Date:         Thu, 14 Jan 2010 13:45:32 -0600
Reply-To:     Troy Dawson 
Sender:       Security Errata for Scientific Linux
              
From:         Troy Dawson 
Subject:      Security ERRATA Moderate: php on SL3.x, SL4.x, SL5.x i386/x86_64
Comments: To: "scientific-linux-errata@fnal.gov"
          

Synopsis:	Moderate: php security update
Issue date:	2010-01-13
CVE Names:	CVE-2009-2687 CVE-2009-3291 CVE-2009-3292
                 CVE-2009-3546 CVE-2009-4017 CVE-2009-4142

CVE-2009-2687 php: exif_read_data crash on corrupted JPEG files
CVE-2009-3292 php: exif extension: Multiple missing sanity checks in 
EXIF file processing
CVE-2009-3291 php: openssl extension: Incorrect verification of SSL 
certificate with NUL in name
CVE-2009-3546 gd: insufficient input validation in _gdGetColors()
CVE-2009-4017 PHP: resource exhaustion attack via upload requests with 
lots of files
CVE-2009-4142 php: htmlspecialchars() insufficient checking of input for 
multi-byte encodings

Multiple missing input sanitization flaws were discovered in PHP's exif
extension. A specially-crafted image file could cause the PHP 
interpreter to crash or, possibly, disclose portions of its memory when 
a PHP script tried to extract Exchangeable image file format (Exif) 
metadata from the image file. (CVE-2009-2687, CVE-2009-3292)

A missing input sanitization flaw, leading to a buffer overflow, was
discovered in PHP's gd library. A specially-crafted GD image file could
cause the PHP interpreter to crash or, possibly, execute arbitrary code
when opened. (CVE-2009-3546)

It was discovered that PHP did not limit the maximum number of files 
that can be uploaded in one request. A remote attacker could use this 
flaw to instigate a denial of service by causing the PHP interpreter to 
use lots of system resources dealing with requests containing large 
amounts of files to be uploaded. This vulnerability depends on file 
uploads being enabled (which it is, in the default PHP configuration). 
(CVE-2009-4017)

Note: This update introduces a new configuration option, 
max_file_uploads, used for limiting the number of files that can be 
uploaded in one request. By default, the limit is 20 files per request.

It was discovered that PHP was affected by the previously published 
"null prefix attack", caused by incorrect handling of NUL characters in 
X.509 certificates. If an attacker is able to get a carefully-crafted 
certificate signed by a trusted Certificate Authority, the attacker 
could use the certificate during a man-in-the-middle attack and 
potentially confuse PHP into accepting it by mistake. (CVE-2009-3291)

It was discovered that PHP's htmlspecialchars() function did not 
properly recognize partial multi-byte sequences for some multi-byte 
encodings, sending them to output without them being escaped. An 
attacker could use this flaw to perform a cross-site scripting attack. 
(CVE-2009-4142)

After installing the updated packages, the httpd daemon must be 
restarted for the update to take effect.

SL 3.0.x

       SRPMS:
php-4.3.2-54.ent.src.rpm
       i386:
php-4.3.2-54.ent.i386.rpm
php-devel-4.3.2-54.ent.i386.rpm
php-imap-4.3.2-54.ent.i386.rpm
php-ldap-4.3.2-54.ent.i386.rpm
php-mysql-4.3.2-54.ent.i386.rpm
php-odbc-4.3.2-54.ent.i386.rpm
php-pgsql-4.3.2-54.ent.i386.rpm
       x86_64:
php-4.3.2-54.ent.x86_64.rpm
php-devel-4.3.2-54.ent.x86_64.rpm
php-imap-4.3.2-54.ent.x86_64.rpm
php-ldap-4.3.2-54.ent.x86_64.rpm
php-mysql-4.3.2-54.ent.x86_64.rpm
php-odbc-4.3.2-54.ent.x86_64.rpm
php-pgsql-4.3.2-54.ent.x86_64.rpm

SL 4.x

       SRPMS:
php-4.3.9-3.29.src.rpm
       i386:
php-4.3.9-3.29.i386.rpm
php-devel-4.3.9-3.29.i386.rpm
php-domxml-4.3.9-3.29.i386.rpm
php-gd-4.3.9-3.29.i386.rpm
php-imap-4.3.9-3.29.i386.rpm
php-ldap-4.3.9-3.29.i386.rpm
php-mbstring-4.3.9-3.29.i386.rpm
php-mysql-4.3.9-3.29.i386.rpm
php-ncurses-4.3.9-3.29.i386.rpm
php-odbc-4.3.9-3.29.i386.rpm
php-pear-4.3.9-3.29.i386.rpm
php-pgsql-4.3.9-3.29.i386.rpm
php-snmp-4.3.9-3.29.i386.rpm
php-xmlrpc-4.3.9-3.29.i386.rpm
       x86_64:
php-4.3.9-3.29.x86_64.rpm
php-devel-4.3.9-3.29.x86_64.rpm
php-domxml-4.3.9-3.29.x86_64.rpm
php-gd-4.3.9-3.29.x86_64.rpm
php-imap-4.3.9-3.29.x86_64.rpm
php-ldap-4.3.9-3.29.x86_64.rpm
php-mbstring-4.3.9-3.29.x86_64.rpm
php-mysql-4.3.9-3.29.x86_64.rpm
php-ncurses-4.3.9-3.29.x86_64.rpm
php-odbc-4.3.9-3.29.x86_64.rpm
php-pear-4.3.9-3.29.x86_64.rpm
php-pgsql-4.3.9-3.29.x86_64.rpm
php-snmp-4.3.9-3.29.x86_64.rpm
php-xmlrpc-4.3.9-3.29.x86_64.rpm

SL 5.x

       SRPMS:
php-5.1.6-24.el5_4.5.src.rpm
       i386:
php-5.1.6-24.el5_4.5.i386.rpm
php-bcmath-5.1.6-24.el5_4.5.i386.rpm
php-cli-5.1.6-24.el5_4.5.i386.rpm
php-common-5.1.6-24.el5_4.5.i386.rpm
php-dba-5.1.6-24.el5_4.5.i386.rpm
php-devel-5.1.6-24.el5_4.5.i386.rpm
php-gd-5.1.6-24.el5_4.5.i386.rpm
php-imap-5.1.6-24.el5_4.5.i386.rpm
php-ldap-5.1.6-24.el5_4.5.i386.rpm
php-mbstring-5.1.6-24.el5_4.5.i386.rpm
php-mysql-5.1.6-24.el5_4.5.i386.rpm
php-ncurses-5.1.6-24.el5_4.5.i386.rpm
php-odbc-5.1.6-24.el5_4.5.i386.rpm
php-pdo-5.1.6-24.el5_4.5.i386.rpm
php-pgsql-5.1.6-24.el5_4.5.i386.rpm
php-snmp-5.1.6-24.el5_4.5.i386.rpm
php-soap-5.1.6-24.el5_4.5.i386.rpm
php-xml-5.1.6-24.el5_4.5.i386.rpm
php-xmlrpc-5.1.6-24.el5_4.5.i386.rpm
       x86_64:
php-5.1.6-24.el5_4.5.x86_64.rpm
php-bcmath-5.1.6-24.el5_4.5.x86_64.rpm
php-cli-5.1.6-24.el5_4.5.x86_64.rpm
php-common-5.1.6-24.el5_4.5.x86_64.rpm
php-dba-5.1.6-24.el5_4.5.x86_64.rpm
php-devel-5.1.6-24.el5_4.5.x86_64.rpm
php-gd-5.1.6-24.el5_4.5.x86_64.rpm
php-imap-5.1.6-24.el5_4.5.x86_64.rpm
php-ldap-5.1.6-24.el5_4.5.x86_64.rpm
php-mbstring-5.1.6-24.el5_4.5.x86_64.rpm
php-mysql-5.1.6-24.el5_4.5.x86_64.rpm
php-ncurses-5.1.6-24.el5_4.5.x86_64.rpm
php-odbc-5.1.6-24.el5_4.5.x86_64.rpm
php-pdo-5.1.6-24.el5_4.5.x86_64.rpm
php-pgsql-5.1.6-24.el5_4.5.x86_64.rpm
php-snmp-5.1.6-24.el5_4.5.x86_64.rpm
php-soap-5.1.6-24.el5_4.5.x86_64.rpm
php-xml-5.1.6-24.el5_4.5.x86_64.rpm
php-xmlrpc-5.1.6-24.el5_4.5.x86_64.rpm

