CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
EPSS
Percentile
90.0%
CentOS Errata and Security Advisory CESA-2010:0919
PHP is an HTML-embedded scripting language commonly used with the Apache
HTTP Server.
An input validation flaw was discovered in the PHP session serializer. If a
PHP script generated session variable names from untrusted user input, a
remote attacker could use this flaw to inject an arbitrary variable into
the PHP session. (CVE-2010-3065)
An information leak flaw was discovered in the PHP var_export() function
implementation. If some fatal error occurred during the execution of this
function (such as the exhaustion of memory or script execution time limit),
part of the function’s output was sent to the user as script output,
possibly leading to the disclosure of sensitive information.
(CVE-2010-2531)
A numeric truncation error and an input validation flaw were found in the
way the PHP utf8_decode() function decoded partial multi-byte sequences
for some multi-byte encodings, sending them to output without them being
escaped. An attacker could use these flaws to perform a cross-site
scripting attack. (CVE-2009-5016, CVE-2010-3870)
It was discovered that the PHP lcg_value() function used insufficient
entropy to seed the pseudo-random number generator. A remote attacker could
possibly use this flaw to predict values returned by the function, which
are used to generate session identifiers by default. This update changes
the function’s implementation to use more entropy during seeding.
(CVE-2010-1128)
It was discovered that the PHP fnmatch() function did not restrict the
length of the pattern argument. A remote attacker could use this flaw to
crash the PHP interpreter where a script used fnmatch() on untrusted
matching patterns. (CVE-2010-1917)
A NULL pointer dereference flaw was discovered in the PHP XML-RPC
extension. A malicious XML-RPC client or server could use this flaw to
crash the PHP interpreter via a specially-crafted XML-RPC request.
(CVE-2010-0397)
All php users should upgrade to these updated packages, which contain
backported patches to resolve these issues. After installing the updated
packages, the httpd daemon must be restarted for the update to take effect.
Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2010-December/079367.html
https://lists.centos.org/pipermail/centos-announce/2010-December/079368.html
https://lists.centos.org/pipermail/centos-announce/2010-November/079359.html
https://lists.centos.org/pipermail/centos-announce/2010-November/079360.html
Affected packages:
php
php-bcmath
php-cli
php-common
php-dba
php-devel
php-domxml
php-gd
php-imap
php-ldap
php-mbstring
php-mysql
php-ncurses
php-odbc
php-pdo
php-pear
php-pgsql
php-snmp
php-soap
php-xml
php-xmlrpc
Upstream details at:
https://access.redhat.com/errata/RHSA-2010:0919
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
CentOS | 5 | i386 | php | < 5.1.6-27.el5_5.3 | php-5.1.6-27.el5_5.3.i386.rpm |
CentOS | 5 | i386 | php-bcmath | < 5.1.6-27.el5_5.3 | php-bcmath-5.1.6-27.el5_5.3.i386.rpm |
CentOS | 5 | i386 | php-cli | < 5.1.6-27.el5_5.3 | php-cli-5.1.6-27.el5_5.3.i386.rpm |
CentOS | 5 | i386 | php-common | < 5.1.6-27.el5_5.3 | php-common-5.1.6-27.el5_5.3.i386.rpm |
CentOS | 5 | i386 | php-dba | < 5.1.6-27.el5_5.3 | php-dba-5.1.6-27.el5_5.3.i386.rpm |
CentOS | 5 | i386 | php-devel | < 5.1.6-27.el5_5.3 | php-devel-5.1.6-27.el5_5.3.i386.rpm |
CentOS | 5 | i386 | php-gd | < 5.1.6-27.el5_5.3 | php-gd-5.1.6-27.el5_5.3.i386.rpm |
CentOS | 5 | i386 | php-imap | < 5.1.6-27.el5_5.3 | php-imap-5.1.6-27.el5_5.3.i386.rpm |
CentOS | 5 | i386 | php-ldap | < 5.1.6-27.el5_5.3 | php-ldap-5.1.6-27.el5_5.3.i386.rpm |
CentOS | 5 | i386 | php-mbstring | < 5.1.6-27.el5_5.3 | php-mbstring-5.1.6-27.el5_5.3.i386.rpm |