Date: Thu, 21 Apr 2005 16:51:10 -0400
From: Peachtree Linux Security Team <security@peachtree.burdell.org.>
To: [email protected]Subject: [PLSN-0001] - Multiple vulnerabilities in Gaim
Message-ID: <20050421205110.GA20793@kevlar.burdell.org.>
Mime-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha1;
protocol="application/pgp-signature"; boundary="OXfL5xGRrasGEqWY"
Content-Disposition: inline
User-Agent: Mutt/1.4.2.1i
X-Virus-Scanned: antivirus-gw at tyumen.ru
--OXfL5xGRrasGEqWY
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
---------------------------------------------------------------------------
Peachtree Linux Security Notice PLSN-0001
April 19, 2005
Remote code execution and remote DoS vulnerability in PHP
CAN-2005-0524, CAN-2005-0525, CAN-2005-1042, CAN-2005-1043
---------------------------------------------------------------------------
The following Peachtree Linux releases are affected:
Peachtree Linux release 1 ("Atlanta")
Description:
CAN-2005-0524: The php_handle_iff function in image.c for PHP 4.2.2,
4.3.9, 4.3.10 and 5.0.3, as reachable by the getimagesize PHP function,
allows remote attackers to cause a denial of service (infinite loop)
via a -8 size value.
CAN-2005-0525: The php_next_marker function in image.c for PHP 4.2.2,
4.3.9, 4.3.10 and 5.0.3, as reachable by the getimagesize PHP function,
allows remote attackers to cause a denial of service (infinite loop)
via a JPEG image with an invalid marker value, which causes a negative
length value to be passed to php_stream_seek.
CAN-2005-1042: Integer overflow in the exif_process_IFD_TAG function
in exif.c in PHP before 4.3.11 may allow remote attackers to execute
arbitrary code via an IFD tag that leads to a negative byte count.
CAN-2005-1043: exif.c in PHP before 4.3.11 allows remote attackers to
cause a denial of service (memory consumption and crash) via an EXIF
header with a large IFD nesting level, which causes significant stack
recursion.
Packages:
Download the updated php package for your release of Peachtree Linux
and your host architecture. The main updates site is:
http://peachtree.burdell.org/updates/
Updated packages available for Peachtree Linux release 1 ("Atlanta"):
alpha
db11a244e5085bcee51714d001b56df3 php-4.3.11.alpha.dist
i386
97720a9c42d89288945d8214e3e2336c php-4.3.11.i686.dist
ppc
f2237e37682a905c432cb81d724f8dd6 php-4.3.11.ppc.dist
Solution:
Download the appropriate package for your release of Peachtree Linux.
Upgrade your system to the new package:
distadd -u packagename
Where packagename is the name of the package file from the list above.
After installation of the new package, restart any services you have
that are using PHP, such as Apache.
--=20
Peachtree Linux Security Team
http://peachtree.burdell.org/
--OXfL5xGRrasGEqWY
Content-Type: application/pgp-signature
Content-Disposition: inline
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)
iD8DBQFCaBI+nchtWYh7oqQRAjtpAJ91fGB8G3dVKXcAI3wBiaMO9zMWXwCgqMVh
XvacmnKDgBoxfdaALegy5Yk=
=dyWa
-----END PGP SIGNATURE-----
--OXfL5xGRrasGEqWY--