[Forgot Password]
Login  Register Subscribe

23631

 
 

120293

 
 

98250

 
 

909

 
 

79281

 
 

109

Paid content will be excluded from the download.


Download | Alert*
OVAL

MDVSA-2009:021 -- Mandriva php

ID: oval:org.secpod.oval:def:300742Date: (C)2012-01-07   (M)2017-10-04
Class: PATCHFamily: unix




A buffer overflow in the imageloadfont function in PHP allowed context-dependent attackers to cause a denial of service and potentially execute arbitrary code via a crafted font file . A buffer overflow in the memnstr function allowed context-dependent attackers to cause a denial of service and potentially execute arbitrary code via the delimiter argument to the explode function . PHP, when used as a FastCGI module, allowed remote attackers to cause a denial of service via a request with multiple dots preceding the extension . An array index error in the imageRotate function in PHP allowed context-dependent attackers to read the contents of arbitrary memory locations via a crafted value of the third argument to the function for an indexed image . The updated packages have been patched to correct these issues.

Platform:
Mandriva Linux 2009.0
Mandriva Linux 2008.1
Product:
php
Reference:
MDVSA-2009:021
CVE-2008-5498
CVE-2008-3660
CVE-2008-3659
CVE-2008-3658
CVE    4
CVE-2008-5498
CVE-2008-3660
CVE-2008-3658
CVE-2008-3659
...
CPE    2
cpe:/o:mandriva:linux:2008.1
cpe:/o:mandriva:linux:2009.0

© 2013 SecPod Technologies