The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of PHP: several vulnerabilities

Synthesis of the vulnerability 

An attacker can use several vulnerabilities of PHP in order to conduct a denial of service or to obtain information.
Impacted products: Debian, Mandriva Linux, Mandriva NF, PHP, RHEL, Slackware, TurboLinux.
Severity of this bulletin: 2/4.
Number of vulnerabilities in this bulletin: 3.
Creation date: 02/05/2006.
Revision date: 07/08/2006.
Références of this threat: 20061001-01-P, BID-17843, CERTA-2006-AVI-332, CVE-2006-3016, CVE-2006-3017, CVE-2006-3018, DSA-1206-1, MDKSA-2006:122, RHSA-2006:0669-01, RHSA-2006:0682-01, SSA:2006-217-01, TLSA-2006-38, VIGILANCE-VUL-5805.

Description of the vulnerability 

Three new vulnerabilities were announced in PHP.

An attacker can use special characters in session names. Impact of this error is unknown. [severity:2/4; CERTA-2006-AVI-332, CVE-2006-3016]

An attacker can corrupt memory "inside the session extension". This vulnerability could lead to a denial of service or to code execution. [severity:2/4; CVE-2006-3018]

An attacker can force the unset() function to not erase the value. This vulnerability permits an attacker to bypass security protections using this function. [severity:2/4; CVE-2006-3017]
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This weakness announce impacts software or systems such as Debian, Mandriva Linux, Mandriva NF, PHP, RHEL, Slackware, TurboLinux.

Our Vigil@nce team determined that the severity of this vulnerability alert is medium.

The trust level is of type confirmed by the editor, with an origin of user account.

This bulletin is about 3 vulnerabilities.

An attacker with a expert ability can exploit this computer threat announce.

Solutions for this threat 

PHP: version 4.4.3.
Version 4.4.3 is corrected:
  http://www.php.net/downloads.php#v4

PHP: version 5.1.3.
Version 5.1.3 is corrected:
  http://www.php.net/

Debian: new php4 packages (07/11/2006).
New packages are available:
  AMD64 architecture:
    http://security.debian.org/pool/updates/main/p/php4/libapache*-mod-php4_4.3.10-18_amd64.deb
    http://security.debian.org/pool/updates/main/p/php4/php4-*_4.3.10-18_amd64.deb
  Intel IA-32 architecture:
    http://security.debian.org/pool/updates/main/p/php4/libapache*-mod-php4_4.3.10-18_i386.deb
    http://security.debian.org/pool/updates/main/p/php4/php4-*_4.3.10-18_i386.deb
  Intel IA-64 architecture:
    http://security.debian.org/pool/updates/main/p/php4/libapache*-mod-php4_4.3.10-18_ia64.deb
    http://security.debian.org/pool/updates/main/p/php4/php4-*_4.3.10-18_ia64.deb

Mandriva: new php packages.
New packages are available:
 
