logo
DATABASE RESOURCES PRICING ABOUT US

Important: php

Description

**Issue Overview:** PHP before 5.3.7 does not properly check the return values of the malloc, calloc, and realloc library functions, which allows context-dependent attackers to cause a denial of service (NULL pointer dereference and application crash) or trigger a buffer overflow by leveraging the ability to provide an arbitrary value for a function argument, related to (1) ext/curl/interface.c, (2) ext/date/lib/parse_date.c, (3) ext/date/lib/parse_iso_intervals.c, (4) ext/date/lib/parse_tz.c, (5) ext/date/lib/timelib.c, (6) ext/pdo_odbc/pdo_odbc.c, (7) ext/reflection/php_reflection.c, (8) ext/soap/php_sdl.c, (9) ext/xmlrpc/libxmlrpc/base64.c, (10) TSRM/tsrm_win32.c, and (11) the strtotime function. The is_a function in PHP 5.3.7 and 5.3.8 triggers a call to the __autoload function, which makes it easier for remote attackers to execute arbitrary code by providing a crafted URL and leveraging potentially unsafe behavior in certain PEAR packages and custom autoloaders. php: changes to is_a() in 5.3.7 may allow arbitrary code execution with certain code A signedness issue was found in the way the PHP crypt() function handled 8-bit characters in passwords when using Blowfish hashing. Up to three characters immediately preceding a non-ASCII character (one with the high bit set) had no effect on the hash result, thus shortening the effective password length. This made brute-force guessing more efficient as several different passwords were hashed to the same value. A signedness issue was found in the way the crypt() function in the PostgreSQL pgcrypto module handled 8-bit characters in passwords when using Blowfish hashing. Up to three characters immediately preceding a non-ASCII character (one with the high bit set) had no effect on the hash result, thus shortening the effective password length. This made brute-force guessing more efficient as several different passwords were hashed to the same value. crypt_blowfish before 1.1, as used in PHP before 5.3.7 on certain platforms, PostgreSQL before 8.4.9, and other products, does not properly handle 8-bit characters, which makes it easier for context-dependent attackers to determine a cleartext password by leveraging knowledge of a password hash. A stack-based buffer overflow flaw was found in the way the PHP socket extension handled long AF_UNIX socket addresses. An attacker able to make a PHP script connect to a long AF_UNIX socket address could use this flaw to crash the PHP interpreter. Stack-based buffer overflow in the socket_connect function in ext/sockets/sockets.c in PHP 5.3.3 through 5.3.6 might allow context-dependent attackers to execute arbitrary code via a long pathname for a UNIX socket. The rfc1867_post_handler function in main/rfc1867.c in PHP before 5.3.7 does not properly restrict filenames in multipart/form-data POST requests, which allows remote attackers to conduct absolute path traversal attacks, and possibly create or overwrite arbitrary files, via a crafted upload request, related to a "file path injection vulnerability." An off-by-one flaw was found in PHP. If an attacker uploaded a file with a specially-crafted file name it could cause a PHP script to attempt to write a file to the root (/) directory. By default, PHP runs as the "apache" user, preventing it from writing to the root directory. The rfc1867_post_handler function in main/rfc1867.c in PHP before 5.3.7 does not properly restrict filenames in multipart/form-data POST requests, which allows remote attackers to conduct absolute path traversal attacks, and possibly create or overwrite arbitrary files, via a crafted upload request, related to a 'file path injection vulnerability.' Use-after-free vulnerability in the substr_replace function in PHP 5.3.6 and earlier allows context-dependent attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact by using the same variable for multiple arguments. A use-after-free flaw was found in the PHP substr_replace() function. If a PHP script used the same variable as multiple function arguments, a remote attacker could possibly use this to crash the PHP interpreter or, possibly, execute arbitrary code. **Affected Packages:** php **Issue Correction:** Run _yum update php_ to update your system. **New Packages:** i686:     php-cli-5.3.8-3.19.amzn1.i686     php-debuginfo-5.3.8-3.19.amzn1.i686     php-xml-5.3.8-3.19.amzn1.i686     php-soap-5.3.8-3.19.amzn1.i686     php-process-5.3.8-3.19.amzn1.i686     php-pspell-5.3.8-3.19.amzn1.i686     php-mysql-5.3.8-3.19.amzn1.i686     php-mssql-5.3.8-3.19.amzn1.i686     php-ldap-5.3.8-3.19.amzn1.i686     php-gd-5.3.8-3.19.amzn1.i686     php-fpm-5.3.8-3.19.amzn1.i686     php-devel-5.3.8-3.19.amzn1.i686     php-pgsql-5.3.8-3.19.amzn1.i686     php-5.3.8-3.19.amzn1.i686     php-dba-5.3.8-3.19.amzn1.i686     php-odbc-5.3.8-3.19.amzn1.i686     php-common-5.3.8-3.19.amzn1.i686     php-mcrypt-5.3.8-3.19.amzn1.i686     php-xmlrpc-5.3.8-3.19.amzn1.i686     php-tidy-5.3.8-3.19.amzn1.i686     php-bcmath-5.3.8-3.19.amzn1.i686     php-mbstring-5.3.8-3.19.amzn1.i686     php-pdo-5.3.8-3.19.amzn1.i686     php-intl-5.3.8-3.19.amzn1.i686     php-snmp-5.3.8-3.19.amzn1.i686     php-zts-5.3.8-3.19.amzn1.i686     php-imap-5.3.8-3.19.amzn1.i686     php-embedded-5.3.8-3.19.amzn1.i686 src:     php-5.3.8-3.19.amzn1.src x86_64:     php-dba-5.3.8-3.19.amzn1.x86_64     php-debuginfo-5.3.8-3.19.amzn1.x86_64     php-odbc-5.3.8-3.19.amzn1.x86_64     php-process-5.3.8-3.19.amzn1.x86_64     php-zts-5.3.8-3.19.amzn1.x86_64     php-common-5.3.8-3.19.amzn1.x86_64     php-pdo-5.3.8-3.19.amzn1.x86_64     php-mssql-5.3.8-3.19.amzn1.x86_64     php-mbstring-5.3.8-3.19.amzn1.x86_64     php-devel-5.3.8-3.19.amzn1.x86_64     php-cli-5.3.8-3.19.amzn1.x86_64     php-pspell-5.3.8-3.19.amzn1.x86_64     php-snmp-5.3.8-3.19.amzn1.x86_64     php-pgsql-5.3.8-3.19.amzn1.x86_64     php-soap-5.3.8-3.19.amzn1.x86_64     php-mcrypt-5.3.8-3.19.amzn1.x86_64     php-xmlrpc-5.3.8-3.19.amzn1.x86_64     php-xml-5.3.8-3.19.amzn1.x86_64     php-ldap-5.3.8-3.19.amzn1.x86_64     php-embedded-5.3.8-3.19.amzn1.x86_64     php-mysql-5.3.8-3.19.amzn1.x86_64     php-5.3.8-3.19.amzn1.x86_64     php-intl-5.3.8-3.19.amzn1.x86_64     php-bcmath-5.3.8-3.19.amzn1.x86_64     php-tidy-5.3.8-3.19.amzn1.x86_64     php-gd-5.3.8-3.19.amzn1.x86_64     php-fpm-5.3.8-3.19.amzn1.x86_64     php-imap-5.3.8-3.19.amzn1.x86_64 ### Additional References Red Hat: [CVE-2011-1148](<https://access.redhat.com/security/cve/CVE-2011-1148>), [CVE-2011-1938](<https://access.redhat.com/security/cve/CVE-2011-1938>), [CVE-2011-2202](<https://access.redhat.com/security/cve/CVE-2011-2202>), [CVE-2011-2483](<https://access.redhat.com/security/cve/CVE-2011-2483>), [CVE-2011-3182](<https://access.redhat.com/security/cve/CVE-2011-3182>), [CVE-2011-3379](<https://access.redhat.com/security/cve/CVE-2011-3379>) Mitre: [CVE-2011-1148](<https://vulners.com/cve/CVE-2011-1148>), [CVE-2011-1938](<https://vulners.com/cve/CVE-2011-1938>), [CVE-2011-2202](<https://vulners.com/cve/CVE-2011-2202>), [CVE-2011-2483](<https://vulners.com/cve/CVE-2011-2483>), [CVE-2011-3182](<https://vulners.com/cve/CVE-2011-3182>), [CVE-2011-3379](<https://vulners.com/cve/CVE-2011-3379>)


