Gentoo Forums
Gentoo Forums
Gentoo Forums
Quick Search: in
[ GLSA 200504-15 ] PHP: Multiple vulnerabilities
View unanswered posts
View posts from last 24 hours

 
Reply to topic    Gentoo Forums Forum Index News & Announcements
View previous topic :: View next topic  
Author Message
GLSA
Bodhisattva
Bodhisattva


Joined: 13 Jun 2003
Posts: 4087
Location: Dresden, Germany

PostPosted: Mon Apr 18, 2005 11:27 am    Post subject: [ GLSA 200504-15 ] PHP: Multiple vulnerabilities Reply with quote

Gentoo Linux Security Advisory

Title: PHP: Multiple vulnerabilities (GLSA 200504-15)
Severity: high
Exploitable: remote
Date: April 18, 2005
Bug(s): #87517
ID: 200504-15

Synopsis


Several vulnerabilities were found and fixed in PHP image handling
functions, potentially resulting in Denial of Service conditions or the
remote execution of arbitrary code.


Background


PHP is a general-purpose scripting language widely used to develop
web-based applications. It can run inside a web server using the
mod_php module or the CGI version of PHP, or can run stand-alone in a
CLI.


Affected Packages

Package: dev-php/php
Vulnerable: < 4.3.11
Unaffected: >= 4.3.11
Architectures: All supported architectures

Package: dev-php/mod_php
Vulnerable: < 4.3.11
Unaffected: >= 4.3.11
Architectures: All supported architectures

Package: dev-php/php-cgi
Vulnerable: < 4.3.11
Unaffected: >= 4.3.11
Architectures: All supported architectures


Description


An integer overflow and an unbound recursion were discovered in
the processing of Image File Directory tags in PHP's EXIF module
(CAN-2005-1042, CAN-2005-1043). Furthermore, two infinite loops have
been discovered in the getimagesize() function when processing IFF or
JPEG images (CAN-2005-0524, CAN-2005-0525).


Impact


A remote attacker could craft an image file with a malicious EXIF
IFD tag, a large IFD nesting level or invalid size parameters and send
it to a web application that would process this user-provided image
using one of the affected functions. This could result in denying
service on the attacked server and potentially executing arbitrary code
with the rights of the web server.


Workaround


There is no known workaround at this time.


Resolution


All PHP users should upgrade to the latest version:
Code:
# emerge --sync
    # emerge --ask --oneshot --verbose ">=dev-php/php-4.3.11"

All mod_php users should upgrade to the latest version:
Code:
# emerge --sync
    # emerge --ask --oneshot --verbose ">=dev-php/mod_php-4.3.11"

All php-cgi users should upgrade to the latest version:
Code:
# emerge --sync
    # emerge --ask --oneshot --verbose ">=dev-php/php-cgi-4.3.11"


References

PHP 4.3.11 Release Announcement
CAN-2005-0524
CAN-2005-0525
CAN-2005-1042
CAN-2005-1043


Last edited by GLSA on Mon Oct 04, 2010 4:19 am; edited 5 times in total
Back to top
View user's profile Send private message
Display posts from previous:   
Reply to topic    Gentoo Forums Forum Index News & Announcements All times are GMT
Page 1 of 1

 
Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum