Oval Definition:oval:org.mitre.oval:def:7538
Revision Date:2014-06-23Version:19
Title:DSA-1444 php5 -- several vulnerabilities
Description:It was discovered that the patch for CVE-2007-4659 could lead to regressions in some scenarios. The fix has been reverted for now, a revised update will be provided in a future PHP DSA. For reference the original advisory below: Several remote vulnerabilities have been discovered in PHP, a server-side, HTML-embedded scripting language. The Common Vulnerabilities and Exposures project identifies the following problems: It was discovered that the session_start() function allowed the insertion of attributes into the session cookie. Mattias Bengtsson and Philip Olausson discovered that a programming error in the implementation of the wordwrap() function allowed denial of service through an infinite loop. Stanislav Malyshev discovered that a format string vulnerability in the money_format() function could allow the execution of arbitrary code. Stefan Esser discovered that execution control flow inside the zend_alter_ini_entry() function is handled incorrectly in case of a memory limit violation. Gerhard Wagner discovered an integer overflow inside the chunk_split() function. Rasmus Lerdorf discovered that incorrect parsing of multibyte sequences may lead to disclosure of memory contents. It was discovered that the output_add_rewrite_var() function could leak session ID information, resulting in information disclosure. This update also fixes two bugs from the PHP 5.2.4 release which don't have security impact according to the Debian PHP security policy (CVE-2007-4657 and CVE-2007-4662), but which are fixed nonetheless. The old stable distribution (sarge) doesn't contain php5. For the stable distribution (etch), these problems have been fixed in version 5.2.0-8+etch10. For the unstable distribution (sid), these problems have been fixed in version 5.2.4-1, with the exception of CVE-2007-5898 and CVE-2007-5899, which will be fixed soon. Please note that Debian's version of PHP is hardened with the Suhosin patch beginning with version 5.2.4-1, which renders several vulnerabilities ineffective. We recommend that you upgrade your php5 packages.
Family:unixClass:patch
Status:ACCEPTEDReference(s):CVE-2007-3799
CVE-2007-3998
CVE-2007-4657
CVE-2007-4658
CVE-2007-4659
CVE-2007-4660
CVE-2007-4662
CVE-2007-5898
CVE-2007-5899
DSA-1444
Platform(s):Debian GNU/Linux 4.0
Product(s):php5
Definition Synopsis
  • Debian GNU/Linux 4.0 is installed.
  • AND Architecture section
  • Architecture independent section
  • Installed architecture is all
  • AND Packages section
  • php-pear is earlier than 5.2.0-8+etch10
  • OR php5 is earlier than 5.2.0-8+etch10
  • OR libapache-mod-php5 is earlier than 5.2.0-8+etch10
  • OR php5-recode is earlier than 5.2.0-8+etch10
  • OR php5-xmlrpc is earlier than 5.2.0-8+etch10
  • OR php5-curl is earlier than 5.2.0-8+etch10
  • OR php5-snmp is earlier than 5.2.0-8+etch10
  • OR php5-mysql is earlier than 5.2.0-8+etch10
  • OR php5-odbc is earlier than 5.2.0-8+etch10
  • OR php5-xsl is earlier than 5.2.0-8+etch10
  • OR php5-gd is earlier than 5.2.0-8+etch10
  • OR libapache2-mod-php5 is earlier than 5.2.0-8+etch10
  • OR php5-mhash is earlier than 5.2.0-8+etch10
  • OR php5-tidy is earlier than 5.2.0-8+etch10
  • OR php5-mcrypt is earlier than 5.2.0-8+etch10
  • OR php5-dev is earlier than 5.2.0-8+etch10
  • OR php5-pgsql is earlier than 5.2.0-8+etch10
  • OR php5-cgi is earlier than 5.2.0-8+etch10
  • OR php5-imap is earlier than 5.2.0-8+etch10
  • OR php5-sqlite is earlier than 5.2.0-8+etch10
  • OR php5-ldap is earlier than 5.2.0-8+etch10
  • OR php5-cli is earlier than 5.2.0-8+etch10
  • OR php5-sybase is earlier than 5.2.0-8+etch10
  • OR php5-pspell is earlier than 5.2.0-8+etch10
  • OR php5-common is earlier than 5.2.0-8+etch10
  • OR Architecture dependent section
  • Supported architectures section
  • Installed architecture is i386
  • OR Installed architecture is amd64
  • AND php5-interbase is earlier than 5.2.0-8+etch10
  • BACK