diff options
-rw-r--r-- | security/vuxml/vuln.xml | 287 |
1 files changed, 246 insertions, 41 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index d50eafee0311..23bc8a2d2583 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -380,8 +380,171 @@ Note: Please add new entries to the beginning of this file. </dates> </vuln> - <vuln vid="b2a6fc0e-070f-11e0-a6e9-00215c6a37bb"> - <topic>php -- multiple vulnerabilities</topic> + <vuln vid="2a41233d-10e7-11e0-becc-0022156e8794"> + <topic>php-zip -- multiple Denial of Service + vulnerabilities</topic> + <affects> + <package> + <name>php5-zip</name> + <range><lt>5.3.4</lt></range> + </package> + <package> + <name>php52-zip</name> + <range><lt>5.2.15</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The following DoS conditions in Zip extension + were fixed in PHP 5.3.4 and PHP 5.2.15:</p> + <ul> + <li> + <blockquote cite="http://www.php.net/releases/5_3_4.php"> + <p>Fixed crash in zip extract method (possible + CWE-170).</p> + </blockquote> + </li> + <li> + <blockquote cite="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3709"> + <p>The ZipArchive::getArchiveComment function + in PHP 5.2.x through 5.2.14 and 5.3.x through 5.3.3 + allows context-dependent attackers to cause a denial + of service (NULL pointer dereference and application + crash) via a crafted ZIP archive.</p> + </blockquote> + </li> + </ul> + </body> + </description> + <references> + <cvename>CVE-2010-3709</cvename> + <url>http://www.php.net/releases/5_3_4.php</url> + <url>http://www.php.net/releases/5_2_15.php</url> + <url>http://securityreason.com/achievement_securityalert/90</url> + </references> + <dates> + <discovery>2010-12-13</discovery> + <entry>2011-01-13</entry> + </dates> + </vuln> + + <vuln vid="c623f058-10e7-11e0-becc-0022156e8794"> + <topic>php-filter -- Denial of Service</topic> + <affects> + <package> + <name>php5-filter</name> + <range><lt>5.3.4</lt></range> + </package> + <package> + <name>php52-filter</name> + <range><lt>5.2.15</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The following DoS condition in filter extension + was fixed in PHP 5.3.4 and PHP 5.2.15:</p> + <blockquote cite="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3710"> + <p>Stack consumption vulnerability in the filter_var + function in PHP 5.2.x through 5.2.14 and 5.3.x through + 5.3.3, when FILTER_VALIDATE_EMAIL mode is used, allows + remote attackers to cause a denial of service (memory + consumption and application crash) via a long e-mail + address string.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2010-3710</cvename> + <url>http://www.php.net/releases/5_3_4.php</url> + <url>http://www.php.net/releases/5_2_15.php</url> + </references> + <dates> + <discovery>2010-12-13</discovery> + <entry>2011-01-13</entry> + </dates> + </vuln> + + <vuln vid="1a0704e7-0edf-11e0-becc-0022156e8794"> + <topic>php-imap -- Denial of Service</topic> + <affects> + <package> + <name>php5-imap</name> + <range><lt>5.3.4</lt></range> + </package> + <package> + <name>php52-imap</name> + <range><lt>5.2.15</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The following DoS condition in IMAP extension + was fixed in PHP 5.3.4 and PHP 5.2.15:</p> + <blockquote cite="http://securitytracker.com/alerts/2010/Nov/1024761.html"> + <p>A remote user can send specially crafted IMAP user name + or password data to trigger a double free memory error + in 'ext/imap/php_imap.c' and cause the target service + to crash.</p> + <p>It may be possible to execute arbitrary code. + However, code execution was not confirmed.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2010-4150</cvename> + <url>http://www.php.net/releases/5_3_4.php</url> + <url>http://www.php.net/releases/5_2_15.php</url> + </references> + <dates> + <discovery>2010-12-13</discovery> + <entry>2011-01-13</entry> + </dates> + </vuln> + + <vuln vid="da3d381b-0ee6-11e0-becc-0022156e8794"> + <topic>pecl-phar -- format string vulnerability</topic> + <affects> + <package> + <name>pecl-phar</name> + <range><ge>0</ge></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Entry for CVE-2010-2094 says:</p> + <blockquote cite="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2094"> + <p>Multiple format string vulnerabilities in the phar + extension in PHP 5.3 before 5.3.2 allow context-dependent + attackers to obtain sensitive information (memory + contents) and possibly execute arbitrary code via a + crafted phar:// URI that is not properly handled by the + (1) phar_stream_flush, (2) phar_wrapper_unlink, + (3) phar_parse_url, or (4) phar_wrapper_open_url functions + in ext/phar/stream.c; and the (5) phar_wrapper_open_dir + function in ext/phar/dirstream.c, which triggers errors + in the php_stream_wrapper_log_error function.</p> + </blockquote> + <p>PECL source code for PHAR extension shares the same code, + so it is vulnerable too.