From secure@conectiva.com.br Sat Jul 17 14:30:41 2004 From: Conectiva Updates To: conectiva-updates@perninha.conectiva.com.br, lwn@lwn.net, bugtraq@securityfocus.com, security-alerts@linuxsecurity.com, linsec@lists.seifried.org Date: Fri, 16 Jul 2004 15:29:44 -0300 Subject: [CLA-2004:847] Conectiva Security Announcement - php4 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - -------------------------------------------------------------------------- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -------------------------------------------------------------------------- PACKAGE : php4 SUMMARY : Remote arbitrary code execution vulnerabilities and other DATE : 2004-07-16 11:56:00 ID : CLA-2004:847 RELEVANT RELEASES : 8, 9, 10 - ------------------------------------------------------------------------- DESCRIPTION PHP[1] is a very popular scripting language used by web servers to offer dynamic content. Stefan Esser noted[2] a vulnerability[3] in php code so that a remote attacker could force php to hit memory_limit in unsafe places which would lead to a possible execution of arbitrary code. He also found[4] out that the strip_tags() function, often used as a validator for user input, could allow tags containing the null char. This announcement also fixes the misinstalation of the CLI interface instead of the CGI one. Thanks to Willian Marcelo Piovezan for the report[5]. SOLUTION It is recommended that all PHP users upgrade their packages. IMPORTANT If PHP is being used as an Apache module, the web server has to be restarted after the upgrade if it was already running. To do so, please run, as root: # service httpd stop (wait a few seconds and check with "ps ax|grep httpd" if there are any httpd processes running. On a busy webserver this could take a little longer.) # service httpd start REFERENCES 1.http://www.php.net/ 2.http://security.e-matters.de/advisories/112004.html 3.http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0594 4.http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0595 5.http://bugzilla.conectiva.com.br/show_bug.cgi?id=11197 UPDATED PACKAGES ftp://atualizacoes.conectiva.com.br/10/10/SRPMS/php4-4.3.6-63187U10_1cl.src.rpm ftp://atualizacoes.conectiva.com.br/10/10/RPMS/php4-4.3.6-63187U10_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/10/10/RPMS/php4-dba-4.3.6-63187U10_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/10/10/RPMS/php4-devel-4.3.6-63187U10_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/10/10/RPMS/php4-doc-4.3.6-63187U10_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/10/10/RPMS/php4-doc-es-4.3.6-63187U10_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/10/10/RPMS/php4-doc-pt_BR-4.3.6-63187U10_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/10/10/RPMS/php4-imap-4.3.6-63187U10_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/10/10/RPMS/php4-ldap-4.3.6-63187U10_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/10/10/RPMS/php4-mcrypt-4.3.6-63187U10_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/10/10/RPMS/php4-mhash-4.3.6-63187U10_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/10/10/RPMS/php4-mnogosearch-4.3.6-63187U10_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/10/10/RPMS/php4-mssql-4.3.6-63187U10_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/10/10/RPMS/php4-mysql-4.3.6-63187U10_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/10/10/RPMS/php4-odbc-4.3.6-63187U10_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/10/10/RPMS/php4-pgsql-4.3.6-63187U10_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/10/10/RPMS/php4-snmp-4.3.6-63187U10_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/10/10/RPMS/php4-sybase-4.3.6-63187U10_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/10/10/RPMS/php4-sybase-ct-4.3.6-63187U10_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/8/8/SRPMS/php4-4.3.3-1U80_2cl.src.rpm ftp://atualizacoes.conectiva.com.br/8/8/RPMS/php4-4.3.3-1U80_2cl.i386.rpm ftp://atualizacoes.conectiva.com.br/8/8/RPMS/php4-doc-4.3.3-1U80_2cl.i386.rpm ftp://atualizacoes.conectiva.com.br/8/8/RPMS/php4-devel-4.3.3-1U80_2cl.i386.rpm ftp://atualizacoes.conectiva.com.br/8/8/RPMS/php4-doc-es-4.3.3-1U80_2cl.i386.rpm ftp://atualizacoes.conectiva.com.br/8/8/RPMS/php4-doc-pt_BR-4.3.3-1U80_2cl.i386.rpm ftp://atualizacoes.conectiva.com.br/8/8/RPMS/php4-imap-4.3.3-1U80_2cl.i386.rpm ftp://atualizacoes.conectiva.com.br/8/8/RPMS/php4-ldap-4.3.3-1U80_2cl.i386.rpm ftp://atualizacoes.conectiva.com.br/8/8/RPMS/php4-mcrypt-4.3.3-1U80_2cl.i386.rpm ftp://atualizacoes.conectiva.com.br/8/8/RPMS/php4-mysql-4.3.3-1U80_2cl.i386.rpm ftp://atualizacoes.conectiva.com.br/8/8/RPMS/php4-odbc-4.3.3-1U80_2cl.i386.rpm ftp://atualizacoes.conectiva.com.br/8/8/RPMS/php4-pgsql-4.3.3-1U80_2cl.i386.rpm ftp://atualizacoes.conectiva.com.br/8/8/RPMS/php4-snmp-4.3.3-1U80_2cl.i386.rpm ftp://atualizacoes.conectiva.com.br/9/9/SRPMS/php4-4.3.3-26997U90_3cl.src.rpm ftp://atualizacoes.conectiva.com.br/9/9/RPMS/php4-4.3.3-26997U90_3cl.i386.rpm ftp://atualizacoes.conectiva.com.br/9/9/RPMS/php4-doc-4.3.3-26997U90_3cl.i386.rpm ftp://atualizacoes.conectiva.com.br/9/9/RPMS/php4-devel-4.3.3-26997U90_3cl.i386.rpm ftp://atualizacoes.conectiva.com.br/9/9/RPMS/php4-doc-es-4.3.3-26997U90_3cl.i386.rpm ftp://atualizacoes.conectiva.com.br/9/9/RPMS/php4-doc-pt_BR-4.3.3-26997U90_3cl.i386.rpm ftp://atualizacoes.conectiva.com.br/9/9/RPMS/php4-imap-4.3.3-26997U90_3cl.i386.rpm ftp://atualizacoes.conectiva.com.br/9/9/RPMS/php4-ldap-4.3.3-26997U90_3cl.i386.rpm ftp://atualizacoes.conectiva.com.br/9/9/RPMS/php4-mcrypt-4.3.3-26997U90_3cl.i386.rpm ftp://atualizacoes.conectiva.com.br/9/9/RPMS/php4-mysql-4.3.3-26997U90_3cl.i386.rpm ftp://atualizacoes.conectiva.com.br/9/9/RPMS/php4-odbc-4.3.3-26997U90_3cl.i386.rpm ftp://atualizacoes.conectiva.com.br/9/9/RPMS/php4-pgsql-4.3.3-26997U90_3cl.i386.rpm ftp://atualizacoes.conectiva.com.br/9/9/RPMS/php4-snmp-4.3.3-26997U90_3cl.i386.rpm ADDITIONAL INSTRUCTIONS The apt tool can be used to perform RPM packages upgrades: - run: apt-get update - after that, execute: apt-get upgrade Detailed instructions regarding the use of apt and upgrade examples can be found at http://distro.conectiva.com.br/atualizacoes/#apt?idioma=en - ------------------------------------------------------------------------- All packages are signed with Conectiva's GPG key. The key and instructions on how to import it can be found at http://distro.conectiva.com.br/seguranca/chave/?idioma=en Instructions on how to check the signatures of the RPM packages can be found at http://distro.conectiva.com.br/seguranca/politica/?idioma=en - ------------------------------------------------------------------------- All our advisories and generic update instructions can be viewed at http://distro.conectiva.com.br/atualizacoes/?idioma=en - ------------------------------------------------------------------------- Copyright (c) 2004 Conectiva Inc. http://www.conectiva.com - ------------------------------------------------------------------------- subscribe: conectiva-updates-subscribe@papaleguas.conectiva.com.br unsubscribe: conectiva-updates-unsubscribe@papaleguas.conectiva.com.br -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (GNU/Linux) Comment: For info see http://www.gnupg.org iD8DBQFA+B6X42jd0JmAcZARAkZIAKCusRu+Ge3ErpWJFeCulz9VKRph2ACdG1L1 C4c+5+P0o4c6HhdzBsUtJCQ= =Q9us -----END PGP SIGNATURE-----