[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247768

 
 

909

 
 

194555

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

MDVSA-2012:065 -- Mandriva php

ID: oval:org.secpod.oval:def:302857Date: (C)2012-12-20   (M)2023-12-07
Class: PATCHFamily: unix




Multiple vulnerabilities has been identified and fixed in php: The PDORow implementation in PHP before 5.3.9 does not properly interact with the session feature, which allows remote attackers to cause a denial of service via a crafted application that uses a PDO driver for a fetch and then calls the session_start function, as demonstrated by a crash of the Apache HTTP Server . Note: this was fixed with php-5.3.10 The php_register_variable_ex function in php_variables.c in PHP 5.3.9 allows remote attackers to execute arbitrary code via a request containing a large number of variables, related to improper handling of array variables. NOTE: this vulnerability exists because of an incorrect fix for CVE-2011-4885 . Note: this was fixed with php-5.3.10 PHP before 5.3.10 does not properly perform a temporary change to the magic_quotes_gpc directive during the importing of environment variables, which makes it easier for remote attackers to conduct SQL injection attacks via a crafted request, related to main/php_variables.c, sapi/cgi/cgi_main.c, and sapi/fpm/fpm/fpm_main.c . Insufficient validating of upload name leading to corrupted $_FILES indices . The updated php packages have been upgraded to 5.3.11 which is not vulnerable to these issues. Stack-based buffer overflow in the suhosin_encrypt_single_cookie function in the transparent cookie-encryption feature in the Suhosin extension before 0.9.33 for PHP, when suhosin.cookie.encrypt and suhosin.multiheader are enabled, might allow remote attackers to execute arbitrary code via a long string that is used in a Set-Cookie HTTP header . The php-suhosin packages has been upgraded to the 0.9.33 version which is not affected by this issue. Additionally some of the PECL extensions has been upgraded to their latest respective versions which resolves various upstream bugs.

Platform:
Mandriva Linux 2011.0
Mandriva Linux 2010.1
Product:
php
Reference:
MDVSA-2012:065
CVE-2012-1172
CVE-2012-0831
CVE-2012-0830
CVE-2012-0807
CVE-2012-0788
CVE    5
CVE-2012-0788
CVE-2012-0830
CVE-2012-0807
CVE-2012-0831
...
CPE    2
cpe:/o:mandriva:linux:2010.1
cpe:/o:mandriva:linux:2011.0

© SecPod Technologies