[CLA-2002:545] Conectiva Linux Security Announcement - php4
Date: Wed, 13 Nov 2002 20:18:31 -0200
From: [email protected]
To: [email protected], [email protected],
Subject: [CLA-2002:545] Conectiva Linux Security Announcement - php4
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- --------------------------------------------------------------------------
CONECTIVA LINUX SECURITY ANNOUNCEMENT
- --------------------------------------------------------------------------
PACKAGE : php4
SUMMARY : Safe mode bypass and other vulnerabilities
DATE : 2002-11-13 20:17:00
ID : CLA-2002:545
RELEVANT
RELEASES : 6.0, 7.0, 8
- -------------------------------------------------------------------------
DESCRIPTION
PHP[1] is a very popular scripting language used by web servers to
offer dynamic content.
This update addresses the following issues:
1) Safe mode bypass vulnerability[3]
Wojciech Purczynski <[email protected]> reported[2] a vulnerability in
the mail() function which could be used to bypass PHP's safe mode
setting and execute any program as if this mode was not enabled.
Since PHP 4.0.5, the mail() function has a fifth parameter which is
used to pass additional command line parameters to the sendmail
binary. It is possible to use this parameter to change the behaviour
of sendmail and use it to execute arbitrary programs or scripts.
The updated PHP packages disallow the use of this fifth parameter if
safe mode is in use.
This vulnerability affects Conectiva Linux 7.0 and 8 if safe mode is
in use. Conectiva Linux 6.0 was shipped with an earlier version of
PHP which does not have this parameter.
2) Control characters injection[4]
Wojciech Purczynski <[email protected]> also reported that it is possible
to insert ASCII control characters (such as '\n') in the text
supplied as parameter to the mail() function. Depending on how the
PHP script handles user input (wheter it is filtered or not, and
how), this could be used to add other mail headers to the message.
This vulnerability affects PHP4 and PHP3. The fix applied to the
packages listed here change such characters, if found in the
"subject" or "to" parameter, to a white space (" ").
In a similar way, other functions such as fopen() also accept control
characters in their parameters. This is now also being filtered, and
such characters are being changed to "_" (underscore).
3) Old file upload vulnerability[4][6]
While preparing the updates for the above issues, it has come to our
attention that the PHP3 packages in Conectiva Linux 7.0 were not
updated regarding the file upload vulnerability which was addressed
in the CLSA-2002:468[6] advisory. PHP4 is the default PHP package for
that distribution and PHP3 was shipped in the second CD only for
backwards compatibility. The PHP3 packages for CL 7.0 have now been
fixed.
SOLUTION
It is recommended that all PHP users upgrade their packages.
IMPORTANT: if PHP is being used as an Apache module, the web server
has to be restarted after the upgrade if it was already running. To
do so, please run, as root:
service httpd stop
(wait a few seconds and check with "ps ax|grep httpd" if there are
any httpd processes running. On a busy webserver this could take a
little longer.)
service httpd start
REFERENCES
1.http://www.php.net/
2.http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0985
3.http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0986
4.http://online.securityfocus.com/bid/4183
5.http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000468&idioma=en
DIRECT DOWNLOAD LINKS TO THE UPDATED PACKAGES
ftp://atualizacoes.conectiva.com.br/6.0/SRPMS/mod_php3-3.0.18-9U60_2cl.src.rpm
ftp://atualizacoes.conectiva.com.br/6.0/SRPMS/php4-4.0.4pl1-2U60_3cl.src.rpm
ftp://atualizacoes.conectiva.com.br/6.0/RPMS/php4-4.0.4pl1-2U60_3cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/6.0/RPMS/mod_php3-3.0.18-9U60_2cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/6.0/RPMS/mod_php3-doc-3.0.18-9U60_2cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/6.0/RPMS/mod_php3-gd-3.0.18-9U60_2cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/6.0/RPMS/mod_php3-imap-3.0.18-9U60_2cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/6.0/RPMS/mod_php3-ldap-3.0.18-9U60_2cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/6.0/RPMS/mod_php3-mysql-3.0.18-9U60_2cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/6.0/RPMS/mod_php3-pgsql-3.0.18-9U60_2cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/6.0/RPMS/mod_php3-xml-3.0.18-9U60_2cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/6.0/RPMS/mod_php4-4.0.4pl1-2U60_3cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/6.0/RPMS/php3-cgi-3.0.18-9U60_2cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/6.0/RPMS/php3-cgi-gd-3.0.18-9U60_2cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/6.0/RPMS/php3-cgi-imap-3.0.18-9U60_2cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/6.0/RPMS/php3-cgi-ldap-3.0.18-9U60_2cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/6.0/RPMS/php3-cgi-mysql-3.0.18-9U60_2cