Lucene search

K
centosCentOS ProjectCESA-2012:0093
HistoryFeb 03, 2012 - 1:41 a.m.

php security update

2012-02-0301:41:17
CentOS Project
lists.centos.org
49

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.879 High

EPSS

Percentile

98.6%

CentOS Errata and Security Advisory CESA-2012:0093

PHP is an HTML-embedded scripting language commonly used with the Apache
HTTP Server.

It was discovered that the fix for CVE-2011-4885 (released via
RHSA-2012:0071, RHSA-2012:0033, and RHSA-2012:0019 for php packages in Red
Hat Enterprise Linux 4, 5, and 6 respectively) introduced an uninitialized
memory use flaw. A remote attacker could send a specially-crafted HTTP
request to cause the PHP interpreter to crash or, possibly, execute
arbitrary code. (CVE-2012-0830)

All php users should upgrade to these updated packages, which contain a
backported patch to resolve this issue. After installing the updated
packages, the httpd daemon must be restarted for the update to take effect.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2012-February/080577.html
https://lists.centos.org/pipermail/centos-announce/2012-February/080580.html
https://lists.centos.org/pipermail/centos-announce/2012-February/080582.html

Affected packages:
php
php-bcmath
php-cli
php-common
php-dba
php-devel
php-domxml
php-embedded
php-enchant
php-gd
php-imap
php-intl
php-ldap
php-mbstring
php-mysql
php-ncurses
php-odbc
php-pdo
php-pear
php-pgsql
php-process
php-pspell
php-recode
php-snmp
php-soap
php-tidy
php-xml
php-xmlrpc
php-zts

Upstream details at:
https://access.redhat.com/errata/RHSA-2012:0093

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.879 High

EPSS

Percentile

98.6%