Mangelnde Prüfung von Zertifikaten in php
ID: | RHSA-2006:0567-01 |
Distribution: | Red Hat |
Plattformen: | Red Hat Enterprise Linux |
Datum: | Di, 25. Juli 2006, 15:08 |
Referenzen: | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-2214
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1494 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3017 |
Applikationen: | PHP |
Originalnachricht |
|
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - --------------------------------------------------------------------- Red Hat Security Advisory Synopsis: Moderate: php security update Advisory ID: RHSA-2006:0567-01 Advisory URL: https://rhn.redhat.com/errata/RHSA-2006-0567.html Issue date: 2006-07-25 Updated on: 2006-07-25 Product: Red Hat Enterprise Linux CVE Names: CVE-2002-2214 CVE-2006-1494 CVE-2006-3017 - --------------------------------------------------------------------- 1. Summary: Updated PHP packages that fix multiple security issues are now available for Red Hat Enterprise Linux 2.1 This update has been rated as having moderate security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64 Red Hat Linux Advanced Workstation 2.1 - ia64 Red Hat Enterprise Linux ES version 2.1 - i386 Red Hat Enterprise Linux WS version 2.1 - i386 3. Problem description: PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Web server. A flaw was found in the zend_hash_del() PHP function. For PHP scripts that rely on the use of the unset() function, a remote attacker could force variable initialization to be bypassed. This would be a security issue particularly for installations that enable the "register_globals" setting. "register_globals" is disabled by default in Red Hat Enterprise Linux. (CVE-2006-3017) A directory traversal vulnerability was found in PHP. Local users could bypass open_basedir restrictions allowing remote attackers to create files in arbitrary directories via the tempnam() function. (CVE-2006-1494) A flaw was found in the PHP IMAP MIME header decoding function. An attacker could craft a message with an overly long header which caused PHP to crash. (CVE-2002-2214) Users of PHP should upgrade to these updated packages, which contain backported patches that resolve these issues. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via Red Hat Network. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/): 195495 - CVE-2002-2214 php imap To header buffer overflow 196257 - CVE-2006-3017 zend_hash_del bug 197050 - CVE-2006-1494 PHP tempname open_basedir issue 6. RPMs required: Red Hat Enterprise Linux AS (Advanced Server) version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/php-4.1.2-2.8.src.rpm b00da9890a6407ceeefde6af712335a8 php-4.1.2-2.8.src.rpm i386: 49c5170d0254ab6852ed1a0ec99ee005 php-4.1.2-2.8.i386.rpm fbbf8ecb1d8212fb61ab03cb582fa6ba php-devel-4.1.2-2.8.i386.rpm a8cc27adc804ac40f5530f5bc305209b php-imap-4.1.2-2.8.i386.rpm 2b9e509db230478986a620bccf3c3595 php-ldap-4.1.2-2.8.i386.rpm 296c22cd73b830fc0455a3cc00b38858 php-manual-4.1.2-2.8.i386.rpm a083c9ad5a0aef8c528abb1123bb88aa php-mysql-4.1.2-2.8.i386.rpm 7df60aec5a0b642ea6e8fcb8ae4e0bc4 php-odbc-4.1.2-2.8.i386.rpm bdbfcb35354ad079d4a15a4054f2caf8 php-pgsql-4.1.2-2.8.i386.rpm ia64: 0de57ca1d1f8ad29f509288a9c67f501 php-4.1.2-2.8.ia64.rpm b386f3eacea485b36525055006fa89c5 php-devel-4.1.2-2.8.ia64.rpm 91b7f7262828ad5c9f17d8e1e02bd9e1 php-imap-4.1.2-2.8.ia64.rpm bb5d71d5964ed4e3ebaba5c1e755599c php-ldap-4.1.2-2.8.ia64.rpm 2d1d721016880e26c041d36af289288f php-manual-4.1.2-2.8.ia64.rpm 74de741c6420b49591eb82e8d3109286 php-mysql-4.1.2-2.8.ia64.rpm ac98627c368011e8bc123fab619131fa php-odbc-4.1.2-2.8.ia64.rpm 101f908d73b7182821a6ca553df4c3f5 php-pgsql-4.1.2-2.8.ia64.rpm Red Hat Linux Advanced Workstation 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/php-4.1.2-2.8.src.rpm b00da9890a6407ceeefde6af712335a8 php-4.1.2-2.8.src.rpm ia64: 0de57ca1d1f8ad29f509288a9c67f501 php-4.1.2-2.8.ia64.rpm b386f3eacea485b36525055006fa89c5 php-devel-4.1.2-2.8.ia64.rpm 91b7f7262828ad5c9f17d8e1e02bd9e1 php-imap-4.1.2-2.8.ia64.rpm bb5d71d5964ed4e3ebaba5c1e755599c php-ldap-4.1.2-2.8.ia64.rpm 2d1d721016880e26c041d36af289288f php-manual-4.1.2-2.8.ia64.rpm 74de741c6420b49591eb82e8d3109286 php-mysql-4.1.2-2.8.ia64.rpm ac98627c368011e8bc123fab619131fa php-odbc-4.1.2-2.8.ia64.rpm 101f908d73b7182821a6ca553df4c3f5 php-pgsql-4.1.2-2.8.ia64.rpm Red Hat Enterprise Linux ES version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/php-4.1.2-2.8.src.rpm b00da9890a6407ceeefde6af712335a8 php-4.1.2-2.8.src.rpm i386: 49c5170d0254ab6852ed1a0ec99ee005 php-4.1.2-2.8.i386.rpm fbbf8ecb1d8212fb61ab03cb582fa6ba php-devel-4.1.2-2.8.i386.rpm a8cc27adc804ac40f5530f5bc305209b php-imap-4.1.2-2.8.i386.rpm 2b9e509db230478986a620bccf3c3595 php-ldap-4.1.2-2.8.i386.rpm 296c22cd73b830fc0455a3cc00b38858 php-manual-4.1.2-2.8.i386.rpm a083c9ad5a0aef8c528abb1123bb88aa php-mysql-4.1.2-2.8.i386.rpm 7df60aec5a0b642ea6e8fcb8ae4e0bc4 php-odbc-4.1.2-2.8.i386.rpm bdbfcb35354ad079d4a15a4054f2caf8 php-pgsql-4.1.2-2.8.i386.rpm Red Hat Enterprise Linux WS version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/php-4.1.2-2.8.src.rpm b00da9890a6407ceeefde6af712335a8 php-4.1.2-2.8.src.rpm i386: 49c5170d0254ab6852ed1a0ec99ee005 php-4.1.2-2.8.i386.rpm fbbf8ecb1d8212fb61ab03cb582fa6ba php-devel-4.1.2-2.8.i386.rpm a8cc27adc804ac40f5530f5bc305209b php-imap-4.1.2-2.8.i386.rpm 2b9e509db230478986a620bccf3c3595 php-ldap-4.1.2-2.8.i386.rpm 296c22cd73b830fc0455a3cc00b38858 php-manual-4.1.2-2.8.i386.rpm a083c9ad5a0aef8c528abb1123bb88aa php-mysql-4.1.2-2.8.i386.rpm 7df60aec5a0b642ea6e8fcb8ae4e0bc4 php-odbc-4.1.2-2.8.i386.rpm bdbfcb35354ad079d4a15a4054f2caf8 php-pgsql-4.1.2-2.8.i386.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-2214 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1494 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3017 http://www.php.net/register_globals http://www.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is |