 Mandriva Linux 10.2:
 78c38db9594e6f378a541d8656a348cd 10.2/RPMS/libphp_common432-4.3.10-7.14.102mdk.i586.rpm
 20874c0f88c0eabb71227562e7b76d99 10.2/RPMS/php432-devel-4.3.10-7.14.102mdk.i586.rpm
 959e27855da01eeda3bce928b81a505e 10.2/RPMS/php-cgi-4.3.10-7.14.102mdk.i586.rpm
 af8f5d5d30248a0dceeb5f477f243521 10.2/RPMS/php-cli-4.3.10-7.14.102mdk.i586.rpm
 3490de40093a12603e1fa2e52fe44936 10.2/RPMS/php-imap-4.3.10-6.3.102mdk.i586.rpm
 ed6c4147816b189ba23131f30246a953 10.2/SRPMS/php-4.3.10-7.14.102mdk.src.rpm
 396e14746eb0f291e212b2d53bea520c 10.2/SRPMS/php-imap-4.3.10-6.3.102mdk.src.rpm
 Mandriva Linux 10.2/X86_64:
 aea78fff707fcf9313f8ea705fe49304 x86_64/10.2/RPMS/lib64php_common432-4.3.10-7.14.102mdk.x86_64.rpm
 24825f38408b5e17ddb030cb6cafbebc x86_64/10.2/RPMS/php432-devel-4.3.10-7.14.102mdk.x86_64.rpm
 c01955be46b9ee3c01f34cd3ff96fdd5 x86_64/10.2/RPMS/php-cgi-4.3.10-7.14.102mdk.x86_64.rpm
 7b0ea6ea8a37f89fa00240a88d667a13 x86_64/10.2/RPMS/php-cli-4.3.10-7.14.102mdk.x86_64.rpm
 3f2f4c714be10ca1931be7fab5f16ed7 x86_64/10.2/RPMS/php-imap-4.3.10-6.3.102mdk.x86_64.rpm
 ed6c4147816b189ba23131f30246a953 x86_64/10.2/SRPMS/php-4.3.10-7.14.102mdk.src.rpm
 396e14746eb0f291e212b2d53bea520c x86_64/10.2/SRPMS/php-imap-4.3.10-6.3.102mdk.src.rpm
 Mandriva Linux 2006.0:
 ac3a35ac0db18fe07aed82c55bc9495c 2006.0/RPMS/libphp5_common5-5.0.4-9.12.20060mdk.i586.rpm
 eddf792e9ac30c60ba29967469c94721 2006.0/RPMS/php-cgi-5.0.4-9.12.20060mdk.i586.rpm
 7ad40230e703fb0dbddb9b6b864305de 2006.0/RPMS/php-cli-5.0.4-9.12.20060mdk.i586.rpm
 847ea3aa279af20470a4e4fc0ccefc7f 2006.0/RPMS/php-curl-5.0.4-1.3.20060mdk.i586.rpm
 e81718f6e31cb7aced9d2ff7462c0b80 2006.0/RPMS/php-devel-5.0.4-9.12.20060mdk.i586.rpm
 188757b3e34afb445a288f4156232b77 2006.0/RPMS/php-fcgi-5.0.4-9.12.20060mdk.i586.rpm
 b8487a338e7c0be6baf08f3231169574 2006.0/RPMS/php-imap-5.0.4-2.3.20060mdk.i586.rpm
 cdda5acab01891036e955b4b89509552 2006.0/SRPMS/php-5.0.4-9.12.20060mdk.src.rpm
 6f59b73dc4ad989fc1cf82981a78447b 2006.0/SRPMS/php-curl-5.0.4-1.3.20060mdk.src.rpm
 1ca1cd0433f93e7a5338d265e5fe31a1 2006.0/SRPMS/php-imap-5.0.4-2.3.20060mdk.src.rpm
 Mandriva Linux 2006.0/X86_64:
 91133e3df28354e321a52b868605f5b4 x86_64/2006.0/RPMS/lib64php5_common5-5.0.4-9.12.20060mdk.x86_64.rpm
 348350bfa9bb17ac01b574d1ce53e212 x86_64/2006.0/RPMS/php-cgi-5.0.4-9.12.20060mdk.x86_64.rpm
 c33ab51b3b82a33140625c1dda6ed397 x86_64/2006.0/RPMS/php-cli-5.0.4-9.12.20060mdk.x86_64.rpm
 070e8e1f3d4a5035cd2ca7b4b9dc6f61 x86_64/2006.0/RPMS/php-curl-5.0.4-1.3.20060mdk.x86_64.rpm
 d1cae6289e3625693902b52730dbf95f x86_64/2006.0/RPMS/php-devel-5.0.4-9.12.20060mdk.x86_64.rpm
 e8ae1224fab30562d7d66c981893897c x86_64/2006.0/RPMS/php-fcgi-5.0.4-9.12.20060mdk.x86_64.rpm
 991c3a4f7cb708aa3c2f9ef4b525017e x86_64/2006.0/RPMS/php-imap-5.0.4-2.3.20060mdk.x86_64.rpm
 cdda5acab01891036e955b4b89509552 x86_64/2006.0/SRPMS/php-5.0.4-9.12.20060mdk.src.rpm
 6f59b73dc4ad989fc1cf82981a78447b x86_64/2006.0/SRPMS/php-curl-5.0.4-1.3.20060mdk.src.rpm
 1ca1cd0433f93e7a5338d265e5fe31a1 x86_64/2006.0/SRPMS/php-imap-5.0.4-2.3.20060mdk.src.rpm
 Corporate 3.0:
 8bfc40ebf399d5742075eeb33c1a8a72 corporate/3.0/RPMS/libphp_common432-4.3.4-4.18.C30mdk.i586.rpm
 ea00cd47c8a866b07c6081a8e1a3475b corporate/3.0/RPMS/php432-devel-4.3.4-4.18.C30mdk.i586.rpm
 cfc50d1bc5aaf96760938648d8f30715 corporate/3.0/RPMS/php-cgi-4.3.4-4.18.C30mdk.i586.rpm
 66b65fce45465361ead9272a8fc6146d corporate/3.0/RPMS/php-cli-4.3.4-4.18.C30mdk.i586.rpm
 219f2fa835442a1b4f3fab1cf9433de7 corporate/3.0/RPMS/php-gd-4.3.4-1.3.C30mdk.i586.rpm
 6d3b9ba8bc1dcb77f00308e54dc2ab64 corporate/3.0/RPMS/php-imap-4.3.4-1.3.C30mdk.i586.rpm
 6ec95f80b1f1cf3644847b1c83c33a16 corporate/3.0/SRPMS/php-4.3.4-4.18.C30mdk.src.rpm
 37bada32aaafa6e85e936543a2a28b9b corporate/3.0/SRPMS/php-gd-4.3.4-1.3.C30mdk.src.rpm
 d5b7b08aa1cff8aba9d3e6c011529d33 corporate/3.0/SRPMS/php-imap-4.3.4-1.3.C30mdk.src.rpm
 Corporate 3.0/X86_64:
 e46dc14256b5ad29c193c9701aed8e71 x86_64/corporate/3.0/RPMS/lib64php_common432-4.3.4-4.18.C30mdk.x86_64.rpm
 03b90618d19cfe790148a9f2f57985ba x86_64/corporate/3.0/RPMS/php432-devel-4.3.4-4.18.C30mdk.x86_64.rpm
 f9fc560f573ab7911abe22db70decdca x86_64/corporate/3.0/RPMS/php-cgi-4.3.4-4.18.C30mdk.x86_64.rpm
 eb9b7e8f2cc0eea84d0fe599bd93c902 x86_64/corporate/3.0/RPMS/php-cli-4.3.4-4.18.C30mdk.x86_64.rpm
 338e3f7c9c0a022a0512e7ef8252d37c x86_64/corporate/3.0/RPMS/php-gd-4.3.4-1.3.C30mdk.x86_64.rpm
 e054fe6114520c57b5e9f991a362e313 x86_64/corporate/3.0/RPMS/php-imap-4.3.4-1.3.C30mdk.x86_64.rpm
 6ec95f80b1f1cf3644847b1c83c33a16 x86_64/corporate/3.0/SRPMS/php-4.3.4-4.18.C30mdk.src.rpm
 37bada32aaafa6e85e936543a2a28b9b x86_64/corporate/3.0/SRPMS/php-gd-4.3.4-1.3.C30mdk.src.rpm
 d5b7b08aa1cff8aba9d3e6c011529d33 x86_64/corporate/3.0/SRPMS/php-imap-4.3.4-1.3.C30mdk.src.rpm
 Multi Network Firewall 2.0:
 be0aa10810884606a6378a340b170438 mnf/2.0/RPMS/libphp_common432-4.3.4-4.18.M20mdk.i586.rpm
 ef8fac6784866d24b16fb9bbf15069a9 mnf/2.0/RPMS/php432-devel-4.3.4-4.18.M20mdk.i586.rpm
 8132b0cdc8bfb94d7e3d4e0712eae5cc mnf/2.0/RPMS/php-cgi-4.3.4-4.18.M20mdk.i586.rpm
 5783b1dc5c2f5ac6d3392d284ca5e42e mnf/2.0/RPMS/php-cli-4.3.4-4.18.M20mdk.i586.rpm
 d88b4c66f31f707bb46098658497876f mnf/2.0/RPMS/php-gd-4.3.4-1.3.M20mdk.i586.rpm
 0b563d4b740e9d5d21d1eb6464fc573b mnf/2.0/SRPMS/php-4.3.4-4.18.M20mdk.src.rpm
 05b34d21c7d168fcbb4404dbe08f45ac mnf/2.0/SRPMS/php-gd-4.3.4-1.3.M20mdk.src.rpm