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/6.0/RPMS/php3-cgi-pgsql-3.0.18-9U60_2cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/6.0/RPMS/php3-cgi-xml-3.0.18-9U60_2cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/6.0/RPMS/php4-doc-4.0.4pl1-2U60_3cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/6.0/RPMS/php4-imap-4.0.4pl1-2U60_3cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/6.0/RPMS/php4-ldap-4.0.4pl1-2U60_3cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/6.0/RPMS/php4-mysql-4.0.4pl1-2U60_3cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/6.0/RPMS/php4-pgsql-4.0.4pl1-2U60_3cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/php4-4.1.1-1U70_5cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/mod_php4-4.1.1-1U70_5cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/php4-devel-4.1.1-1U70_5cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/php4-doc-4.1.1-1U70_5cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/php4-imap-4.1.1-1U70_5cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/php4-ldap-4.1.1-1U70_5cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/php4-mysql-4.1.1-1U70_5cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/php4-odbc-4.1.1-1U70_5cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/php4-pgsql-4.1.1-1U70_5cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/SRPMS/php4-4.1.1-1U70_5cl.src.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/mod_php3-3.0.18-10U70_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/mod_php3-doc-3.0.18-10U70_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/mod_php3-gd-3.0.18-10U70_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/mod_php3-imap-3.0.18-10U70_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/mod_php3-ldap-3.0.18-10U70_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/mod_php3-mysql-3.0.18-10U70_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/mod_php3-pgsql-3.0.18-10U70_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/php3-cgi-3.0.18-10U70_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/mod_php3-xml-3.0.18-10U70_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/php3-cgi-gd-3.0.18-10U70_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/php3-cgi-imap-3.0.18-10U70_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/php3-cgi-ldap-3.0.18-10U70_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/php3-cgi-mysql-3.0.18-10U70_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/php3-cgi-pgsql-3.0.18-10U70_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/php3-cgi-xml-3.0.18-10U70_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/mod_php3-3.0.18-10U70_1cl.src.rpm
ftp://atualizacoes.conectiva.com.br/7.0/SRPMS/mod_php3-3.0.18-10U70_1cl.src.rpm
ftp://atualizacoes.conectiva.com.br/8/SRPMS/php4-4.1.1-7U80_1cl.src.rpm
ftp://atualizacoes.conectiva.com.br/8/RPMS/mod_php4-4.1.1-7U80_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/8/RPMS/php4-4.1.1-7U80_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/8/RPMS/php4-devel-4.1.1-7U80_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/8/RPMS/php4-doc-4.1.1-7U80_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/8/RPMS/php4-imap-4.1.1-7U80_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/8/RPMS/php4-ldap-4.1.1-7U80_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/8/RPMS/php4-mysql-4.1.1-7U80_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/8/RPMS/php4-odbc-4.1.1-7U80_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/8/RPMS/php4-pgsql-4.1.1-7U80_1cl.i386.rpm
ADDITIONAL INSTRUCTIONS
Users of Conectiva Linux version 6.0 or higher may use apt to perform
upgrades of RPM packages:
- add the following line to /etc/apt/sources.list if it is not there yet
(you may also use linuxconf to do this):
rpm [cncbr] ftp://atualizacoes.conectiva.com.br 6.0/conectiva updates
(replace 6.0 with the correct version number if you are not running CL6.0)
- run: apt-get update
- after that, execute: apt-get upgrade
Detailed instructions reagarding the use of apt and upgrade examples
can be found at http://distro.conectiva.com.br/atualizacoes/#apt?idioma=en
- -------------------------------------------------------------------------
All packages are signed with Conectiva's GPG key. The key and instructions
on how to import it can be found at
http://distro.conectiva.com.br/seguranca/chave/?idioma=en
Instructions on how to check the signatures of the RPM packages can be
found at http://distro.conectiva.com.br/seguranca/politica/?idioma=en
- -------------------------------------------------------------------------
All our advisories and generic update instructions can be viewed at
http://distro.conectiva.com.br/atualizacoes/?idioma=en
- -------------------------------------------------------------------------
subscribe: [email protected]
unsubscribe: [email protected]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org
iD8DBQE90s+242jd0JmAcZARAp7jAKDDmZ8V355UcYVoMDhwJUSR7WsyKQCeOTue
y4MQkf/o/JYnpHgkwUnNJvs=
=nsaG
-----END PGP SIGNATURE-----