Security Update: [CSSA-2002-023.0] Linux: PHP multipart/form-data vulnerabilities
Date: Fri, 17 May 2002 11:20:54 -0700
From: [email protected]
To: [email protected], [email protected],
Subject: Security Update: [CSSA-2002-023.0] Linux: PHP multipart/form-data vulnerabilities
--9amGYk9869ThD9tj
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
To: [email protected] [email protected] [email protected]
______________________________________________________________________________
Caldera International, Inc. Security Advisory
Subject: Linux: PHP multipart/form-data vulnerabilities
Advisory number: CSSA-2002-023.0
Issue date: 2002 May 16
Cross reference:
______________________________________________________________________________
1. Problem Description
Several flaws have been found in the way PHP handles
multipart/form-data POST requests. Each of the flaws could allow
an attacker to execute arbitrary code on the victim's system.
2. Vulnerable Supported Versions
System Package
----------------------------------------------------------------------
OpenLinux 3.1.1 Server prior to php-4.0.6-3.2.i386.rpm
prior to php-doc-4.0.6-3.2.i386.rpm
OpenLinux 3.1.1 Workstation prior to php-4.0.6-3.2.i386.rpm
prior to php-doc-4.0.6-3.2.i386.rpm
OpenLinux 3.1 Server prior to php-4.0.6-3.2.i386.rpm
prior to php-doc-4.0.6-3.2.i386.rpm
OpenLinux 3.1 Workstation prior to php-4.0.6-3.2.i386.rpm
prior to php-doc-4.0.6-3.2.i386.rpm
3. Solution
The proper solution is to install the latest packages.
4. OpenLinux 3.1.1 Server
4.1 Package Location
ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1.1/Server/current/RPMS
4.2 Packages
1bbbc55e7dfd717f02b3668c57891edf php-4.0.6-3.2.i386.rpm
20c0812616f3df9c48078134c7e7fac6 php-doc-4.0.6-3.2.i386.rpm
4.3 Installation
rpm -Fvh php-4.0.6-3.2.i386.rpm
rpm -Fvh php-doc-4.0.6-3.2.i386.rpm
4.4 Source Package Location
ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1.1/Server/current/SRPMS
4.5 Source Packages
d17abc8b13cc6074475c2eb4d5cda6e1 php-4.0.6-3.2.src.rpm
5. OpenLinux 3.1.1 Workstation
5.1 Package Location
ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1.1/Workstation/current/RPMS
5.2 Packages
476c985cfab14a44ec3b5b1878900277 php-4.0.6-3.2.i386.rpm
e2434fec5c6fb8b877e35dcceb85c44b php-doc-4.0.6-3.2.i386.rpm
5.3 Installation
rpm -Fvh php-4.0.6-3.2.i386.rpm
rpm -Fvh php-doc-4.0.6-3.2.i386.rpm
5.4 Source Package Location
ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1.1/Workstation/current/SRPMS
5.5 Source Packages
e51125ee2a73855bf6adf0cdd38baadc php-4.0.6-3.2.src.rpm
6. OpenLinux 3.1 Server
6.1 Package Location
ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1/Server/current/RPMS
6.2 Packages
6714aca296f79646b5e3a1875481dfd5 php-4.0.6-3.2.i386.rpm
fdf7024cc7dde4b3131362080d48c1a3 php-doc-4.0.6-3.2.i386.rpm
6.3 Installation
rpm -Fvh php-4.0.6-3.2.i386.rpm
rpm -Fvh php-doc-4.0.6-3.2.i386.rpm
6.4 Source Package Location
ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1/Server/current/SRPMS
6.5 Source Packages
12e7a38c6fecfd011fe244816b6200f7 php-4.0.6-3.2.src.rpm
7. OpenLinux 3.1 Workstation
7.1 Package Location
ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1/Workstation/current/RPMS
7.2 Packages
22ab000e77e3b7cfb320a0bd276f36b8 php-4.0.6-3.2.i386.rpm
520590022934e36c5d4695adb8296f64 php-doc-4.0.6-3.2.i386.rpm
7.3 Installation
rpm -Fvh php-4.0.6-3.2.i386.rpm
rpm -Fvh php-doc-4.0.6-3.2.i386.rpm
7.4 Source Package Location
ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1/Workstation/current/SRPMS
7.5 Source Packages
f3b5da8a31e6e557a84c634328564285 php-4.0.6-3.2.src.rpm
8. References
Specific references for this advisory:
http://security.e-matters.de/advisories/012002.html
http://www.kb.cert.org/vuls/id/297363
http://bugs.php.net/bug.php?id=15736
Caldera OpenLinux security resources:
http://www.caldera.com/support/security/index.html
Caldera UNIX security resources:
http://stage.caldera.com/support/security/
This security fix closes Caldera incidents sr861013, fz520246,
erg711976 and erg711968.
9. Disclaimer
Caldera International, Inc. is not responsible for the misuse
of any of the information we provide on this website and/or
through our security advisories. Our advisories are a service
to our customers intended to promote secure installation and
use of Caldera products.
10. Acknowledgements
Stefan Esser ([email protected]) reported these
vulnerabilities.
______________________________________________________________________________
--9amGYk9869ThD9tj
Content-Type: application/pgp-signature
Content-Disposition: inline
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (SCO_SV)
Comment: For info see http://www.gnupg.org
iEYEARECAAYFAjzlSgYACgkQbluZssSXDTFcoQCgwFgy1lIqK9fYawvvlbnRS5c3
3+gAoMsSfteE0/Rf5QNz+sMDSqDcukOR
=l2PP
-----END PGP SIGNATURE-----
--9amGYk9869ThD9tj--