The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[CLA-2002:545] Conectiva Linux Security Announcement - php4


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Date: Wed, 13 Nov 2002 20:18:31 -0200
From: secure@conectiva.com.br
To: conectiva-updates@papaleguas.conectiva.com.br, lwn@lwn.net,
Subject: [CLA-2002:545] Conectiva Linux Security Announcement - php4

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
CONECTIVA LINUX SECURITY ANNOUNCEMENT 
- --------------------------------------------------------------------------

PACKAGE   : php4
SUMMARY   : Safe mode bypass and other vulnerabilities
DATE      : 2002-11-13 20:17:00
ID        : CLA-2002:545
RELEVANT
RELEASES  : 6.0, 7.0, 8

- -------------------------------------------------------------------------

DESCRIPTION
 PHP[1] is a very popular scripting language used by web servers to
 offer dynamic content. 
 
 This update addresses the following issues:
 
 1) Safe mode bypass vulnerability[3]
 Wojciech Purczynski <cliph@isec.pl> reported[2] a vulnerability in
 the mail() function which could be used to bypass PHP's safe mode
 setting and execute any program as if this mode was not enabled.
 Since PHP 4.0.5, the mail() function has a fifth parameter which is
 used to pass additional command line parameters to the sendmail
 binary. It is possible to use this parameter to change the behaviour
 of sendmail and use it to execute arbitrary programs or scripts.
 The updated PHP packages disallow the use of this fifth parameter if
 safe mode is in use.
 This vulnerability affects Conectiva Linux 7.0 and 8 if safe mode is
 in use. Conectiva Linux 6.0 was shipped with an earlier version of
 PHP which does not have this parameter.
 
 2) Control characters injection[4]
 Wojciech Purczynski <cliph@isec.pl> also reported that it is possible
 to insert ASCII control characters (such as '\n') in the text
 supplied as parameter to the mail() function. Depending on how the
 PHP script handles user input (wheter it is filtered or not, and
 how), this could be used to add other mail headers to the message.
 This vulnerability affects PHP4 and PHP3. The fix applied to the
 packages listed here change such characters, if found in the
 "subject" or "to" parameter, to a white space (" ").
 In a similar way, other functions such as fopen() also accept control
 characters in their parameters. This is now also being filtered, and
 such characters are being changed to "_" (underscore).
 
 3) Old file upload vulnerability[4][6]
 While preparing the updates for the above issues, it has come to our
 attention that the PHP3 packages in Conectiva Linux 7.0 were not
 updated regarding the file upload vulnerability which was addressed
 in the CLSA-2002:468[6] advisory. PHP4 is the default PHP package for
 that distribution and PHP3 was shipped in the second CD only for
 backwards compatibility. The PHP3 packages for CL 7.0 have now been
 fixed.


SOLUTION
 It is recommended that all PHP users upgrade their packages.
 
 IMPORTANT: if PHP is being used as an Apache module, the web server
 has to be restarted after the upgrade if it was already running. To
 do so, please run, as root:
 
 service httpd stop 
 
 (wait a few seconds and check with "ps ax|grep httpd" if there are
 any httpd processes running. On a busy webserver this could take a
 little longer.) 
 
 service httpd start 
 
 
 REFERENCES
 1.http://www.php.net/
 2.http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0985
 3.http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0986
 4.http://online.securityfocus.com/bid/4183
 5.http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000468&idioma=en


