Operating System:

[RedHat]

Published:

24 October 2007

Protect yourself against future threats.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                         ESB-2007.0831 -- [RedHat]
                       Moderate: php security update
                              24 October 2007

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              PHP
Publisher:            Red Hat
Operating System:     Red Hat Enterprise Linux AS/ES/WS 2.1
                      Red Hat Application Stack v2 for Enterprise Linux  5
Impact:               Execute Arbitrary Code/Commands
                      Denial of Service
                      Inappropriate Access
                      Reduced Security
Access:               Remote/Unauthenticated
CVE Names:            CVE-2007-4670 CVE-2007-4661 CVE-2007-4659
                      CVE-2007-4658 CVE-2007-3998 CVE-2007-3996
                      CVE-2007-3799 CVE-2007-2872 CVE-2007-2509

Ref:                  AA-2007.0028
                      AA-2007.0039
                      AL-2007.0106

Original Bulletin:    https://rhn.redhat.com/errata/RHSA-2007-0888.html
                      https://rhn.redhat.com/errata/RHSA-2007-0917.html

Comment: The bulletin contains two Red Hat advisories. The advisories covers
         versions of RHEL 2 and 5.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - ---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Moderate: php security update
Advisory ID:       RHSA-2007:0888-01
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2007-0888.html
Issue date:        2007-10-23
Updated on:        2007-10-23
Product:           Red Hat Enterprise Linux
CVE Names:         CVE-2007-2509 CVE-2007-2872 CVE-2007-3799 
                   CVE-2007-3996 CVE-2007-4670 
- - ---------------------------------------------------------------------

1. Summary:

Updated PHP packages that fix several security issues are now available for
Red Hat Enterprise Linux 2.1

This update has been rated as having moderate security impact by the Red
Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1  - i386, ia64
Red Hat Linux Advanced Workstation 2.1 - ia64
Red Hat Enterprise Linux ES version 2.1 - i386
Red Hat Enterprise Linux WS version 2.1 - i386

3. Problem description:

PHP is an HTML-embedded scripting language commonly used with the Apache
HTTP Web server. 

Various integer overflow flaws were found in the PHP gd extension. A script
that could be forced to resize images from an untrusted source could
possibly allow a remote attacker to execute arbitrary code as the apache
user.  (CVE-2007-3996)

An integer overflow flaw was found in the PHP chunk_split function. If a
remote attacker was able to pass arbitrary data to the third argument of
chunk_split they could possibly execute arbitrary code as the apache user.
 Note that it is unusual for a PHP script to use the chunk_script function
with a user-supplied third argument.  (CVE-2007-2872)

A previous security update introduced a bug into PHP session cookie
handling.  This could allow an attacker to stop a victim from viewing a
vulnerable web site if the victim has first visited a malicious web page
under the control of the attacker, and that page can set a cookie for the
vulnerable web site.  (CVE-2007-4670)

A bug was found in PHP session cookie handling.  This could allow an
attacker to create a cross-site cookie insertion attack if a victim follows
an untrusted carefully-crafted URL.  (CVE-2007-3799)

A flaw was found in the PHP 'ftp' extension. If a PHP script used this
extension to provide access to a private FTP server, and passed untrusted
script input directly to any function provided by this extension, a remote
attacker would be able to send arbitrary FTP commands to the server. 
(CVE-2007-2509)

Users of PHP should upgrade to these updated packages which contain
backported patches to correct these issues.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.  

This update is available via Red Hat Network.  Details on how to use 
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

5. Bug IDs fixed (http://bugzilla.redhat.com/):

239014 - CVE-2007-2509 php CRLF injection
242032 - CVE-2007-2872 php chunk_split integer overflow
250726 - CVE-2007-3799 php cross-site cookie insertion
278031 - CVE-2007-3996 php multiple integer overflows in gd
278041 - CVE-2007-4670 php malformed cookie handling

6. RPMs required:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1 :

SRPMS:
ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/php-4.1.2-2.19.src.rpm
d59c419407bc7f55ae909d8f36226ed3  php-4.1.2-2.19.src.rpm

i386:
2c6c7d5c75706e695608992a48312dc9  php-4.1.2-2.19.i386.rpm
ac1a914700f541022790f14f7f4be67e  php-devel-4.1.2-2.19.i386.rpm
dbb6a6a436edfd6af00ceb50c69871f0  php-imap-4.1.2-2.19.i386.rpm
e18872974d96d7d6645ff9eb5e8df70e  php-ldap-4.1.2-2.19.i386.rpm
0b5816829e4fe08c75da34bc49f235b0  php-manual-4.1.2-2.19.i386.rpm
4e1ffad2e6f96b7099fb60f8ee7b41de  php-mysql-4.1.2-2.19.i386.rpm
27a0b33680d1380c3e27292881e5ddb3  php-odbc-4.1.2-2.19.i386.rpm
cdd8dab08dc25799a4bc56d23157aa64  php-pgsql-4.1.2-2.19.i386.rpm

ia64:
6f9788224b1a661895378c206402d190  php-4.1.2-2.19.ia64.rpm
dcfe6c96266cc9c0f7cf6bac756dc548  php-devel-4.1.2-2.19.ia64.rpm
539a654c81629bfbda65b5e9827d9da0  php-imap-4.1.2-2.19.ia64.rpm
7152cbca5380150e77098c616af0e7dd  php-ldap-4.1.2-2.19.ia64.rpm
06098dc1102450a0f11ae94823f6c4b0  php-manual-4.1.2-2.19.ia64.rpm
546cb984504a375bbdad6999e2b0748f  php-mysql-4.1.2-2.19.ia64.rpm
fdb45b74ed4414297f0fe366507b3d44  php-odbc-4.1.2-2.19.ia64.rpm
a8a8b6b9e5da2af891fddb1199c429f4  php-pgsql-4.1.2-2.19.ia64.rpm

Red Hat Linux Advanced Workstation 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/php-4.1.2-2.19.src.rpm
d59c419407bc7f55ae909d8f36226ed3  php-4.1.2-2.19.src.rpm

ia64:
6f9788224b1a661895378c206402d190  php-4.1.2-2.19.ia64.rpm
dcfe6c96266cc9c0f7cf6bac756dc548  php-devel-4.1.2-2.19.ia64.rpm
539a654c81629bfbda65b5e9827d9da0  php-imap-4.1.2-2.19.ia64.rpm
7152cbca5380150e77098c616af0e7dd  php-ldap-4.1.2-2.19.ia64.rpm
06098dc1102450a0f11ae94823f6c4b0  php-manual-4.1.2-2.19.ia64.rpm
546cb984504a375bbdad6999e2b0748f  php-mysql-4.1.2-2.19.ia64.rpm
fdb45b74ed4414297f0fe366507b3d44  php-odbc-4.1.2-2.19.ia64.rpm
a8a8b6b9e5da2af891fddb1199c429f4  php-pgsql-4.1.2-2.19.ia64.rpm

Red Hat Enterprise Linux ES version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/php-4.1.2-2.19.src.rpm
d59c419407bc7f55ae909d8f36226ed3  php-4.1.2-2.19.src.rpm

i386:
2c6c7d5c75706e695608992a48312dc9  php-4.1.2-2.19.i386.rpm
ac1a914700f541022790f14f7f4be67e  php-devel-4.1.2-2.19.i386.rpm
dbb6a6a436edfd6af00ceb50c69871f0  php-imap-4.1.2-2.19.i386.rpm
e18872974d96d7d6645ff9eb5e8df70e  php-ldap-4.1.2-2.19.i386.rpm
0b5816829e4fe08c75da34bc49f235b0  php-manual-4.1.2-2.19.i386.rpm
4e1ffad2e6f96b7099fb60f8ee7b41de  php-mysql-4.1.2-2.19.i386.rpm
27a0b33680d1380c3e27292881e5ddb3  php-odbc-4.1.2-2.19.i386.rpm
cdd8dab08dc25799a4bc56d23157aa64  php-pgsql-4.1.2-2.19.i386.rpm

Red Hat Enterprise Linux WS version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/php-4.1.2-2.19.src.rpm
d59c419407bc7f55ae909d8f36226ed3  php-4.1.2-2.19.src.rpm

i386:
2c6c7d5c75706e695608992a48312dc9  php-4.1.2-2.19.i386.rpm
ac1a914700f541022790f14f7f4be67e  php-devel-4.1.2-2.19.i386.rpm
dbb6a6a436edfd6af00ceb50c69871f0  php-imap-4.1.2-2.19.i386.rpm
e18872974d96d7d6645ff9eb5e8df70e  php-ldap-4.1.2-2.19.i386.rpm
0b5816829e4fe08c75da34bc49f235b0  php-manual-4.1.2-2.19.i386.rpm
4e1ffad2e6f96b7099fb60f8ee7b41de  php-mysql-4.1.2-2.19.i386.rpm
27a0b33680d1380c3e27292881e5ddb3  php-odbc-4.1.2-2.19.i386.rpm
cdd8dab08dc25799a4bc56d23157aa64  php-pgsql-4.1.2-2.19.i386.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2509
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2872
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3799
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3996
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4670
http://www.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2007 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFHHhlgXlSAg2UNWIIRAoabAJ43YcKi1lndvVCoQwviWs0zRB4n2wCfe1cd
izhyPOFL/idOIOPZf/q10fw=
=Gnpt
- -----END PGP SIGNATURE-----



- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - ---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Moderate: php security update
Advisory ID:       RHSA-2007:0917-01
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2007-0917.html
Issue date:        2007-10-23
Updated on:        2007-10-23
Product:           Red Hat Application Stack
CVE Names:         CVE-2007-3799 CVE-2007-3996 CVE-2007-3998 
                   CVE-2007-4659 CVE-2007-4658 CVE-2007-4670 
                   CVE-2007-4661 
- - ---------------------------------------------------------------------

1. Summary:

Updated PHP packages that fix several security issues are now available for
Red Hat Application Stack.

This update has been rated as having moderate security impact by the Red
Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Application Stack v2 for Enterprise Linux (v.5)  	 - i386, x86_64

3. Problem description:

PHP is an HTML-embedded scripting language commonly used with the Apache
HTTP Web server.

These updated packages address the following vulnerabilities:

Various integer overflow flaws were found in the PHP gd extension. A
script that could be forced to resize images from an untrusted source could
possibly allow a remote attacker to execute arbitrary code as the apache
user. (CVE-2007-3996)

A previous security update introduced a bug into PHP session cookie
handling. This could allow an attacker to stop a victim from viewing a
vulnerable web site if the victim has first visited a malicious web page
under the control of the attacker, and that page can set a cookie for the
vulnerable web site. (CVE-2007-4670)

A flaw was found in the PHP money_format function. If a remote attacker
was able to pass arbitrary data to the money_format function this could
possibly result in an information leak or denial of service. Note that is
is unusual for a PHP script to pass user-supplied data to the money_format
function. (CVE-2007-4658)

A flaw was found in the PHP wordwrap function. If a remote attacker was
able to pass arbitrary data to the wordwrap function this could possibly
result in a denial of service. (CVE-2007-3998)

A bug was found in PHP session cookie handling. This could allow an
attacker to create a cross-site cookie insertion attack if a victim follows
an untrusted carefully-crafted URL. (CVE-2007-3799)

A flaw was found in handling of dynamic changes to global variables. A
script which used certain functions which change global variables could
be forced to enable the register_globals configuration option, possibly
resulting in global variable injection. (CVE-2007-4659) 

An integer overflow flaw was found in the PHP chunk_split function. If a
remote attacker was able to pass arbitrary data to the third argument of
chunk_split they could possibly execute arbitrary code as the apache user.
Note that it is unusual for a PHP script to use the chunk_split function
with a user-supplied third argument. (CVE-2007-4661)

Users of PHP should upgrade to these updated packages which contain
backported patches to correct these issues.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade. Only those
RPMs which are currently installed will be updated. Those RPMs which are
not installed but included in the list will not be updated. Note that you
can also use wildcards (*.rpm) if your current directory *only* contains
the desired RPMs.

Please note that this update is also available via Red Hat Network. Many
people find this an easier way to apply updates. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

5. Bug IDs fixed (http://bugzilla.redhat.com/):

250726 - CVE-2007-3799 php cross-site cookie insertion
276081 - CVE-2007-3998 php floating point exception inside wordwrap
276531 - CVE-2007-4659 php zend_alter_ini_entry() memory_limit interruption
278011 - CVE-2007-4658 php money_format format string issue
278031 - CVE-2007-3996 php multiple integer overflows in gd
278041 - CVE-2007-4670 php malformed cookie handling
278161 - CVE-2007-4661 php size calculation in chunk_split

6. RPMs required:

Red Hat Application Stack v2 for Enterprise Linux (v.5)  	:

SRPMS:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/RHWAS/SRPMS/php-5.2.3-3.el5s2.src.rpm
e687175bc07eab174e25abfa0dca9534  php-5.2.3-3.el5s2.src.rpm

