From d69ab5dc68f05feeb160f1a12c8e645b312bea72 Mon Sep 17 00:00:00 2001 From: Remko Lodder Date: Wed, 13 Sep 2006 22:07:27 +0000 Subject: Attempt two: Document php -- multiple vulnerabilities --- security/vuxml/vuln.xml | 63 +++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 63 insertions(+) (limited to 'security') diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 8f79da2fc62f..92c8b08c9d1f 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -34,6 +34,69 @@ Note: Please add new entries to the beginning of this file. --> + + php -- multiple vulnerabilities + + + php4 + php5 + 4.4.4 + 55.1.5 + + + php4-cli + php5-cli + php4-cgi + php5-cgi + php4-dtc + php5-dtc + php4-horde + php5-horde + php4-nms + php5-nms + mod-php4 + mod-php5 + 0 + + + + +

The PHP development team reports:

+
+
    +
  • Added missing safe_mode/open_basedir checks inside the + error_log(), file_exists(), imap_open() and imap_reopen() + functions.
  • +
  • Fixed overflows inside str_repeat() and wordwrap() + functions on 64bit systems.
  • +
  • Fixed possible open_basedir/safe_mode bypass in cURL + extension and with realpath cache.
  • +
  • Fixed overflow in GD extension on invalid GIF + images.
  • +
  • Fixed a buffer overflow inside sscanf() function.
  • +
  • Fixed an out of bounds read inside stripos() + function.
  • +
  • Fixed memory_limit restriction on 64 bit system.
  • +
+
+ +
+ + CVE-2006-4481 + CVE-2006-4482 + CVE-2006-4483 + CVE-2006-4484 + CVE-2006-4485 + CVE-2006-4486 + http://www.php.net/release_4_4_4.php + http://www.php.net/release_5_1_5.php + + + 2006-09-FIXME + 2006-09-13 + +
+ drupal-pubcookie -- authentication may be bypassed -- cgit v1.2.3