-Connie Sieh
-Troy Dawson

SciLinux: CVE-2009-2687 Moderate: php SL3.x, SL4.x, SL5.x i386/x86_64

Moderate: php security update

Summary

CVE-2009-3292 php: exif extension: Multiple missing sanity checks inEXIF file processingCVE-2009-3291 php: openssl extension: Incorrect verification of SSLcertificate with NUL in nameCVE-2009-3546 gd: insufficient input validation in _gdGetColors()CVE-2009-4017 PHP: resource exhaustion attack via upload requests withlots of filesCVE-2009-4142 php: htmlspecialchars() insufficient checking of input formulti-byte encodingsMultiple missing input sanitization flaws were discovered in PHP's exifextension. A specially-crafted image file could cause the PHPinterpreter to crash or, possibly, disclose portions of its memory whena PHP script tried to extract Exchangeable image file format (Exif)metadata from the image file. (CVE-2009-2687, CVE-2009-3292)A missing input sanitization flaw, leading to a buffer overflow, wasdiscovered in PHP's gd library. A specially-crafted GD image file couldcause the PHP interpreter to crash or, possibly, execute arbitrary codewhen opened. (CVE-2009-3546)It was discovered that PHP did not limit the maximum number of filesthat can be uploaded in one request. A remote attacker could use thisflaw to instigate a denial of service by causing the PHP interpreter touse lots of system resources dealing with requests containing largeamounts of files to be uploaded. This vulnerability depends on fileuploads being enabled (which it is, in the default PHP configuration).(CVE-2009-4017)Note: This update introduces a new configuration option,max_file_uploads, used for limiting the number of files that can beuploaded in one request. By default, the limit is 20 files per request.It was discovered that PHP was affected by the previously published"null prefix attack", caused by incorrect handling of NUL characters inX.509 certificates. If an attacker is able to get a carefully-craftedcertificate signed by a trusted Certificate Authority, the attackercould use the certificate during a man-in-the-middle attack andpotentially confuse PHP into accepting it by mistake. (CVE-2009-3291)It was discovered that PHP's htmlspecialchars() function did notproperly recognize partial multi-byte sequences for some multi-byteencodings, sending them to output without them being escaped. Anattacker could use this flaw to perform a cross-site scripting attack.(CVE-2009-4142)After installing the updated packages, the httpd daemon must berestarted for the update to take effect.SL 3.0.xSRPMS:php-4.3.2-54.ent.src.rpmi386:php-4.3.2-54.ent.i386.rpmphp-devel-4.3.2-54.ent.i386.rpmphp-imap-4.3.2-54.ent.i386.rpmphp-ldap-4.3.2-54.ent.i386.rpmphp-mysql-4.3.2-54.ent.i386.rpmphp-odbc-4.3.2-54.ent.i386.rpmphp-pgsql-4.3.2-54.ent.i386.rpmx86_64:php-4.3.2-54.ent.x86_64.rpmphp-devel-4.3.2-54.ent.x86_64.rpmphp-imap-4.3.2-54.ent.x86_64.rpmphp-ldap-4.3.2-54.ent.x86_64.rpmphp-mysql-4.3.2-54.ent.x86_64.rpmphp-odbc-4.3.2-54.ent.x86_64.rpmphp-pgsql-4.3.2-54.ent.x86_64.rpm



Security Fixes

Severity
Issued Date: : 2010-01-13
CVE Names: CVE-2009-2687 CVE-2009-3291 CVE-2009-3292
CVE-2009-3546 CVE-2009-4017 CVE-2009-4142
CVE-2009-2687 php: exif_read_data crash on corrupted JPEG files

Related News