-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory                           GLSA 200410-04
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                                            https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

  Severity: Normal
     Title: PHP: Memory disclosure and arbitrary location file upload
      Date: October 06, 2004
      Bugs: #64223
        ID: 200410-04

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis
=======
Two bugs in PHP may allow the disclosure of portions of memory and
allow remote attackers to upload files to arbitrary locations.

Background
=========
PHP is a general-purpose scripting language widely used to develop
web-based applications. It can run inside a web server using the
mod_php module or the CGI version of PHP, or can run stand-alone in a
CLI.

Affected packages
================
    -------------------------------------------------------------------
     Package          /  Vulnerable  /                      Unaffected
    -------------------------------------------------------------------
  1  dev-php/php           < 4.3.9                           >= 4.3.9
  2  dev-php/mod_php       < 4.3.9                            >= 4.3.9
  3  dev-php/php-cgi       < 4.3.9                            >= 4.3.9
    -------------------------------------------------------------------
     3 affected packages on all of their supported architectures.
    -------------------------------------------------------------------

Description
==========
Stefano Di Paola discovered two bugs in PHP. The first is a parse error
in php_variables.c that could allow a remote attacker to view the
contents of the target machine's memory. Additionally, an array
processing error in the SAPI_POST_HANDLER_FUNC() function inside
rfc1867.c could lead to the $_FILES array being overwritten.

Impact
=====
A remote attacker could exploit the first vulnerability to view memory
contents. On a server with a script that provides file uploads, an
attacker could exploit the second vulnerability to upload files to an
arbitrary location. On systems where the HTTP server is allowed to
write in a HTTP-accessible location, this could lead to remote
execution of arbitrary commands with the rights of the HTTP server.

Workaround
=========
There is no known workaround at this time.

Resolution
=========
All PHP, mod_php and php-cgi users should upgrade to the latest stable
version:

    # emerge sync

    # emerge -pv ">=dev-php/php-4.3.9"
    # emerge ">=dev-php/php-4.3.9"

    # emerge -pv ">=dev-php/mod_php-4.3.9"
    # emerge ">=dev-php/mod_php-4.3.9"

    # emerge -pv ">=dev-php/php-cgi-4.3.9"
    # emerge ">=dev-php/php-cgi-4.3.9"

References
=========
  [ 1 ] Secunia Advisory
        https://www.flexera.com/products/software-vulnerability-research/secunia-research
  [ 2 ] BugTraq post regarding the php_variables.c issue
          [ 3 ] BugTraq post regarding the rfc1867.c issue
        
Availability
===========
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

  https://security.gentoo.org/glsa/200410-04

Concerns?
========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org/.

License
======
Copyright 2004 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

https://creativecommons.org/licenses/by-sa/1.0/
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (Darwin)

iQEVAwUBQWNIwbDO2aFJ9pv2AQJECgf7BBrP7OEsoGjgSR11YB4IFZwTXWsWUJO0
WGAfY2VX9ZQNPFJ90Je0Vgb/j50ZR8lfNpg4sjqw/ohouXEsGgAFhckUuVgIvUsv
xnmLSVt+cP/w2Gku/dGtQ8yOoi3++JhbIx0UiYv8pH4GcpjOfrJDDfI/ItmQKrCe
sGswXjuhYO1pAugzTWpouLdpCofbCqGS23VJbIP0jW6YtsMaxKdI0AteWlBDFCo5
0trpIZWdS5eY3wicoFG2y8Cj1zsmLhbUiY0YtYxsuQrw2vrLf6owZavUxSmrRe8R
gSNbYNNsFT/vbfsuQcrtKCS2qI4IheK0/nZIbt9YBFEDqYH4UbUXLw==Qhn7
-----END PGP SIGNATURE-----

Gentoo: GLSA-200410-04: PHP: Memory disclosure and arbitrary location file upload

Two bugs in PHP may allow the disclosure of portions of memory and allow remote attackers to upload files to arbitrary locations.

Summary

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Gentoo Linux Security Advisory                           GLSA 200410-04
                                            https://security.gentoo.org/

Severity: Normal Title: PHP: Memory disclosure and arbitrary location file upload Date: October 06, 2004 Bugs: #64223 ID: 200410-04

Synopsis ======= Two bugs in PHP may allow the disclosure of portions of memory and allow remote attackers to upload files to arbitrary locations.
Background ========= PHP is a general-purpose scripting language widely used to develop web-based applications. It can run inside a web server using the mod_php module or the CGI version of PHP, or can run stand-alone in a CLI.
Affected packages ================ ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 dev-php/php < 4.3.9 >= 4.3.9 2 dev-php/mod_php < 4.3.9 >= 4.3.9 3 dev-php/php-cgi < 4.3.9 >= 4.3.9 ------------------------------------------------------------------- 3 affected packages on all of their supported architectures. -------------------------------------------------------------------
========== Stefano Di Paola discovered two bugs in PHP. The first is a parse error in php_variables.c that could allow a remote attacker to view the contents of the target machine's memory. Additionally, an array processing error in the SAPI_POST_HANDLER_FUNC() function inside rfc1867.c could lead to the $_FILES array being overwritten.
Impact ===== A remote attacker could exploit the first vulnerability to view memory contents. On a server with a script that provides file uploads, an attacker could exploit the second vulnerability to upload files to an arbitrary location. On systems where the HTTP server is allowed to write in a HTTP-accessible location, this could lead to remote execution of arbitrary commands with the rights of the HTTP server.
Workaround ========= There is no known workaround at this time.
Resolution ========= All PHP, mod_php and php-cgi users should upgrade to the latest stable version:
# emerge sync
# emerge -pv ">=dev-php/php-4.3.9" # emerge ">=dev-php/php-4.3.9"
# emerge -pv ">=dev-php/mod_php-4.3.9" # emerge ">=dev-php/mod_php-4.3.9"
# emerge -pv ">=dev-php/php-cgi-4.3.9" # emerge ">=dev-php/php-cgi-4.3.9"
References ========= [ 1 ] Secunia Advisory https://www.flexera.com/products/software-vulnerability-research/secunia-research [ 2 ] BugTraq post regarding the php_variables.c issue [ 3 ] BugTraq post regarding the rfc1867.c issue
Availability =========== This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
https://security.gentoo.org/glsa/200410-04
Concerns? ======== Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org/.
License ====== Copyright 2004 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/1.0/ -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.4 (Darwin)
iQEVAwUBQWNIwbDO2aFJ9pv2AQJECgf7BBrP7OEsoGjgSR11YB4IFZwTXWsWUJO0 WGAfY2VX9ZQNPFJ90Je0Vgb/j50ZR8lfNpg4sjqw/ohouXEsGgAFhckUuVgIvUsv xnmLSVt+cP/w2Gku/dGtQ8yOoi3++JhbIx0UiYv8pH4GcpjOfrJDDfI/ItmQKrCe sGswXjuhYO1pAugzTWpouLdpCofbCqGS23VJbIP0jW6YtsMaxKdI0AteWlBDFCo5 0trpIZWdS5eY3wicoFG2y8Cj1zsmLhbUiY0YtYxsuQrw2vrLf6owZavUxSmrRe8R gSNbYNNsFT/vbfsuQcrtKCS2qI4IheK0/nZIbt9YBFEDqYH4UbUXLw==Qhn7 -----END PGP SIGNATURE-----

Resolution

References

Availability

Concerns

Severity

Synopsis

Background

Affected Packages

Impact

Workaround

Related News