The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[PLSN-0001] - Multiple vulnerabilities in Gaim


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Date: Thu, 21 Apr 2005 16:51:10 -0400
From: Peachtree Linux Security Team <security@peachtree.burdell.org.>
To: [email protected]
Subject: [PLSN-0001] - Multiple vulnerabilities in Gaim
Message-ID: <20050421205110.GA20793@kevlar.burdell.org.>
Mime-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha1;
        protocol="application/pgp-signature"; boundary="OXfL5xGRrasGEqWY"
Content-Disposition: inline
User-Agent: Mutt/1.4.2.1i
X-Virus-Scanned: antivirus-gw at tyumen.ru


--OXfL5xGRrasGEqWY
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

---------------------------------------------------------------------------
Peachtree Linux Security Notice PLSN-0001
April 19, 2005

Remote code execution and remote DoS vulnerability in PHP
CAN-2005-0524, CAN-2005-0525, CAN-2005-1042, CAN-2005-1043
---------------------------------------------------------------------------

The following Peachtree Linux releases are affected:

   Peachtree Linux release 1 ("Atlanta")

Description:

   CAN-2005-0524:  The php_handle_iff function in image.c for PHP 4.2.2,
   4.3.9, 4.3.10 and 5.0.3, as reachable by the getimagesize PHP function,
   allows remote attackers to cause a denial of service (infinite loop)
   via a -8 size value.

   CAN-2005-0525:  The php_next_marker function in image.c for PHP 4.2.2,
   4.3.9, 4.3.10 and 5.0.3, as reachable by the getimagesize PHP function,
   allows remote attackers to cause a denial of service (infinite loop)
   via a JPEG image with an invalid marker value, which causes a negative
   length value to be passed to php_stream_seek.

   CAN-2005-1042:  Integer overflow in the exif_process_IFD_TAG function
   in exif.c in PHP before 4.3.11 may allow remote attackers to execute
   arbitrary code via an IFD tag that leads to a negative byte count.

   CAN-2005-1043:  exif.c in PHP before 4.3.11 allows remote attackers to
   cause a denial of service (memory consumption and crash) via an EXIF
   header with a large IFD nesting level, which causes significant stack
   recursion.

Packages:

   Download the updated php package for your release of Peachtree Linux
   and your host architecture.  The main updates site is:

      http://peachtree.burdell.org/updates/

   Updated packages available for Peachtree Linux release 1 ("Atlanta"):

      alpha
         db11a244e5085bcee51714d001b56df3  php-4.3.11.alpha.dist

      i386
         97720a9c42d89288945d8214e3e2336c  php-4.3.11.i686.dist

      ppc
         f2237e37682a905c432cb81d724f8dd6  php-4.3.11.ppc.dist

Solution:

   Download the appropriate package for your release of Peachtree Linux.
   Upgrade your system to the new package:

      distadd -u packagename

   Where packagename is the name of the package file from the list above.

   After installation of the new package, restart any services you have
   that are using PHP, such as Apache.

--=20
Peachtree Linux Security Team
http://peachtree.burdell.org/

--OXfL5xGRrasGEqWY
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFCaBI+nchtWYh7oqQRAjtpAJ91fGB8G3dVKXcAI3wBiaMO9zMWXwCgqMVh
XvacmnKDgBoxfdaALegy5Yk=
=dyWa
-----END PGP SIGNATURE-----

--OXfL5xGRrasGEqWY--


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру