[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248149

 
 

909

 
 

194803

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

MDVSA-2008:127 -- Mandriva php

ID: oval:org.secpod.oval:def:301251Date: (C)2012-01-07   (M)2024-02-19
Class: PATCHFamily: unix




A number of vulnerabilities have been found and corrected in PHP: The htmlentities and htmlspecialchars functions in PHP prior to 5.2.5 accepted partial multibyte sequences, which has unknown impact and attack vectors . The output_add_rewrite_var function in PHP prior to 5.2.5 rewrites local forms in which the ACTION attribute references a non-local URL, which could allow a remote attacker to obtain potentially sensitive information by reading the requests for this URL . php-cgi in PHP prior to 5.2.6 does not properly calculate the length of PATH_TRANSLATED, which has unknown impact and attack vectors . The escapeshellcmd API function in PHP prior to 5.2.6 has unknown impact and context-dependent attack vectors related to incomplete multibyte characters . Weaknesses in the GENERATE_SEED macro in PHP prior to 4.4.8 and 5.2.5 were discovered that could produce a zero seed in rare circumstances on 32bit systems and generations a portion of zero bits during conversion due to insufficient precision on 64bit systems . The IMAP module in PHP uses obsolete API calls that allow context-dependent attackers to cause a denial of service via a long IMAP request . In addition, this update also corrects an issue with some float to string conversions. The updated packages have been patched to correct these issues.

Platform:
Mandriva Linux 2008.0
Product:
php
Reference:
MDVSA-2008:127
CVE-2007-5898
CVE-2007-5899
CVE-2008-0599
CVE-2008-2051
CVE-2008-2107
CVE-2008-2108
CVE-2008-2829
CVE    7
CVE-2007-5899
CVE-2007-5898
CVE-2008-2051
CVE-2008-2107
...
CPE    1
cpe:/o:mandriva:linux:2008.0

© SecPod Technologies