MDVSA-2008:126 -- Mandriva phpID: oval:org.secpod.oval:def:301343 | Date: (C)2012-01-07 (M)2024-02-19 |
Class: PATCH | Family: unix |
A number of vulnerabilities have been found and corrected in PHP: PHP 5.2.1 would allow context-dependent attackers to read portions of heap memory by executing certain scripts with a serialized data input string beginning with "S:", which did not properly track the number of input bytes being processed . A vulnerability in the chunk_split function in PHP prior to 5.2.4 has unknown impact and attack vectors, related to an incorrect size calculation . The htmlentities and htmlspecialchars functions in PHP prior to 5.2.5 accepted partial multibyte sequences, which has unknown impact and attack vectors . The output_add_rewrite_var function in PHP prior to 5.2.5 rewrites local forms in which the ACTION attribute references a non-local URL, which could allow a remote attacker to obtain potentially sensitive information by reading the requests for this URL . The escapeshellcmd API function in PHP prior to 5.2.6 has unknown impact and context-dependent attack vectors related to incomplete multibyte characters . Weaknesses in the GENERATE_SEED macro in PHP prior to 4.4.8 and 5.2.5 were discovered that could produce a zero seed in rare circumstances on 32bit systems and generations a portion of zero bits during conversion due to insufficient precision on 64bit systems . The IMAP module in PHP uses obsolete API calls that allow context-dependent attackers to cause a denial of service via a long IMAP request . The updated packages have been patched to correct these issues.
Platform: |
Mandriva Linux 2007.1 |