Lucene search

K
centosCentOS ProjectCESA-2012:0019
HistoryJan 11, 2012 - 7:19 p.m.

php, php53 security update

2012-01-1119:19:36
CentOS Project
lists.centos.org
79

CVSS2

6.4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:N/A:P

EPSS

0.882

Percentile

98.7%

CentOS Errata and Security Advisory CESA-2012:0019

PHP is an HTML-embedded scripting language commonly used with the Apache
HTTP Server.

It was found that the hashing routine used by PHP arrays was susceptible
to predictable hash collisions. If an HTTP POST request to a PHP
application contained many parameters whose names map to the same hash
value, a large amount of CPU time would be consumed. This flaw has been
mitigated by adding a new configuration directive, max_input_vars, that
limits the maximum number of parameters processed per request. By
default, max_input_vars is set to 1000. (CVE-2011-4885)

An integer overflow flaw was found in the PHP exif extension. On 32-bit
systems, a specially-crafted image file could cause the PHP interpreter to
crash or disclose portions of its memory when a PHP script tries to extract
Exchangeable image file format (Exif) metadata from the image file.
(CVE-2011-4566)

Red Hat would like to thank oCERT for reporting CVE-2011-4885. oCERT
acknowledges Julian Walde and Alexander Klink as the original reporters of
CVE-2011-4885.

All php53 and php users should upgrade to these updated packages, which
contain backported patches to resolve these issues. After installing the
updated packages, the httpd daemon must be restarted for the update to take
effect.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2012-January/080534.html
https://lists.centos.org/pipermail/centos-announce/2012-January/080535.html

Affected packages:
php
php-bcmath
php-cli
php-common
php-dba
php-devel
php-embedded
php-enchant
php-gd
php-imap
php-intl
php-ldap
php-mbstring
php-mysql
php-odbc
php-pdo
php-pgsql
php-process
php-pspell
php-recode
php-snmp
php-soap
php-tidy
php-xml
php-xmlrpc
php-zts
php53
php53-bcmath
php53-cli
php53-common
php53-dba
php53-devel
php53-gd
php53-imap
php53-intl
php53-ldap
php53-mbstring
php53-mysql
php53-odbc
php53-pdo
php53-pgsql
php53-process
php53-pspell
php53-snmp
php53-soap
php53-xml
php53-xmlrpc

Upstream details at:
https://access.redhat.com/errata/RHSA-2012:0019

CVSS2

6.4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:N/A:P

EPSS

0.882

Percentile

98.7%