logo
DATABASE RESOURCES PRICING ABOUT US

php5 - several vulnerabilities

Description

Several remote vulnerabilities have been discovered in PHP 5, an hypertext preprocessor. The Common Vulnerabilities and Exposures project identifies the following problems: * [CVE-2010-1917](https://security-tracker.debian.org/tracker/CVE-2010-1917) The fnmatch function can be abused to conduct denial of service attacks (by crashing the interpreter) by the means of a stack overflow. * [CVE-2010-2225](https://security-tracker.debian.org/tracker/CVE-2010-2225) The SplObjectStorage unserializer allows attackers to execute arbitrary code via serialized data by the means of a use-after-free vulnerability. * [CVE-2010-3065](https://security-tracker.debian.org/tracker/CVE-2010-3065) The default sessions serializer does not correctly handle a special marker, which allows an attacker to inject arbitrary variables into the session and possibly exploit vulnerabilities in the unserializer. * [CVE-2010-1128](https://security-tracker.debian.org/tracker/CVE-2010-1128) For this vulnerability (predictable entropy for the Linear Congruential Generator used to generate session ids) we do not consider upstream's solution to be sufficient. It is recommended to uncomment the session.entropy\_file and session.entropy\_length settings in the php.ini files. Further improvements can be achieved by setting session.hash\_function to 1 (one) and incrementing the value of session.entropy\_length. For the stable distribution (lenny), these problems have been fixed in version 5.2.6.dfsg.1-1+lenny9. For the testing distribution (squeeze) and the unstable distribution (sid), these problems will be fixed soon. We recommend that you upgrade your php5 packages.


Affected Software


CPE Name Name Version
php5 5.2.6.dfsg.1-1+lenny2
php5 5.2.6.dfsg.1-1+lenny3
php5 5.2.6.dfsg.1-1+lenny4
php5 5.2.6.dfsg.1-1+lenny6
php5 5.2.6.dfsg.1-1+lenny8

Related