DIRECT DOWNLOAD LINKS TO THE UPDATED PACKAGES
ftp://atualizacoes.conectiva.com.br/6.0/SRPMS/mod_php3-3.0.18-9U60_2cl.src.rpm
ftp://atualizacoes.conectiva.com.br/6.0/SRPMS/php4-4.0.4pl1-2U60_3cl.src.rpm
ftp://atualizacoes.conectiva.com.br/6.0/RPMS/php4-4.0.4pl1-2U60_3cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/6.0/RPMS/mod_php3-3.0.18-9U60_2cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/6.0/RPMS/mod_php3-doc-3.0.18-9U60_2cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/6.0/RPMS/mod_php3-gd-3.0.18-9U60_2cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/6.0/RPMS/mod_php3-imap-3.0.18-9U60_2cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/6.0/RPMS/mod_php3-ldap-3.0.18-9U60_2cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/6.0/RPMS/mod_php3-mysql-3.0.18-9U60_2cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/6.0/RPMS/mod_php3-pgsql-3.0.18-9U60_2cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/6.0/RPMS/mod_php3-xml-3.0.18-9U60_2cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/6.0/RPMS/mod_php4-4.0.4pl1-2U60_3cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/6.0/RPMS/php3-cgi-3.0.18-9U60_2cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/6.0/RPMS/php3-cgi-gd-3.0.18-9U60_2cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/6.0/RPMS/php3-cgi-imap-3.0.18-9U60_2cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/6.0/RPMS/php3-cgi-ldap-3.0.18-9U60_2cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/6.0/RPMS/php3-cgi-mysql-3.0.18-9U60_2cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/6.0/RPMS/php3-cgi-pgsql-3.0.18-9U60_2cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/6.0/RPMS/php3-cgi-xml-3.0.18-9U60_2cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/6.0/RPMS/php4-doc-4.0.4pl1-2U60_3cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/6.0/RPMS/php4-imap-4.0.4pl1-2U60_3cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/6.0/RPMS/php4-ldap-4.0.4pl1-2U60_3cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/6.0/RPMS/php4-mysql-4.0.4pl1-2U60_3cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/6.0/RPMS/php4-pgsql-4.0.4pl1-2U60_3cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/php4-4.1.1-1U70_5cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/mod_php4-4.1.1-1U70_5cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/php4-devel-4.1.1-1U70_5cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/php4-doc-4.1.1-1U70_5cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/php4-imap-4.1.1-1U70_5cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/php4-ldap-4.1.1-1U70_5cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/php4-mysql-4.1.1-1U70_5cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/php4-odbc-4.1.1-1U70_5cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/php4-pgsql-4.1.1-1U70_5cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/SRPMS/php4-4.1.1-1U70_5cl.src.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/mod_php3-3.0.18-10U70_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/mod_php3-doc-3.0.18-10U70_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/mod_php3-gd-3.0.18-10U70_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/mod_php3-imap-3.0.18-10U70_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/mod_php3-ldap-3.0.18-10U70_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/mod_php3-mysql-3.0.18-10U70_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/mod_php3-pgsql-3.0.18-10U70_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/php3-cgi-3.0.18-10U70_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/mod_php3-xml-3.0.18-10U70_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/php3-cgi-gd-3.0.18-10U70_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/php3-cgi-imap-3.0.18-10U70_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/php3-cgi-ldap-3.0.18-10U70_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/php3-cgi-mysql-3.0.18-10U70_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/php3-cgi-pgsql-3.0.18-10U70_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/php3-cgi-xml-3.0.18-10U70_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/mod_php3-3.0.18-10U70_1cl.src.rpm
ftp://atualizacoes.conectiva.com.br/7.0/SRPMS/mod_php3-3.0.18-10U70_1cl.src.rpm
ftp://atualizacoes.conectiva.com.br/8/SRPMS/php4-4.1.1-7U80_1cl.src.rpm
ftp://atualizacoes.conectiva.com.br/8/RPMS/mod_php4-4.1.1-7U80_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/8/RPMS/php4-4.1.1-7U80_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/8/RPMS/php4-devel-4.1.1-7U80_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/8/RPMS/php4-doc-4.1.1-7U80_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/8/RPMS/php4-imap-4.1.1-7U80_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/8/RPMS/php4-ldap-4.1.1-7U80_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/8/RPMS/php4-mysql-4.1.1-7U80_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/8/RPMS/php4-odbc-4.1.1-7U80_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/8/RPMS/php4-pgsql-4.1.1-7U80_1cl.i386.rpm


ADDITIONAL INSTRUCTIONS
 Users of Conectiva Linux version 6.0 or higher may use apt to perform 
 upgrades of RPM packages:
 - add the following line to /etc/apt/sources.list if it is not there yet
   (you may also use linuxconf to do this):

 rpm [cncbr] ftp://atualizacoes.conectiva.com.br 6.0/conectiva updates

(replace 6.0 with the correct version number if you are not running CL6.0)

 - run:                 apt-get update
 - after that, execute: apt-get upgrade

 Detailed instructions reagarding the use of apt and upgrade examples 
 can be found at http://distro.conectiva.com.br/atualizacoes/#apt?idioma=en


- -------------------------------------------------------------------------
All packages are signed with Conectiva's GPG key. The key and instructions
on how to import it can be found at 
http://distro.conectiva.com.br/seguranca/chave/?idioma=en
Instructions on how to check the signatures of the RPM packages can be
found at http://distro.conectiva.com.br/seguranca/politica/?idioma=en
- -------------------------------------------------------------------------
All our advisories and generic update instructions can be viewed at
http://distro.conectiva.com.br/atualizacoes/?idioma=en

- -------------------------------------------------------------------------
subscribe: conectiva-updates-subscribe@papaleguas.conectiva.com.br
unsubscribe: conectiva-updates-unsubscribe@papaleguas.conectiva.com.br
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE90s+242jd0JmAcZARAp7jAKDDmZ8V355UcYVoMDhwJUSR7WsyKQCeOTue
y4MQkf/o/JYnpHgkwUnNJvs=
=nsaG
-----END PGP SIGNATURE-----

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру