Skip to navigation

Security Advisory Moderate: php security update

Advisory: RHSA-2007:0888-2
Type: Security Advisory
Severity: Moderate
Issued on: 2007-10-23
Last updated on: 2007-10-23
Affected Products: Red Hat Enterprise Linux AS (v. 2.1)
Red Hat Enterprise Linux ES (v. 2.1)
Red Hat Enterprise Linux WS (v. 2.1)
Red Hat Linux Advanced Workstation 2.1 for the Itanium Processor
CVEs (cve.mitre.org): CVE-2007-2509
CVE-2007-2872
CVE-2007-3799
CVE-2007-3996
CVE-2007-4670

Details

Updated PHP packages that fix several security issues are now available for
Red Hat Enterprise Linux 2.1

This update has been rated as having moderate security impact by the Red
Hat Security Response Team.

PHP is an HTML-embedded scripting language commonly used with the Apache
HTTP Web server.

Various integer overflow flaws were found in the PHP gd extension. A script
that could be forced to resize images from an untrusted source could
possibly allow a remote attacker to execute arbitrary code as the apache
user. (CVE-2007-3996)

An integer overflow flaw was found in the PHP chunk_split function. If a
remote attacker was able to pass arbitrary data to the third argument of
chunk_split they could possibly execute arbitrary code as the apache user.
Note that it is unusual for a PHP script to use the chunk_script function
with a user-supplied third argument. (CVE-2007-2872)

A previous security update introduced a bug into PHP session cookie
handling. This could allow an attacker to stop a victim from viewing a
vulnerable web site if the victim has first visited a malicious web page
under the control of the attacker, and that page can set a cookie for the
vulnerable web site. (CVE-2007-4670)

A bug was found in PHP session cookie handling. This could allow an
attacker to create a cross-site cookie insertion attack if a victim follows
an untrusted carefully-crafted URL. (CVE-2007-3799)

A flaw was found in the PHP 'ftp' extension. If a PHP script used this
extension to provide access to a private FTP server, and passed untrusted
script input directly to any function provided by this extension, a remote
attacker would be able to send arbitrary FTP commands to the server.
(CVE-2007-2509)

Users of PHP should upgrade to these updated packages which contain
backported patches to correct these issues.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

Updated packages

Red Hat Enterprise Linux AS (v. 2.1)

SRPMS:
php-4.1.2-2.19.src.rpm
File outdated by:  RHSA-2008:0546
    MD5: d59c419407bc7f55ae909d8f36226ed3
 
IA-32:
php-4.1.2-2.19.i386.rpm
File outdated by:  RHSA-2008:0546
    MD5: 2c6c7d5c75706e695608992a48312dc9
php-devel-4.1.2-2.19.i386.rpm
File outdated by:  RHSA-2008:0546
    MD5: ac1a914700f541022790f14f7f4be67e
php-imap-4.1.2-2.19.i386.rpm
File outdated by:  RHSA-2008:0546
    MD5: dbb6a6a436edfd6af00ceb50c69871f0
php-ldap-4.1.2-2.19.i386.rpm
File outdated by:  RHSA-2008:0546
    MD5: e18872974d96d7d6645ff9eb5e8df70e
php-manual-4.1.2-2.19.i386.rpm
File outdated by:  RHSA-2008:0546
    MD5: 0b5816829e4fe08c75da34bc49f235b0
php-mysql-4.1.2-2.19.i386.rpm
File outdated by:  RHSA-2008:0546
    MD5: 4e1ffad2e6f96b7099fb60f8ee7b41de
php-odbc-4.1.2-2.19.i386.rpm
File outdated by:  RHSA-2008:0546
    MD5: 27a0b33680d1380c3e27292881e5ddb3
php-pgsql-4.1.2-2.19.i386.rpm
File outdated by:  RHSA-2008:0546
    MD5: cdd8dab08dc25799a4bc56d23157aa64
 
IA-64:
php-4.1.2-2.19.ia64.rpm
File outdated by:  RHSA-2008:0546
    MD5: 6f9788224b1a661895378c206402d190
php-devel-4.1.2-2.19.ia64.rpm
File outdated by:  RHSA-2008:0546
    MD5: dcfe6c96266cc9c0f7cf6bac756dc548
php-imap-4.1.2-2.19.ia64.rpm
File outdated by:  RHSA-2008:0546
    MD5: 539a654c81629bfbda65b5e9827d9da0
php-ldap-4.1.2-2.19.ia64.rpm
File outdated by:  RHSA-2008:0546
    MD5: 7152cbca5380150e77098c616af0e7dd
php-manual-4.1.2-2.19.ia64.rpm
File outdated by:  RHSA-2008:0546
    MD5: 06098dc1102450a0f11ae94823f6c4b0
php-mysql-4.1.2-2.19.ia64.rpm
File outdated by:  RHSA-2008:0546
    MD5: 546cb984504a375bbdad6999e2b0748f
php-odbc-4.1.2-2.19.ia64.rpm
File outdated by:  RHSA-2008:0546
    MD5: fdb45b74ed4414297f0fe366507b3d44
php-pgsql-4.1.2-2.19.ia64.rpm
File outdated by:  RHSA-2008:0546
    MD5: a8a8b6b9e5da2af891fddb1199c429f4
 