RHEL 2: new php packages.
New packages are available:
Red Hat Enterprise Linux 2:
  php-4.1.2-2.11

RHEL 3, 4: new php packages.
New packages are available:
Red Hat Enterprise Linux 3:
  php-4.3.2-36.ent
Red Hat Enterprise Linux 4:
  php-4.3.9-3.18

SGI ProPack: new gzip, openssh, openssl, php, python, squirrelmail packages.
Patch 10339 is available :
  http://support.sgi.com/
New packages are available:
  ftp://oss.sgi.com/projects/sgi_propack/download/3/updates/RPMS
  ftp://oss.sgi.com/projects/sgi_propack/download/3/updates/SRPMS

Slackware: new php packages.
New packages are available:
Slackware 10.2:
ftp://ftp.slackware.com/pub/slackware/slackware-10.2/patches/packages/php-4.4.3-i486-1_slack10.2.tgz

Turbolinux: new php packages.
New packages are available:
Turbolinux Appliance Server 2.0
  php4-4.3.11-8
Turbolinux 10 Server x64 Edition
  php4-4.3.9-14
Turbolinux Appliance Server 1.0
  php-4.2.3-35
Turbolinux 10 Server
  php4-4.3.11-8
Turbolinux 10 Desktop
  php4-4.3.3-20
Turbolinux 8 Server
  php-4.2.3-35
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides a software vulnerability patch. The Vigil@nce vulnerability database contains several thousand vulnerabilities.