The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


Security Update: [CSSA-2002-023.0] Linux: PHP multipart/form-data vulnerabilities


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Date: Fri, 17 May 2002 11:20:54 -0700
From: [email protected]
To: [email protected], [email protected],
Subject: Security Update: [CSSA-2002-023.0] Linux: PHP multipart/form-data vulnerabilities

--9amGYk9869ThD9tj
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline

To: [email protected] [email protected] [email protected]

______________________________________________________________________________

		Caldera International, Inc.  Security Advisory

Subject:		Linux: PHP multipart/form-data vulnerabilities
Advisory number: 	CSSA-2002-023.0
Issue date: 		2002 May 16
Cross reference:
______________________________________________________________________________


1. Problem Description

	Several flaws have been found in the way PHP handles
	multipart/form-data POST requests. Each of the flaws could allow
	an attacker to execute arbitrary code on the victim's system.


2. Vulnerable Supported Versions

	System				Package
	----------------------------------------------------------------------

	OpenLinux 3.1.1 Server		prior to php-4.0.6-3.2.i386.rpm
					prior to php-doc-4.0.6-3.2.i386.rpm

	OpenLinux 3.1.1 Workstation	prior to php-4.0.6-3.2.i386.rpm
					prior to php-doc-4.0.6-3.2.i386.rpm

	OpenLinux 3.1 Server		prior to php-4.0.6-3.2.i386.rpm
					prior to php-doc-4.0.6-3.2.i386.rpm

	OpenLinux 3.1 Workstation	prior to php-4.0.6-3.2.i386.rpm
					prior to php-doc-4.0.6-3.2.i386.rpm


3. Solution

	The proper solution is to install the latest packages.


4. OpenLinux 3.1.1 Server

	4.1 Package Location

	ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1.1/Server/current/RPMS

	4.2 Packages

	1bbbc55e7dfd717f02b3668c57891edf	php-4.0.6-3.2.i386.rpm
	20c0812616f3df9c48078134c7e7fac6	php-doc-4.0.6-3.2.i386.rpm

	4.3 Installation

	rpm -Fvh php-4.0.6-3.2.i386.rpm
	rpm -Fvh php-doc-4.0.6-3.2.i386.rpm

	4.4 Source Package Location

	ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1.1/Server/current/SRPMS

	4.5 Source Packages

	d17abc8b13cc6074475c2eb4d5cda6e1	php-4.0.6-3.2.src.rpm


5. OpenLinux 3.1.1 Workstation

	5.1 Package Location

	ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1.1/Workstation/current/RPMS

	5.2 Packages

	476c985cfab14a44ec3b5b1878900277	php-4.0.6-3.2.i386.rpm
	e2434fec5c6fb8b877e35dcceb85c44b	php-doc-4.0.6-3.2.i386.rpm

	5.3 Installation

	rpm -Fvh php-4.0.6-3.2.i386.rpm
	rpm -Fvh php-doc-4.0.6-3.2.i386.rpm

	5.4 Source Package Location

	ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1.1/Workstation/current/SRPMS

	5.5 Source Packages

	e51125ee2a73855bf6adf0cdd38baadc	php-4.0.6-3.2.src.rpm


6. OpenLinux 3.1 Server

	6.1 Package Location

	ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1/Server/current/RPMS

	6.2 Packages

	6714aca296f79646b5e3a1875481dfd5	php-4.0.6-3.2.i386.rpm
	fdf7024cc7dde4b3131362080d48c1a3	php-doc-4.0.6-3.2.i386.rpm

	6.3 Installation

	rpm -Fvh php-4.0.6-3.2.i386.rpm
	rpm -Fvh php-doc-4.0.6-3.2.i386.rpm

	6.4 Source Package Location

	ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1/Server/current/SRPMS

	6.5 Source Packages

	12e7a38c6fecfd011fe244816b6200f7	php-4.0.6-3.2.src.rpm


7. OpenLinux 3.1 Workstation

	7.1 Package Location

	ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1/Workstation/current/RPMS

	7.2 Packages

	22ab000e77e3b7cfb320a0bd276f36b8	php-4.0.6-3.2.i386.rpm
	520590022934e36c5d4695adb8296f64	php-doc-4.0.6-3.2.i386.rpm

	7.3 Installation

	rpm -Fvh php-4.0.6-3.2.i386.rpm
	rpm -Fvh php-doc-4.0.6-3.2.i386.rpm

	7.4 Source Package Location

	ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1/Workstation/current/SRPMS

	7.5 Source Packages

	f3b5da8a31e6e557a84c634328564285	php-4.0.6-3.2.src.rpm


8. References

	Specific references for this advisory:

		http://security.e-matters.de/advisories/012002.html
		http://www.kb.cert.org/vuls/id/297363
		http://bugs.php.net/bug.php?id=15736

	Caldera OpenLinux security resources:
		http://www.caldera.com/support/security/index.html

	Caldera UNIX security resources:
		http://stage.caldera.com/support/security/

	This security fix closes Caldera incidents sr861013, fz520246,
	erg711976 and erg711968.


9. Disclaimer

	Caldera International, Inc. is not responsible for the misuse
	of any of the information we provide on this website and/or
	through our security advisories. Our advisories are a service
	to our customers intended to promote secure installation and
	use of Caldera products.


10. Acknowledgements

	Stefan Esser ([email protected]) reported these
	vulnerabilities.

______________________________________________________________________________

--9amGYk9869ThD9tj
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (SCO_SV)
Comment: For info see http://www.gnupg.org

iEYEARECAAYFAjzlSgYACgkQbluZssSXDTFcoQCgwFgy1lIqK9fYawvvlbnRS5c3
3+gAoMsSfteE0/Rf5QNz+sMDSqDcukOR
=l2PP
-----END PGP SIGNATURE-----

--9amGYk9869ThD9tj--

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру