Security Advisory Important: php security update for Stronghold

Advisory: RHSA-2007:0089-2
Type: Security Advisory
Severity: Important
Issued on: 2007-02-26
Last updated on: 2007-02-26
Affected Products: Red Hat Stronghold for Enterprise Linux
CVEs ( CVE-2007-0906


Updated PHP packages that fix multiple security issues are now available for
Stronghold 4.0 for Enterprise Linux.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

PHP is an HTML-embedded scripting language commonly used with the Apache
HTTP Web server.

A number of buffer overflow flaws were found in the PHP session extension;
the str_replace() function; and the imap_mail_compose() function. If very
long strings were passed to the str_replace() function, an integer overflow
could occur in memory allocation. If a script used the imap_mail_compose()
function to create a new MIME message based on an input body from an
untrusted source, it could result in a heap overflow. An attacker with
access to a PHP application affected by any these issues could trigger the
flaws and possibly execute arbitrary code as the 'apache' user.

When unserializing untrusted data on 64-bit platforms, the zend_hash_init()
function could be forced into an infinite loop, consuming CPU resources for
a limited time, until the script timeout alarm aborted execution of the
script. (CVE-2007-0988)

If the wddx extension was used to import WDDX data from an untrusted
source, certain WDDX input packets could expose a random portion of heap
memory. (CVE-2007-0908)

If the odbc_result_all() function was used to display data from a database,
and the database table contents were under an attacker's control, a format
string vulnerability was possible which could allow arbitrary code
execution. (CVE-2007-0909)

A one byte memory read always occurs before the beginning of a buffer. This
could be triggered, for example, by any use of the header() function in a
script. However it is unlikely that this would have any effect.

Several flaws in PHP could allow attackers to "clobber" certain
super-global variables via unspecified vectors. (CVE-2007-0910)

Users of Stronghold should upgrade to these updated packages which contain
backported patches to correct these issues.

Red Hat would like to thank Stefan Esser for his help diagnosing these issues.


Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade. Only those
RPMs which are currently installed will be updated. Those RPMs which are
not installed but included in the list will not be updated. Note that you
can also use wildcards (*.rpm) if your current directory *only* contains the
desired RPMs.

Please note that this update is also available via Red Hat Network. Many
people find this an easier way to apply updates. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:


This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

Updated packages

Red Hat Stronghold for Enterprise Linux

File outdated by:  RHSA-2007:0163
    MD5: a59f2e1ac0650262699ffe03a55dc50c
File outdated by:  RHSA-2007:0163
    MD5: 38ce7c2d83e4881af3518907d27b158a
File outdated by:  RHSA-2007:0163
    MD5: 7b99cc81a521c8cd7ebcf60ca20aa14d
File outdated by:  RHSA-2007:0163
    MD5: 7b19656483bc7a8c8a2a8e701404031f
File outdated by:  RHSA-2007:0163
    MD5: 9afea994920a4f826161c219a075d3d9
File outdated by:  RHSA-2007:0163
    MD5: 97983167c1e06984e8e6a880c4945daa
File outdated by:  RHSA-2007:0163
    MD5: a7a07389d97d4dcc598e6d6502690ff5
File outdated by:  RHSA-2007:0163
    MD5: 7ca904a732319bc39e14152deb9453a7
File outdated by:  RHSA-2007:0163
    MD5: 75dddaf53963a1e386c7b293a63f5f05
File outdated by:  RHSA-2007:0163
    MD5: 7a0bce84ec37120d0fa92306caabc98a

Bugs fixed (see bugzilla for more information)

229762 - CVE-2007-0906 PHP security issues (CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-0988)


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

The Red Hat security contact is More contact details at