The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


rPSA-2007-0043-1 php php-mysql php-pgsql


<< Previous INDEX Search src / Print Next >>
Date: Tue, 27 Feb 2007 14:16:11 -0500
From: rPath Update Announcements <announce-noreply@rpath.com.>
To: [email protected],
Subject: rPSA-2007-0043-1 php php-mysql php-pgsql
Message-ID: <45e4837b.ngm+WFR4pPNP+Heh%[email protected]>
User-Agent: nail 11.22 3/20/05
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
X-Virus-Scanned: antivirus-gw at tyumen.ru

rPath Security Advisory: 2007-0043-1
Published: 2007-02-27
Products: rPath Linux 1
Rating: Severe
Exposure Level Classification:
    Remote System User Deterministic Unauthorized Access
Updated Versions:
    php=/conary.rpath.com@rpl:devel//1/4.3.11-15.9-1
    php-mysql=/conary.rpath.com@rpl:devel//1/4.3.11-15.9-1
    php-pgsql=/conary.rpath.com@rpl:devel//1/4.3.11-15.9-1

References:
    http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0906
    http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0907
    http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0908
    http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0909
    http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0910
    http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0988
    https://issues.rpath.com/browse/RPL-1088

Description:
    Previous versions of the php package are vulnerable to multiple
    vulnerabilities of varying severity.  The most severe of these
    vulnerabilities are expected to enable remote code execution as the
    "apache" user via php applications that call certain functions such as
    str_replace(), imap_mail_compose(), or odbc_result_all() functions.


<< Previous INDEX Search src / Print Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру