Hash: SHA1
______________________________
Mandriva Linux Security Advisory MDVSA-2014:172
http://www.mandriva.com/en/
______________________________
Package : php
Date : September 3, 2014
Affected: Business Server 1.0
______________________________
Problem Description:
Multiple vulnerabilities has been discovered and corrected in php:
The gdImageCreateFromXpm function in gdxpm.c in libgd, as used in
PHP 5.4.26 and earlier, allows remote attackers to cause a denial
of service (NULL pointer dereference and application crash) via a
crafted color table in an XPM file (CVE-2014-2497).
file before 5.19 does not properly restrict the amount of data read
during a regex search, which allows remote attackers to cause a
denial of service (CPU consumption) via a crafted file that triggers
backtracking during processing of an awk rule. NOTE: this vulnerability
exists because of an incomplete fix for CVE-2013-7345 (CVE-2014-3538).
Integer overflow in the cdf_read_property_info function in cdf.c
in file through 5.19, as used in the Fileinfo component in PHP
before 5.4.32 and 5.5.x before 5.5.16, allows remote attackers to
cause a denial of service (application crash) via a crafted CDF
file. NOTE: this vulnerability exists because of an incomplete fix
for CVE-2012-1571 (CVE-2014-3587).
Multiple buffer overflows in the php_parserr function in
ext/standard/dns.c in PHP before 5.4.32 and 5.5.x before 5.5.16 allow
remote DNS servers to cause a denial of service (application crash)
or possibly execute arbitrary code via a crafted DNS record, related
to the dns_get_record function and the dn_expand function. NOTE:
this issue exists because of an incomplete fix for CVE-2014-4049
(CVE-2014-3597).
gd_ctx.c in the GD component in PHP 5.4.x before 5.4.32 and 5.5.x
before 5.5.16 does not ensure that pathnames lack \ sequences,
which might allow remote attackers to overwrite arbitrary files
via crafted input to an application that calls the (1) imagegd, (2)
imagegd2, (3) imagegif, (4) imagejpeg, (5) imagepng, (6) imagewbmp,
or (7) imagewebp function (CVE-2014-5120).
The updated php packages have been upgraded to the 5.5.16 version
resolve these security flaws.
Additionally, php-apc has been rebuilt against the updated php
packages and the php-timezonedb packages has been upgraded to the
2014.6 version.
______________________________
References:
http://cve.mitre.org/cgi-bin/
http://cve.mitre.org/cgi-bin/
http://cve.mitre.org/cgi-bin/
http://cve.mitre.org/cgi-bin/
http://cve.mitre.org/cgi-bin/
http://php.net/ChangeLog-5.
______________________________
Updated Packages:
Mandriva Business Server 1/X86_64:
433eb634fe50fe3ff86d436c049760
79d3cfc2a2058b85d14f26b5c4ca87
89f21a0c9d049f19afaf05924db29c
4d54db20660b9e69c4003ab3f6fbaa
2cbeda50f9676a164fdf71978840af
16e8f1aaca457fc59d1ab10f4987cb
28fad27392a15363870342e9c5554b
4831b8dcdedc1bfbd7672129480a84
5842d4359440f8f127187d3b214009
c2d69cd834c1fef68b6290b66cabcb
e3aadee16e901121a3e97ac37c89e4
e8fda909a56f6899b92d9723df2497
0752c9bcd5010e2804f9b90e20deb6
7c98733aafc0ed2e8f9c6f9eb4ab91
d222ee99d4211cff16fe1bcb72cb7d
3beb05cf9ac010ba4c4ef4bc4c27a4
47638df2d264ad2f964b98a8d49980
aeb17c94752bc571de7f9ff6260767
a80033111ac33a9da3b2d83c985022
f67911d7a2db9dde572efbdfe31117
2b75ea66721e2cd6a92b1eca104fdb
413d5216d02bf29b781a5e9d91e37b
50c06ad0eb94b45e71d042b8340a4e
95e4a1d6e68e45076e64ee2cf3573a
ec75d0814ea1ffe23339ee58e60f05
201cdd9e4de39be3027eedf10b49f9
bdf2832e051923f0e889d5df9723f0
55802406b502ee990e05fb39c7cda2
1de8d86ba7547663ef13ef4cb89eb3
3d3fbe17e9b815c335b1c52d583527
41740118f86130ba240e78fdd15f99
c5846e514fd3b883d643fe21778e1a
a3dcf8a6966183325cea9de32684cf
ba8927d9e38a24ebbab3387946825c
58014a1050c94f0ad9fbbe744c7b92
2d68e871d1947e8fe92c1378a9cf25
3ec5ddfb16e161a0ce1f4a3b7af693
598d588b909f19bee99e5f4477fd1d
cc224fa39dafe9366d2d1204bc957d
7f892b4b6887c3be7db91da3c4e124
960a2989cb5fda35c154d141fbef1b
fc4163872cc9a71f404bd2f213ce59
ca105e1b9d88d426e2477170f53a9b
d6cdd1d87b57425b9b75834faa9f81
4cce3105da5e33e0287a0c66bfc6ad
4f4ba24e39a2018a14fe439a252e12
0ab163003fd11610cb21ef3e81df2c
c1c70eba52274fe39880d13062db55
180bb8ed41b3d2ae5080c6e5b95775
7b0ba8398fa985b3f190e5474dc148
c7f7f7f48ac656e6f5e54fcd7127a6
1c40ca8fff58061d8dc8de435b43ad
fe775f45b9a3bdc8eafd5e9a0f6b74
6d844fba6fd8507e4cfc7f5e7ff4f0
9c9dd4875aab74bd499c1ebe5eff5d
c2845141985242c37ae6c19cdc493a
33c94af2772e7cce2a9600c381ad67
0128cc41371d6526afa9639b57d27c
b871c0b922535c32e0a76b04cae66a
f329458f3db86e8fb4fa059ad6a171
aeb2f714adc7bf2296717a7a426f42
14060c6616bdee4d0188a586c416b6
613df062eb4d347b1f20333fae292d
cec56e387e6ce4e2fa0a6e51edde77
64aa70974bdd2639ebe8f9411d5100
b49c9ce454cdc48df9f485afc76f40
6fdedd713c803782873b9394258c85
7c4760fd65a2de04f4531c75f0e3a9
29fd9f17d7c17753786013c4794856
a945405ae46da1076ef672e91480d6
d66a977cf51d7db4abc800dbc4fbb0
ab850aa37132b2999ad6c7e6eb83ee
4fb4296da210a539b1456dc2189964
4211f1c92e96005e07f233f13bc7d4
b70fc470a6b52a9ffd8e3194e42e75
9b56499519fac7535d5161a7f99ded
______________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/en/
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Komentarų nėra:
Rašyti komentarą