Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2014.0991 php5 security update 17 June 2014 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: php5 Publisher: Debian Operating System: Debian GNU/Linux 7 UNIX variants (UNIX, Linux, OSX) Windows Impact/Access: Execute Arbitrary Code/Commands -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2014-4049 Original Bulletin: http://www.debian.org/security/2014/dsa-2961 Comment: This advisory references vulnerabilities in products which run on platforms other than Debian. It is recommended that administrators running php5 check for an updated version of the software for their operating system. - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - - ------------------------------------------------------------------------- Debian Security Advisory DSA-2961-1 security@debian.org http://www.debian.org/security/ Salvatore Bonaccorso June 16, 2014 http://www.debian.org/security/faq - - ------------------------------------------------------------------------- Package : php5 CVE ID : CVE-2014-4049 Debian Bug : 751364 It was discovered that PHP, a general-purpose scripting language commonly used for web application development, is vulnerable to a heap-based buffer overflow in the DNS TXT record parsing. A malicious server or man-in-the-middle attacker could possibly use this flaw to execute arbitrary code as the PHP interpreter if a PHP application uses dns_get_record() to perform a DNS query. For the stable distribution (wheezy), this problem has been fixed in version 5.4.4-14+deb7u11. For the testing distribution (jessie), this problem has been fixed in version 5.6.0~beta4+dfsg-3. For the unstable distribution (sid), this problem has been fixed in version 5.6.0~beta4+dfsg-3. We recommend that you upgrade your php5 packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: http://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCgAGBQJTn0WdAAoJEAVMuPMTQ89EcOQP/0rczSnIqKQs2hIl1s/zNudK ugpcxiKjHzNyNzY7qSv8uHFTZDUX1LGbBRMFtBfGm1f80hMjq0+JAGNOJCMP1e2I V0L7beyQ+oWz3RJr6XSnp5QfF0BTBLv3rWbuhWMDWu1e0s3B3KU5ubYuvjzDA+U7 mO8Z1eB+KnAMOKQnL2Arpf4P0UTOJXXh/QUaR49iS1+grSzAkge/aSNngn2OKs8V Pt05Aw+MDUp6AlUX6SnIZ4W2dZo4kVXgznb2q9k6GZt4J9bABemSdUDwia64Sr6C EI/U/Sd+zzfg4Qj6OBt5fIvgNgL43PRNGMBWpO2RQ2IeUQYKEqH7azd0e2ysLHr2 zEudtKKb0fynXrfDKWQAf6C42xEeSFqyiYxAysbmVPdfXsUxTKP+aU0aH72BBhAj sVCF1SZR2rirPO+WA/vp3NNyWNAkLpqLQJ4RQsK8k72a2xxodUS5a25vWnPODaFX EW+S1D/BNvwAPr+FKWwZHK7VPNQf7ZvmEix1loyXbeHvSFecs3k28Jx69FAu8HLC bvO2Q+VSVJ/2wuAbxl41BM6wfaJJSEF6mkDu0ki0QExvELMOzjdnDTJjLOMWe12p JQgnjduqD7BoX+lmCf65fru3ufy/fxwKUI2L2/mq2wqYX6CMaW63xVuYVzYgba3x mDUG1TVPSksHPNXUfsvw =dJZx - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBU5+m4hLndAQH1ShLAQKR5BAAkTPuioS1MWdeftQe7WeC9pQmkAjyC91y p0BX8bTWikRujOgWEJv0RoRc7Th4tPhWf9Qv0u/5jlApnm5J/Ao0vDo4Yq7EPI+z iXpcsIaB0Vsj6Yjgw1tIfdQCRYStr1XfeBW4+mlBiFVzlvQSkAyyajFY2q/E9bM2 M/0q0IM1W7MHF6iQTivR3j+MvUFzBJbqNjsEnOAzqSKl5ZS3cLoSmPOuKDEsrZPj PVthXUsPE20WMAH5v+TS+kwzvC/FW98qyk++27wLksHCvsLq61XaCVt2QGU4VQQ0 LxCqbq97NpziKhDnwerKprBsLwwg1w08eRW8REMvZbwYcyg1WODen5UEd9fEUqNp OWP92tmHufcmd9595EBpAPrLZLa6PlI8R7Oyq38eF76gCoZkOPdaRZUuONN6/QDN AFijlUr6Osb0mkdyviY+Mm3xNY10GbmMuIYT1jukLJyF1iG5GWEtVyjxoccrV6Mo e55er9dGm031lh/C/r2BsSpUGckSRdQ9Bpz0U+IhWKDRTxwuPA8pq8jP0TxEH25Q DHRHL6xT9VqJLm4aeoPvLX1SQs3JLCxRRFakcV5oRAH0Cpg4Ht3tg+OSXzjqeBa+ Qij4ZmEvgx55cmCjNXAUIi8QztIokrfJbPdDNNBsjkP3SN3iFZ+xv9cKHC2GOz7a nQiEFpMoN9Q= =cFEn -----END PGP SIGNATURE-----