</p> + </body> + </description> + <references> + <cvename>CVE-2010-2094</cvename> + <url>http://php-security.org/2010/05/14/mops-2010-024-php-phar_stream_flush-format-string-vulnerability/index.html</url> + <url>http://php-security.org/2010/05/14/mops-2010-025-php-phar_wrapper_open_dir-format-string-vulnerability/index.htm</url> + <url>http://php-security.org/2010/05/14/mops-2010-026-php-phar_wrapper_unlink-format-string-vulnerability/index.htm</url> + <url>http://php-security.org/2010/05/14/mops-2010-027-php-phar_parse_url-format-string-vulnerabilities/index.htm</url> + <url>http://php-security.org/2010/05/14/mops-2010-028-php-phar_wrapper_open_url-format-string-vulnerabilities/index.html</url> + </references> + <dates> + <discovery>2010-12-13</discovery> + <entry>2011-01-13</entry> + </dates> + </vuln> + + <vuln vid="3761df02-0f9c-11e0-becc-0022156e8794"> + <topic>php -- NULL byte poisoning</topic> <affects> <package> <name>php5</name> @@ -389,62 +552,104 @@ Note: Please add new entries to the beginning of this file. </package> <package> <name>php52</name> - <range><lt>5.2.15</lt></range> + <range><ge>0</ge></range> </package> </affects> <description> <body xmlns="http://www.w3.org/1999/xhtml"> - <p>PHP developers reports:</p> - <blockquote cite="http://www.php.net/releases/5_3_4.php"> - <p>Security Enhancements and Fixes in PHP 5.3.4:</p> - <ul> - <li>Fixed crash in zip extract method (possible - CWE-170).</li> - <li>Paths with NULL in them (foo\0bar.txt) are now - considered as invalid (CVE-2006-7243).</li> - <li>Fixed a possible double free in imap extension - (Identified by Mateusz Kocielski). (CVE-2010-4150).</li> - <li>Fixed NULL pointer dereference in - ZipArchive::getArchiveComment. (CVE-2010-3709).</li> - <li>Fixed possible flaw in open_basedir (CVE-2010-3436).</li> - <li>Fixed MOPS-2010-24, fix string validation. - (CVE-2010-2950).</li> - <li>Fixed symbolic resolution support when the target - is a DFS share.</li> - <li>Fixed bug #52929 (Segfault in filter_var with - FILTER_VALIDATE_EMAIL with large amount of data) (CVE-2010-3710).</li> - </ul> + <p>PHP-specific version of NULL-byte poisoning was briefly + described by ShAnKaR:</p> + <blockquote cite="http://www.securityfocus.com/archive/1/archive/1/445788/100/0/threaded"> + <p>Poison NULL byte vulnerability for perl CGI applications + was described in + <a href="http://artofhacking.com/files/phrack/phrack55/P55-07.TXT">[1]</a>. + ShAnKaR noted, that same vulnerability also affects + different PHP applications.</p> </blockquote> - <blockquote cite="http://www.php.net/releases/5_2_15.php"> - <p>Security Enhancements and Fixes in PHP 5.2.15:</p> - <ul> - <li>Fixed extract() to do not overwrite $GLOBALS and $this - when using EXTR_OVERWRITE.</li> - <li>Fixed crash in zip extract method (possible CWE-170).</li> - <li>Fixed a possible double free in imap extension.</li> - <li>Fixed possible flaw in open_basedir (CVE-2010-3436).</li> - <li>Fixed NULL pointer dereference in ZipArchive::getArchiveComment. - (CVE-2010-3709).</li> - <li>Fixed bug #52929 (Segfault in filter_var with FILTER_VALIDATE_EMAIL - with large amount of data).</li> - </ul> + <p>PHP developers report that branch 5.3 received a fix:</p> + <blockquote cite="http://www.php.net/releases/5_3_4.php"> + <p>Paths with NULL in them (foo\0bar.txt) are now considered + as invalid (CVE-2006-7243).</p> </blockquote> </body> </description> <references> <cvename>CVE-2006-7243</cvename> - <cvename>CVE-2010-2950</cvename> + <url>http://www.securityfocus.com/archive/1/archive/1/445788/100/0/threaded</url> + <url>http://artofhacking.com/files/phrack/phrack55/P55-07.TXT</url> + </references> + <dates> + <discovery>2010-12-10</discovery> + <entry>2011-01-13</entry> + </dates> + </vuln> + + <vuln vid="73634294-0fa7-11e0-becc-0022156e8794"> + <topic>php -- open_basedir bypass</topic> + <affects> + <package> + <name>php5</name> + <range><lt>5.3.4</lt></range> + </package> + <package> + <name>php52</name> + <range><lt>5.2.15</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>MITRE reports:</p> + <blockquote cite="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3436"> + <p>fopen_wrappers.c in PHP 5.3.x through 5.3.3 might allow + remote attackers to bypass open_basedir restrictions via + vectors related to the length of a filename.</p> + </blockquote> + </body> + </description> + <references> + <bid>44723</bid> <cvename>CVE-2010-3436</cvename> - <cvename>CVE-2010-3709</cvename> - <cvename>CVE-2010-4150</cvename> </references> <dates> <discovery>2010-12-10</discovery> - <entry>2010-12-13</entry> - <modified>2010-12-16</modified> + <entry>2011-01-13</entry> </dates> </vuln> + <vuln vid="f3148a05-0fa7-11e0-becc-0022156e8794"> + <topic>php -- corruption of $GLOBALS and $this variables via + extract() method</topic> + <affects> + <package> + <name>php5</name> + <range><lt>5.3.4</lt></range> + </package> + <package> + <name>php52</name> + <range><lt>5.2.15</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Off-by-one error in the sanity validator for the extract() + method allowed attackers to replace the values of $GLOBALS + and $this when mode EXTR_OVERWRITE was used.</p> + </body> + </description> + <references> + <url>http://www.mail-archive.com/php-cvs@lists.php.net/msg47722.html</url> + <url>http://www.php.net/releases/5_2_15.php</url> + </references> + <dates> + <discovery>2010-12-10</discovery> + <entry>2011-01-13</entry> + </dates> + </vuln> + + <vuln vid="b2a6fc0e-070f-11e0-a6e9-00215c6a37bb"> + <cancelled /> + </vuln> + <vuln vid="1d8ff4a2-0445-11e0-8e32-000f20797ede"> <topic>mozilla -- multiple vulnerabilities</topic> <affects> |