Lucene search

K
centosCentOS ProjectCESA-2006:0276
HistoryApr 25, 2006 - 3:25 p.m.

php security update

2006-04-2515:25:25
CentOS Project
lists.centos.org
62

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.381 Low

EPSS

Percentile

97.2%

CentOS Errata and Security Advisory CESA-2006:0276

PHP is an HTML-embedded scripting language commonly used with the Apache
HTTP Web server.

The phpinfo() PHP function did not properly sanitize long strings. An
attacker could use this to perform cross-site scripting attacks against
sites that have publicly-available PHP scripts that call phpinfo().
(CVE-2006-0996)

The html_entity_decode() PHP function was found to not be binary safe. An
attacker could use this flaw to disclose a certain part of the memory. In
order for this issue to be exploitable the target site would need to have a
PHP script which called the “html_entity_decode()” function with untrusted
input from the user and displayed the result. (CVE-2006-1490)

The error handling output was found to not properly escape HTML output in
certain cases. An attacker could use this flaw to perform cross-site
scripting attacks against sites where both display_errors and html_errors
are enabled. (CVE-2006-0208)

An input validation error was found in the “mb_send_mail()” function. An
attacker could use this flaw to inject arbitrary headers in a mail sent via
a script calling the “mb_send_mail()” function where the “To” parameter can
be controlled by the attacker. (CVE-2005-3883)

A buffer overflow flaw was discovered in uw-imap, the University of
Washington’s IMAP Server. php-imap is compiled against the static c-client
libraries from imap and therefore needed to be recompiled against the fixed
version. This issue only affected Red Hat Enterprise Linux 3.
(CVE-2005-2933).

Users of PHP should upgrade to these updated packages, which contain
backported patches that resolve these issues.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2006-April/075004.html
https://lists.centos.org/pipermail/centos-announce/2006-April/075005.html
https://lists.centos.org/pipermail/centos-announce/2006-April/075011.html
https://lists.centos.org/pipermail/centos-announce/2006-April/075014.html
https://lists.centos.org/pipermail/centos-announce/2006-April/075015.html
https://lists.centos.org/pipermail/centos-announce/2006-April/075016.html
https://lists.centos.org/pipermail/centos-announce/2006-April/075017.html
https://lists.centos.org/pipermail/centos-announce/2006-April/075019.html

Affected packages:
php
php-devel
php-domxml
php-gd
php-imap
php-ldap
php-mbstring
php-mysql
php-ncurses
php-odbc
php-pear
php-pgsql
php-snmp
php-xmlrpc

Upstream details at:
https://access.redhat.com/errata/RHSA-2006:0276

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.381 Low

EPSS

Percentile

97.2%