Lucene search

K
centosCentOS ProjectCESA-2005:405
HistoryApr 28, 2005 - 10:58 p.m.

php security update

2005-04-2822:58:33
CentOS Project
lists.centos.org
50

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.108 Low

EPSS

Percentile

95.0%

CentOS Errata and Security Advisory CESA-2005:405

PHP is an HTML-embedded scripting language commonly used with the Apache
HTTP Web server.

A bug was found in the way PHP processes IFF and JPEG images. It is
possible to cause PHP to consume CPU resources for a short period of time
by supplying a carefully crafted IFF or JPEG image. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the
names CAN-2005-0524 and CAN-2005-0525 to these issues.

A buffer overflow bug was also found in the way PHP processes EXIF image
headers. It is possible for an attacker to construct an image file in such
a way that it could execute arbitrary instructions when processed by PHP.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CAN-2005-1042 to this issue.

A denial of service bug was found in the way PHP processes EXIF image
headers. It is possible for an attacker to cause PHP to enter an infinite
loop for a short period of time by supplying a carefully crafted image file
to PHP for processing. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CAN-2005-1043 to this issue.

Several bug fixes are also included in this update:

  • The security fixes in RHSA-2004-687 to the “unserializer” code introduced
    some performance issues.

  • In the gd extension, the “imagecopymerge” function did not correctly
    handle transparency. The original image was being obscured in the
    resultant image.

  • In the curl extension, safe mode was not enforced for ‘file:///’ URL
    lookups (CAN-2004-1392).

Users of PHP should upgrade to these updated packages, which contain
backported fixes for these issues.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2005-April/073775.html
https://lists.centos.org/pipermail/centos-announce/2005-April/073776.html
https://lists.centos.org/pipermail/centos-announce/2005-April/073777.html
https://lists.centos.org/pipermail/centos-announce/2005-April/073778.html

Affected packages:
php
php-devel
php-imap
php-ldap
php-mysql
php-odbc
php-pgsql

Upstream details at:
https://access.redhat.com/errata/RHSA-2005:405

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.108 Low

EPSS

Percentile

95.0%

Related for CESA-2005:405