[CLA-2002:545] Conectiva Linux Security Announcement - php4

From: secureat_private
Date: Wed Nov 13 2002 - 14:18:31 PST

  • Next message: Olaf Kirch: "SuSE Security Announcement: Multiple vulnerabilities in BIND8 (SuSE-SA:2002:044)"

    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    - --------------------------------------------------------------------------
    CONECTIVA LINUX SECURITY ANNOUNCEMENT 
    - --------------------------------------------------------------------------
    
    PACKAGE   : php4
    SUMMARY   : Safe mode bypass and other vulnerabilities
    DATE      : 2002-11-13 20:17:00
    ID        : CLA-2002:545
    RELEVANT
    RELEASES  : 6.0, 7.0, 8
    
    - -------------------------------------------------------------------------
    
    DESCRIPTION
     PHP[1] is a very popular scripting language used by web servers to
     offer dynamic content. 
     
     This update addresses the following issues:
     
     1) Safe mode bypass vulnerability[3]
     Wojciech Purczynski <cliphat_private> reported[2] a vulnerability in
     the mail() function which could be used to bypass PHP's safe mode
     setting and execute any program as if this mode was not enabled.
     Since PHP 4.0.5, the mail() function has a fifth parameter which is
     used to pass additional command line parameters to the sendmail
     binary. It is possible to use this parameter to change the behaviour
     of sendmail and use it to execute arbitrary programs or scripts.
     The updated PHP packages disallow the use of this fifth parameter if
     safe mode is in use.
     This vulnerability affects Conectiva Linux 7.0 and 8 if safe mode is
     in use. Conectiva Linux 6.0 was shipped with an earlier version of
     PHP which does not have this parameter.
     
     2) Control characters injection[4]
     Wojciech Purczynski <cliphat_private> also reported that it is possible
     to insert ASCII control characters (such as '\n') in the text
     supplied as parameter to the mail() function. Depending on how the
     PHP script handles user input (wheter it is filtered or not, and
     how), this could be used to add other mail headers to the message.
     This vulnerability affects PHP4 and PHP3. The fix applied to the
     packages listed here change such characters, if found in the
     "subject" or "to" parameter, to a white space (" ").
     In a similar way, other functions such as fopen() also accept control
     characters in their parameters. This is now also being filtered, and
     such characters are being changed to "_" (underscore).
     
     3) Old file upload vulnerability[4][6]
     While preparing the updates for the above issues, it has come to our
     attention that the PHP3 packages in Conectiva Linux 7.0 were not
     updated regarding the file upload vulnerability which was addressed
     in the CLSA-2002:468[6] advisory. PHP4 is the default PHP package for
     that distribution and PHP3 was shipped in the second CD only for
     backwards compatibility. The PHP3 packages for CL 7.0 have now been
     fixed.
    
    
    SOLUTION
     It is recommended that all PHP users upgrade their packages.
     
     IMPORTANT: if PHP is being used as an Apache module, the web server
     has to be restarted after the upgrade if it was already running. To
     do so, please run, as root:
     
     service httpd stop 
     
     (wait a few seconds and check with "ps ax|grep httpd" if there are
     any httpd processes running. On a busy webserver this could take a
     little longer.) 
     
     service httpd start 
     
     
     REFERENCES
     1.http://www.php.net/
     2.http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0985
     3.http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0986
     4.http://online.securityfocus.com/bid/4183
     5.http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000468&idioma=en
    
