From a24567fbc43f221b14e805f9bc0b7c6d16911c46 Mon Sep 17 00:00:00 2001 From: Alex Legler Date: Sun, 8 Mar 2015 22:02:38 +0100 Subject: Import existing advisories --- glsa-201001-03.xml | 118 +++++++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 118 insertions(+) create mode 100644 glsa-201001-03.xml (limited to 'glsa-201001-03.xml') diff --git a/glsa-201001-03.xml b/glsa-201001-03.xml new file mode 100644 index 00000000..7062b45f --- /dev/null +++ b/glsa-201001-03.xml @@ -0,0 +1,118 @@ + + + + + + + PHP: Multiple vulnerabilities + + Multiple vulnerabilities were found in PHP, the worst of which leading to + the remote execution of arbitrary code. + + php + January 05, 2010 + January 05, 2010: 01 + 249875 + 255121 + 260576 + 261192 + 266125 + 274670 + 280602 + 285434 + 292132 + 293888 + 297369 + 297370 + local remote + + + 5.2.12 + 5.2.12 + + + +

+ PHP is a widely-used general-purpose scripting language that is + especially suited for Web development and can be embedded into HTML. +

+
+ +

+ Multiple vulnerabilities have been discovered in PHP. Please review the + CVE identifiers referenced below and the associated PHP release notes + for details. +

+
+ +

+ A context-dependent attacker could execute arbitrary code via a + specially crafted string containing an HTML entity when the mbstring + extension is enabled. Furthermore a remote attacker could execute + arbitrary code via a specially crafted GD graphics file. +

+

+ A remote attacker could also cause a Denial of Service via a malformed + string passed to the json_decode() function, via a specially crafted + ZIP file passed to the php_zip_make_relative_path() function, via a + malformed JPEG image passed to the exif_read_data() function, or via + temporary file exhaustion. It is also possible for an attacker to spoof + certificates, bypass various safe_mode and open_basedir restrictions + when certain criteria are met, perform Cross-site scripting attacks, + more easily perform SQL injection attacks, manipulate settings of other + virtual hosts on the same server via a malicious .htaccess entry when + running on Apache, disclose memory portions, and write arbitrary files + via a specially crafted ZIP archive. Some vulnerabilities with unknown + impact and attack vectors have been reported as well. +

+
+ +

+ There is no known workaround at this time. +

+
+ +

+ All PHP users should upgrade to the latest version. As PHP is + statically linked against a vulnerable version of the c-client library + when the imap or kolab USE flag is enabled (GLSA 200911-03), users + should upgrade net-libs/c-client beforehand: +

+ + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-libs/c-client-2007e" + # emerge --ask --oneshot --verbose ">=dev-lang/php-5.2.12" +
+ + CVE-2008-5498 + CVE-2008-5514 + CVE-2008-5557 + CVE-2008-5624 + CVE-2008-5625 + CVE-2008-5658 + CVE-2008-5814 + CVE-2008-5844 + CVE-2008-7002 + CVE-2009-0754 + CVE-2009-1271 + CVE-2009-1272 + CVE-2009-2626 + CVE-2009-2687 + CVE-2009-3291 + CVE-2009-3292 + CVE-2009-3293 + CVE-2009-3546 + CVE-2009-3557 + CVE-2009-3558 + CVE-2009-4017 + CVE-2009-4142 + CVE-2009-4143 + GLSA 200911-03 + + + keytoaster + + + rbu + +
-- cgit v1.2.3-65-gdbad