Red Hat Enterprise Linux ES (v. 2.1)

SRPMS:
php-4.1.2-2.19.src.rpm
File outdated by:  RHSA-2008:0546
    MD5: d59c419407bc7f55ae909d8f36226ed3
 
IA-32:
php-4.1.2-2.19.i386.rpm
File outdated by:  RHSA-2008:0546
    MD5: 2c6c7d5c75706e695608992a48312dc9
php-devel-4.1.2-2.19.i386.rpm
File outdated by:  RHSA-2008:0546
    MD5: ac1a914700f541022790f14f7f4be67e
php-imap-4.1.2-2.19.i386.rpm
File outdated by:  RHSA-2008:0546
    MD5: dbb6a6a436edfd6af00ceb50c69871f0
php-ldap-4.1.2-2.19.i386.rpm
File outdated by:  RHSA-2008:0546
    MD5: e18872974d96d7d6645ff9eb5e8df70e
php-manual-4.1.2-2.19.i386.rpm
File outdated by:  RHSA-2008:0546
    MD5: 0b5816829e4fe08c75da34bc49f235b0
php-mysql-4.1.2-2.19.i386.rpm
File outdated by:  RHSA-2008:0546
    MD5: 4e1ffad2e6f96b7099fb60f8ee7b41de
php-odbc-4.1.2-2.19.i386.rpm
File outdated by:  RHSA-2008:0546
    MD5: 27a0b33680d1380c3e27292881e5ddb3
php-pgsql-4.1.2-2.19.i386.rpm
File outdated by:  RHSA-2008:0546
    MD5: cdd8dab08dc25799a4bc56d23157aa64
 
Red Hat Enterprise Linux WS (v. 2.1)

SRPMS:
php-4.1.2-2.19.src.rpm
File outdated by:  RHSA-2008:0546
    MD5: d59c419407bc7f55ae909d8f36226ed3
 
IA-32:
php-4.1.2-2.19.i386.rpm
File outdated by:  RHSA-2008:0546
    MD5: 2c6c7d5c75706e695608992a48312dc9
php-devel-4.1.2-2.19.i386.rpm
File outdated by:  RHSA-2008:0546
    MD5: ac1a914700f541022790f14f7f4be67e
php-imap-4.1.2-2.19.i386.rpm
File outdated by:  RHSA-2008:0546
    MD5: dbb6a6a436edfd6af00ceb50c69871f0
php-ldap-4.1.2-2.19.i386.rpm
File outdated by:  RHSA-2008:0546
    MD5: e18872974d96d7d6645ff9eb5e8df70e
php-manual-4.1.2-2.19.i386.rpm
File outdated by:  RHSA-2008:0546
    MD5: 0b5816829e4fe08c75da34bc49f235b0
php-mysql-4.1.2-2.19.i386.rpm
File outdated by:  RHSA-2008:0546
    MD5: 4e1ffad2e6f96b7099fb60f8ee7b41de
php-odbc-4.1.2-2.19.i386.rpm
File outdated by:  RHSA-2008:0546
    MD5: 27a0b33680d1380c3e27292881e5ddb3
php-pgsql-4.1.2-2.19.i386.rpm
File outdated by:  RHSA-2008:0546
    MD5: cdd8dab08dc25799a4bc56d23157aa64
 
Red Hat Linux Advanced Workstation 2.1 for the Itanium Processor

SRPMS:
php-4.1.2-2.19.src.rpm
File outdated by:  RHSA-2008:0546
    MD5: d59c419407bc7f55ae909d8f36226ed3
 
IA-64:
php-4.1.2-2.19.ia64.rpm
File outdated by:  RHSA-2008:0546
    MD5: 6f9788224b1a661895378c206402d190
php-devel-4.1.2-2.19.ia64.rpm
File outdated by:  RHSA-2008:0546
    MD5: dcfe6c96266cc9c0f7cf6bac756dc548
php-imap-4.1.2-2.19.ia64.rpm
File outdated by:  RHSA-2008:0546
    MD5: 539a654c81629bfbda65b5e9827d9da0
php-ldap-4.1.2-2.19.ia64.rpm
File outdated by:  RHSA-2008:0546
    MD5: 7152cbca5380150e77098c616af0e7dd
php-manual-4.1.2-2.19.ia64.rpm
File outdated by:  RHSA-2008:0546
    MD5: 06098dc1102450a0f11ae94823f6c4b0
php-mysql-4.1.2-2.19.ia64.rpm
File outdated by:  RHSA-2008:0546
    MD5: 546cb984504a375bbdad6999e2b0748f
php-odbc-4.1.2-2.19.ia64.rpm
File outdated by:  RHSA-2008:0546
    MD5: fdb45b74ed4414297f0fe366507b3d44
php-pgsql-4.1.2-2.19.ia64.rpm
File outdated by:  RHSA-2008:0546
    MD5: a8a8b6b9e5da2af891fddb1199c429f4
 

Bugs fixed (see bugzilla for more information)

239014 - CVE-2007-2509 php CRLF injection
242032 - CVE-2007-2872 php chunk_split integer overflow
250726 - CVE-2007-3799 php cross-site cookie insertion
278031 - CVE-2007-3996 php multiple integer overflows in gd
278041 - CVE-2007-4670 php malformed cookie handling


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/