Chapter 1. Package Updates
208
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Web server.
Multiple missing input sanitization flaws were discovered in PHP's exif extension. A specially-crafted
image file could cause the PHP interpreter to crash or, possibly, disclose portions of its memory when
a PHP script tried to extract Exchangeable image file format (Exif) metadata from the image file.
(
CVE-2009-2687
1675
,
CVE-2009-3292
1676
)
A missing input sanitization flaw, leading to a buffer overflow, was discovered in PHP's gd library. A
specially-crafted GD image file could cause the PHP interpreter to crash or, possibly, execute arbitrary
code when opened. (
CVE-2009-3546
1677
)
It was discovered that PHP did not limit the maximum number of files that can be uploaded in one
request. A remote attacker could use this flaw to instigate a denial of service by causing the PHP
interpreter to use lots of system resources dealing with requests containing large amounts of files to
be uploaded. This vulnerability depends on file uploads being enabled (which it is, in the default PHP
configuration). (
CVE-2009-4017
1678
)
Note: This update introduces a new configuration option, max_file_uploads, used for limiting the
number of files that can be uploaded in one request. By default, the limit is 20 files per request.
It was discovered that PHP was affected by the previously published "null prefix attack", caused by
incorrect handling of NUL characters in X.509 certificates. If an attacker is able to get a carefully-
crafted certificate signed by a trusted Certificate Authority, the attacker could use the certificate
during a man-in-the-middle attack and potentially confuse PHP into accepting it by mistake.
(
CVE-2009-3291
1679
)
It was discovered that PHP's htmlspecialchars() function did not properly recognize partial multi-byte
sequences for some multi-byte encodings, sending them to output without them being escaped. An
attacker could use this flaw to perform a cross-site scripting attack. (
CVE-2009-4142
1680
)
All php users should upgrade to these updated packages, which contain backported patches to
resolve these issues. After installing the updated packages, the httpd daemon must be restarted for
the update to take effect.
1.158.2. RHBA-2010:0241: bug fix and enhancement update
Updated php packages that fix various bugs and add enhancements are now available.
PHP is an HTML-embedded scripting language that allows developers to write dynamically
generated web pages. PHP is ideal for writing database-enabled websites, with built-in integration for
several commercial and non- commercial database management systems. PHP is often used as a
replacement for CGI scripts.
The php package contains a module that adds support for the PHP language to the Apache HTTP
Server.
* two minor fixes were performed in the php substr_compare and substr_count functions to correct
integer overflows. (
BZ#469807
1681
&
BZ#470971
1682
)
1675
https://www.redhat.com/security/data/cve/CVE-2009-2687.html
1676
https://www.redhat.com/security/data/cve/CVE-2009-3292.html
1677
https://www.redhat.com/security/data/cve/CVE-2009-3546.html
1678
https://www.redhat.com/security/data/cve/CVE-2009-4017.html
1679
https://www.redhat.com/security/data/cve/CVE-2009-3291.html
1680
https://www.redhat.com/security/data/cve/CVE-2009-4142.html
1681
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=469807
1682
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=470971
Содержание ENTERPRISE LINUX 5.5 - S 2010
Страница 10: ...x ...
Страница 308: ...298 ...
Страница 310: ...300 ...
Страница 468: ...458 ...
Страница 470: ...460 ...