Affected Package


OS OS Version Package Name Package Version
Amazon Linux 1 php-cli 5.3.8-3.19.amzn1
Amazon Linux 1 php-debuginfo 5.3.8-3.19.amzn1
Amazon Linux 1 php-xml 5.3.8-3.19.amzn1
Amazon Linux 1 php-soap 5.3.8-3.19.amzn1
Amazon Linux 1 php-process 5.3.8-3.19.amzn1
Amazon Linux 1 php-pspell 5.3.8-3.19.amzn1
Amazon Linux 1 php-mysql 5.3.8-3.19.amzn1
Amazon Linux 1 php-mssql 5.3.8-3.19.amzn1
Amazon Linux 1 php-ldap 5.3.8-3.19.amzn1
Amazon Linux 1 php-gd 5.3.8-3.19.amzn1
Amazon Linux 1 php-fpm 5.3.8-3.19.amzn1
Amazon Linux 1 php-devel 5.3.8-3.19.amzn1
Amazon Linux 1 php-pgsql 5.3.8-3.19.amzn1
Amazon Linux 1 php 5.3.8-3.19.amzn1
Amazon Linux 1 php-dba 5.3.8-3.19.amzn1
Amazon Linux 1 php-odbc 5.3.8-3.19.amzn1
Amazon Linux 1 php-common 5.3.8-3.19.amzn1
Amazon Linux 1 php-mcrypt 5.3.8-3.19.amzn1
Amazon Linux 1 php-xmlrpc 5.3.8-3.19.amzn1
Amazon Linux 1 php-tidy 5.3.8-3.19.amzn1
Amazon Linux 1 php-bcmath 5.3.8-3.19.amzn1
Amazon Linux 1 php-mbstring 5.3.8-3.19.amzn1
Amazon Linux 1 php-pdo 5.3.8-3.19.amzn1
Amazon Linux 1 php-intl 5.3.8-3.19.amzn1
Amazon Linux 1 php-snmp 5.3.8-3.19.amzn1
Amazon Linux 1 php-zts 5.3.8-3.19.amzn1
Amazon Linux 1 php-imap 5.3.8-3.19.amzn1
Amazon Linux 1 php-embedded 5.3.8-3.19.amzn1
Amazon Linux 1 php 5.3.8-3.19.amzn1
Amazon Linux 1 php-dba 5.3.8-3.19.amzn1
Amazon Linux 1 php-debuginfo 5.3.8-3.19.amzn1
Amazon Linux 1 php-odbc 5.3.8-3.19.amzn1
Amazon Linux 1 php-process 5.3.8-3.19.amzn1
Amazon Linux 1 php-zts 5.3.8-3.19.amzn1
Amazon Linux 1 php-common 5.3.8-3.19.amzn1
Amazon Linux 1 php-pdo 5.3.8-3.19.amzn1
Amazon Linux 1 php-mssql 5.3.8-3.19.amzn1
Amazon Linux 1 php-mbstring 5.3.8-3.19.amzn1
Amazon Linux 1 php-devel 5.3.8-3.19.amzn1
Amazon Linux 1 php-cli 5.3.8-3.19.amzn1
Amazon Linux 1 php-pspell 5.3.8-3.19.amzn1
Amazon Linux 1 php-snmp 5.3.8-3.19.amzn1
Amazon Linux 1 php-pgsql 5.3.8-3.19.amzn1
Amazon Linux 1 php-soap 5.3.8-3.19.amzn1
Amazon Linux 1 php-mcrypt 5.3.8-3.19.amzn1
Amazon Linux 1 php-xmlrpc 5.3.8-3.19.amzn1
Amazon Linux 1 php-xml 5.3.8-3.19.amzn1
Amazon Linux 1 php-ldap 5.3.8-3.19.amzn1
Amazon Linux 1 php-embedded 5.3.8-3.19.amzn1
Amazon Linux 1 php-mysql 5.3.8-3.19.amzn1
Amazon Linux 1 php 5.3.8-3.19.amzn1
Amazon Linux 1 php-intl 5.3.8-3.19.amzn1
Amazon Linux 1 php-bcmath 5.3.8-3.19.amzn1
Amazon Linux 1 php-tidy 5.3.8-3.19.amzn1
Amazon Linux 1 php-gd 5.3.8-3.19.amzn1
Amazon Linux 1 php-fpm 5.3.8-3.19.amzn1
Amazon Linux 1 php-imap 5.3.8-3.19.amzn1

Related