restrictions (CVE-2005-3392)</li>
|
|
|
|
<li>a problem when a
|
|
|
|
request was terminated due to memory_limit constraints during certain
|
|
|
|
parse_str() calls (CVE-2005-3389)</li>
|
|
|
|
<li>The curl and gd modules
|
|
|
|
allowed to bypass the safe mode open_basedir restrictions
|
|
|
|
(CVE-2005-3391)</li>
|
|
|
|
<li>a cross-site scripting (XSS) vulnerability in
|
|
|
|
phpinfo() (CVE-2005-3388)</li>
|
|
|
|
</ul>
|
|
|
|
</description>
|
|
|
|
<impact type="normal">
|
|
|
|
<p>
|
|
|
|
Attackers could leverage these issues to exploit applications that
|
|
|
|
are assumed to be secure through the use of proper register_globals,
|
|
|
|
safe_mode or open_basedir parameters. Remote attackers could also
|
|
|
|
conduct cross-site scripting attacks if a page calling phpinfo() was
|
|
|
|
available. Finally, a local attacker could cause a local Denial of
|
|
|
|
Service using malicious session.save_path options.
|
|
|
|
</p>
|
|
|
|
</impact>
|
|
|
|
<workaround>
|
|
|
|
<p>
|
|
|
|
There is no known workaround that would solve all issues at this
|
|
|
|
time.
|
|
|
|
</p>
|
|
|
|
</workaround>
|
|
|
|
<resolution>
|
|
|
|
<p>
|
|
|
|
All PHP users should upgrade to the latest version:
|
|
|
|
</p>
|
|
|
|
<code>
|
|
|
|
# emerge --sync
|
|
|
|
# emerge --ask --oneshot --verbose dev-php/php</code>
|
|
|
|
<p>
|
|
|
|
All mod_php users should upgrade to the latest version:
|
|
|
|
</p>
|
|
|
|
<code>
|
|
|
|
# emerge --sync
|
|
|
|
# emerge --ask --oneshot --verbose dev-php/mod_php</code>
|
|
|
|
<p>
|
|
|
|
All php-cgi users should upgrade to the latest version:
|
|
|
|
</p>
|
|
|
|
<code>
|
|
|
|
# emerge --sync
|
|
|
|
# emerge --ask --oneshot --verbose dev-php/php-cgi</code>
|
|
|
|
</resolution>
|
|
|
|
<references>
|
|
|
|
<uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3054">CVE-2005-3054</uri>
|
|
|
|
<uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3319">CVE-2005-3319</uri>
|
|
|
|
<uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3388">CVE-2005-3388</uri>
|
|
|
|
<uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3389">CVE-2005-3389</uri>
|
|
|
|
<uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3390">CVE-2005-3390</uri>
|
|
|
|
<uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3391">CVE-2005-3391</uri>
|
|
|
|
<uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3392">CVE-2005-3392</uri>
|
|
|
|
</references>
|
|
|
|
<metadata tag="submitter" timestamp="2005-11-07T14:11:50Z">
|
|
|
|
koon
|
|
|
|
</metadata>
|
|
|
|
<metadata tag="bugReady" timestamp="2005-11-13T14:44:31Z">
|
|
|
|
vorlon078
|
|
|
|
</metadata>
|
|
|
|
</glsa>
|