Lucene search

K
centosCentOS ProjectCESA-2011:0196
HistoryApr 14, 2011 - 11:48 p.m.

php53 security update

2011-04-1423:48:18
CentOS Project
lists.centos.org
52

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.078 Low

EPSS

Percentile

94.2%

CentOS Errata and Security Advisory CESA-2011:0196

PHP is an HTML-embedded scripting language commonly used with the Apache
HTTP Server.

A flaw was found in the way PHP converted certain floating point values
from string representation to a number. If a PHP script evaluated an
attacker’s input in a numeric context, the PHP interpreter could cause high
CPU usage until the script execution time limit is reached. This issue only
affected i386 systems. (CVE-2010-4645)

A stack memory exhaustion flaw was found in the way the PHP filter_var()
function validated email addresses. An attacker could use this flaw to
crash the PHP interpreter by providing excessively long input to be
validated as an email address. (CVE-2010-3710)

A memory disclosure flaw was found in the PHP multi-byte string extension.
If the mb_strcut() function was called with a length argument exceeding the
input string size, the function could disclose a portion of the PHP
interpreter’s memory. (CVE-2010-4156)

All php53 users should upgrade to these updated packages, which contain
backported patches to resolve these issues. After installing the updated
packages, the httpd daemon must be restarted for the update to take effect.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2011-April/079541.html
https://lists.centos.org/pipermail/centos-announce/2011-April/079542.html

Affected packages:
php53
php53-bcmath
php53-cli
php53-common
php53-dba
php53-devel
php53-gd
php53-imap
php53-intl
php53-ldap
php53-mbstring
php53-mysql
php53-odbc
php53-pdo
php53-pgsql
php53-process
php53-pspell
php53-snmp
php53-soap
php53-xml
php53-xmlrpc

Upstream details at:
https://access.redhat.com/errata/RHSA-2011:0196

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.078 Low

EPSS

Percentile

94.2%