[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247768

 
 

909

 
 

194555

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

MDVSA-2013:016 -- Mandriva php

ID: oval:org.secpod.oval:def:303001Date: (C)2013-03-09   (M)2023-12-07
Class: PATCHFamily: unix




Multiple vulnerabilities has been discovered and corrected in php: PHP does not validate the configration directive soap.wsdl_cache_dir before writing SOAP wsdl cache files to the filesystem. Thus an attacker is able to write remote wsdl files to arbitrary locations . PHP allows the use of external entities while parsing SOAP wsdl files which allows an attacker to read arbitrary files. If a web application unserializes user-supplied data and tries to execute any method of it, an attacker can send serialized SoapClient object initialized in non-wsdl mode which will make PHP to parse automatically remote XML-document specified in the location option parameter . The updated packages have been upgraded to the 5.3.22 version which is not vulnerable to these issues. Additionally, some packages which requires so has been rebuilt for php-5.3.22.

Platform:
Mandriva Linux 2011.0
Product:
php
Reference:
MDVSA-2013:016
CVE-2013-1635
CVE-2013-1643
CVE    2
CVE-2013-1643
CVE-2013-1635
CPE    1
cpe:/o:mandriva:linux:2011.0

© SecPod Technologies