    
    DIRECT DOWNLOAD LINKS TO THE UPDATED PACKAGES
    ftp://atualizacoes.conectiva.com.br/6.0/SRPMS/mod_php3-3.0.18-9U60_2cl.src.rpm
    ftp://atualizacoes.conectiva.com.br/6.0/SRPMS/php4-4.0.4pl1-2U60_3cl.src.rpm
    ftp://atualizacoes.conectiva.com.br/6.0/RPMS/php4-4.0.4pl1-2U60_3cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/6.0/RPMS/mod_php3-3.0.18-9U60_2cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/6.0/RPMS/mod_php3-doc-3.0.18-9U60_2cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/6.0/RPMS/mod_php3-gd-3.0.18-9U60_2cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/6.0/RPMS/mod_php3-imap-3.0.18-9U60_2cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/6.0/RPMS/mod_php3-ldap-3.0.18-9U60_2cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/6.0/RPMS/mod_php3-mysql-3.0.18-9U60_2cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/6.0/RPMS/mod_php3-pgsql-3.0.18-9U60_2cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/6.0/RPMS/mod_php3-xml-3.0.18-9U60_2cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/6.0/RPMS/mod_php4-4.0.4pl1-2U60_3cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/6.0/RPMS/php3-cgi-3.0.18-9U60_2cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/6.0/RPMS/php3-cgi-gd-3.0.18-9U60_2cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/6.0/RPMS/php3-cgi-imap-3.0.18-9U60_2cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/6.0/RPMS/php3-cgi-ldap-3.0.18-9U60_2cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/6.0/RPMS/php3-cgi-mysql-3.0.18-9U60_2cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/6.0/RPMS/php3-cgi-pgsql-3.0.18-9U60_2cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/6.0/RPMS/php3-cgi-xml-3.0.18-9U60_2cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/6.0/RPMS/php4-doc-4.0.4pl1-2U60_3cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/6.0/RPMS/php4-imap-4.0.4pl1-2U60_3cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/6.0/RPMS/php4-ldap-4.0.4pl1-2U60_3cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/6.0/RPMS/php4-mysql-4.0.4pl1-2U60_3cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/6.0/RPMS/php4-pgsql-4.0.4pl1-2U60_3cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/7.0/RPMS/php4-4.1.1-1U70_5cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/7.0/RPMS/mod_php4-4.1.1-1U70_5cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/7.0/RPMS/php4-devel-4.1.1-1U70_5cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/7.0/RPMS/php4-doc-4.1.1-1U70_5cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/7.0/RPMS/php4-imap-4.1.1-1U70_5cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/7.0/RPMS/php4-ldap-4.1.1-1U70_5cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/7.0/RPMS/php4-mysql-4.1.1-1U70_5cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/7.0/RPMS/php4-odbc-4.1.1-1U70_5cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/7.0/RPMS/php4-pgsql-4.1.1-1U70_5cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/7.0/SRPMS/php4-4.1.1-1U70_5cl.src.rpm
    ftp://atualizacoes.conectiva.com.br/7.0/RPMS/mod_php3-3.0.18-10U70_1cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/7.0/RPMS/mod_php3-doc-3.0.18-10U70_1cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/7.0/RPMS/mod_php3-gd-3.0.18-10U70_1cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/7.0/RPMS/mod_php3-imap-3.0.18-10U70_1cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/7.0/RPMS/mod_php3-ldap-3.0.18-10U70_1cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/7.0/RPMS/mod_php3-mysql-3.0.18-10U70_1cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/7.0/RPMS/mod_php3-pgsql-3.0.18-10U70_1cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/7.0/RPMS/php3-cgi-3.0.18-10U70_1cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/7.0/RPMS/mod_php3-xml-3.0.18-10U70_1cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/7.0/RPMS/php3-cgi-gd-3.0.18-10U70_1cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/7.0/RPMS/php3-cgi-imap-3.0.18-10U70_1cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/7.0/RPMS/php3-cgi-ldap-3.0.18-10U70_1cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/7.0/RPMS/php3-cgi-mysql-3.0.18-10U70_1cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/7.0/RPMS/php3-cgi-pgsql-3.0.18-10U70_1cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/7.0/RPMS/php3-cgi-xml-3.0.18-10U70_1cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/7.0/RPMS/mod_php3-3.0.18-10U70_1cl.src.rpm
    ftp://atualizacoes.conectiva.com.br/7.0/SRPMS/mod_php3-3.0.18-10U70_1cl.src.rpm
    ftp://atualizacoes.conectiva.com.br/8/SRPMS/php4-4.1.1-7U80_1cl.src.rpm
    ftp://atualizacoes.conectiva.com.br/8/RPMS/mod_php4-4.1.1-7U80_1cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/8/RPMS/php4-4.1.1-7U80_1cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/8/RPMS/php4-devel-4.1.1-7U80_1cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/8/RPMS/php4-doc-4.1.1-7U80_1cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/8/RPMS/php4-imap-4.1.1-7U80_1cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/8/RPMS/php4-ldap-4.1.1-7U80_1cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/8/RPMS/php4-mysql-4.1.1-7U80_1cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/8/RPMS/php4-odbc-4.1.1-7U80_1cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/8/RPMS/php4-pgsql-4.1.1-7U80_1cl.i386.rpm
    
    
    ADDITIONAL INSTRUCTIONS
     Users of Conectiva Linux version 6.0 or higher may use apt to perform 
     upgrades of RPM packages:
     - add the following line to /etc/apt/sources.list if it is not there yet
       (you may also use linuxconf to do this):
    
     rpm [cncbr] ftp://atualizacoes.conectiva.com.br 6.0/conectiva updates
    
    (replace 6.0 with the correct version number if you are not running CL6.0)
    
     - run:                 apt-get update
     - after that, execute: apt-get upgrade
    
     Detailed instructions reagarding the use of apt and upgrade examples 
     can be found at http://distro.conectiva.com.br/atualizacoes/#apt?idioma=en
    
    
    - -------------------------------------------------------------------------
    All packages are signed with Conectiva's GPG key. The key and instructions
    on how to import it can be found at 
    http://distro.conectiva.com.br/seguranca/chave/?idioma=en
    Instructions on how to check the signatures of the RPM packages can be
    found at http://distro.conectiva.com.br/seguranca/politica/?idioma=en
    - -------------------------------------------------------------------------
    All our advisories and generic update instructions can be viewed at
    http://distro.conectiva.com.br/atualizacoes/?idioma=en
    
    - -------------------------------------------------------------------------
    subscribe: conectiva-updates-subscribeat_private
    unsubscribe: conectiva-updates-unsubscribeat_private
    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v1.0.6 (GNU/Linux)
    Comment: For info see http://www.gnupg.org
    
    iD8DBQE90s+242jd0JmAcZARAp7jAKDDmZ8V355UcYVoMDhwJUSR7WsyKQCeOTue
    y4MQkf/o/JYnpHgkwUnNJvs=
    =nsaG
    -----END PGP SIGNATURE-----
    



    This archive was generated by hypermail 2b30 : Sat Nov 16 2002 - 10:48:19 PST