i386:
b75257f1461ddacc4225dfbd891b87c0  php-5.2.3-3.el5s2.i386.rpm
cb472d5aaf4ead14957de0623bb3d4b0  php-bcmath-5.2.3-3.el5s2.i386.rpm
4699cbe6cdbc71a5f6a1759978f54251  php-cli-5.2.3-3.el5s2.i386.rpm
4724204a1e88eb1c5aed999dbf91ec67  php-common-5.2.3-3.el5s2.i386.rpm
b9de6d61bfeac292c42f942fa9028ab0  php-dba-5.2.3-3.el5s2.i386.rpm
846597bc34fe474947aa7b53ccb5c9da  php-debuginfo-5.2.3-3.el5s2.i386.rpm
aabc9ea6aab27c1ee72a2f572b2a7d6e  php-devel-5.2.3-3.el5s2.i386.rpm
8f80b518067d270abebebad0ae106ad3  php-gd-5.2.3-3.el5s2.i386.rpm
2a94e6d5702a43e7ce122700d10623df  php-imap-5.2.3-3.el5s2.i386.rpm
9be1e1f1586fbed06b072fe1450f87a1  php-ldap-5.2.3-3.el5s2.i386.rpm
6022524a6d83957557931e40b2e7b0eb  php-mbstring-5.2.3-3.el5s2.i386.rpm
bdc5fdbeed9c3ec4a38d39f5c311a380  php-mysql-5.2.3-3.el5s2.i386.rpm
766c6870d011afdef2252b38586b8757  php-ncurses-5.2.3-3.el5s2.i386.rpm
f485a913c5a2a62ecfab4af6ebdfeeb6  php-odbc-5.2.3-3.el5s2.i386.rpm
4accbad7b61afde3cf04e7080816ab27  php-pdo-5.2.3-3.el5s2.i386.rpm
948e9ded764717a015b13545f8c3ae76  php-pgsql-5.2.3-3.el5s2.i386.rpm
58d564da90e8cb502f5f275b306dbb40  php-snmp-5.2.3-3.el5s2.i386.rpm
3f4c98ff0f1e6bb6d82f095210b717d3  php-soap-5.2.3-3.el5s2.i386.rpm
8948939da05b4c3fba26361de13a8fba  php-xml-5.2.3-3.el5s2.i386.rpm
112adcbe4b0d4d678b3e31b3283ac3cb  php-xmlrpc-5.2.3-3.el5s2.i386.rpm

x86_64:
1abd82cd077414578c0e9d089aad86a1  php-5.2.3-3.el5s2.x86_64.rpm
f0ee0e1049ddf2468d2660de416e99f8  php-bcmath-5.2.3-3.el5s2.x86_64.rpm
fed55d2cd7a05ef9a713a3dca80b7854  php-cli-5.2.3-3.el5s2.x86_64.rpm
0fe6dedad39ec7c72f365c73cea751be  php-common-5.2.3-3.el5s2.x86_64.rpm
0fafd4f847edd0e46395883faf26158c  php-dba-5.2.3-3.el5s2.x86_64.rpm
7e7de482ff435455ea95d8fcbd2b2433  php-debuginfo-5.2.3-3.el5s2.x86_64.rpm
d9bb222938344fde246415f30b6707a4  php-devel-5.2.3-3.el5s2.x86_64.rpm
e43176b50da43f3c03667cd839d40892  php-gd-5.2.3-3.el5s2.x86_64.rpm
bcae5919312d5c7667aebd8c37f73def  php-imap-5.2.3-3.el5s2.x86_64.rpm
c46e4cff3b9d4951d99689d8b8e66450  php-ldap-5.2.3-3.el5s2.x86_64.rpm
1e7610c3e9f7980ed5746ad9d1617fa2  php-mbstring-5.2.3-3.el5s2.x86_64.rpm
9742d3a1435fd94b9546d9ec14e825ee  php-mysql-5.2.3-3.el5s2.x86_64.rpm
19333f47eaae706437e09de493e8dc1a  php-ncurses-5.2.3-3.el5s2.x86_64.rpm
f320e99dd5c77c7c72cc675be50ad66f  php-odbc-5.2.3-3.el5s2.x86_64.rpm
71081a91ab2a7479ebde113726316452  php-pdo-5.2.3-3.el5s2.x86_64.rpm
f03c434be520b19dff2717e35a773038  php-pgsql-5.2.3-3.el5s2.x86_64.rpm
542e220bce399a52527e10bbc0266c9a  php-snmp-5.2.3-3.el5s2.x86_64.rpm
2e093e544a9daab2d8d47949a98ecf12  php-soap-5.2.3-3.el5s2.x86_64.rpm
9dd382af22a630f7e9d8522c451713ad  php-xml-5.2.3-3.el5s2.x86_64.rpm
e5606dab1ed2af4baa68ddd3ba6fdfcb  php-xmlrpc-5.2.3-3.el5s2.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3799
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3996
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3998
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4659
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4658
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4670
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4661
http://www.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2007 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFHHhnlXlSAg2UNWIIRArgOAKCcE6ZyvVUUMqKHOiLf1nmeweksrwCcDWco
2fktGdioLm1gxvxa8q+xI2I=
=0uCJ
- -----END PGP SIGNATURE-----
- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================

-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQCVAwUBRx6lmCh9+71yA2DNAQLuxQP/b3a7SyGL1wpycJGvkR4SXbXDsmjzAotz
+/yrYXIfJCs8lWiicciKCq2MQkSwr0k4XCjZZtbR/EXkr3AZjulE7MS64dEcvod2
I4vzQBED3/ypHwRASGGZpjxqOnT1MThMDEs9fIxn2meat4FPWhvb+hzER2nVCqok
y1fvXf+Ieo8=
=65qO
-----END PGP SIGNATURE-----