Advisories
Mandriva Advisories
|
![]() |
Problem Description |
A vulnerability was discovered in the transparent session ID support
in PHP4 prior to version 4.3.2. It did not properly escape user-
supplied input prior to inserting it in the generated web page. This
could be exploited by an attacker to execute embedded scripts within
the context of the generated HTML (CAN-2003-0442).
As well, two vulnerabilities had not been patched in the PHP packages
included with Mandrake Linux 8.2: The mail() function did not filter
ASCII control filters from its arguments, which could allow an attacker
to modify the mail message content (CAN-2002-0986). Another
vulnerability in the mail() function would allow a remote attacker to
bypass safe mode restrictions and modify the command line arguments
passed to the MTA in the fifth argument (CAN-2002-0985).
All users are encouraged to upgrade to these patched packages.
Updated Packages |
Mandrakelinux 8.2
a7ba8429a705ba764be5be5baa5d8f92 8.2/RPMS/php-4.1.2-1.1mdk.i586.rpm 848bd3bb74b2fa3b24d9a1f05ca651c2 8.2/RPMS/php-common-4.1.2-1.1mdk.i586.rpm 3b94f6e3e8ba24fa5b71fa93e3d2eb25 8.2/RPMS/php-devel-4.1.2-1.1mdk.i586.rpm 465bdb929c9df6bb156b2910a2a21b98 8.2/SRPMS/php-4.1.2-1.1mdk.src.rpm
Mandrakelinux 8.2/PPC
10fd0c4e0d65516654bee858d40b66af ppc/8.2/RPMS/php-4.1.2-1.1mdk.ppc.rpm d3f047831dc4b093eb30b8e343256207 ppc/8.2/RPMS/php-common-4.1.2-1.1mdk.ppc.rpm 96c4e2196b61066b6a57c013265ff612 ppc/8.2/RPMS/php-devel-4.1.2-1.1mdk.ppc.rpm 465bdb929c9df6bb156b2910a2a21b98 ppc/8.2/SRPMS/php-4.1.2-1.1mdk.src.rpm
Mandrakelinux 9.0
758b1a556caf000d93413eb8c15753c4 9.0/RPMS/php-4.2.3-4.1mdk.i586.rpm e1d95a181a57c88856f48171fd0d9cff 9.0/RPMS/php-common-4.2.3-4.1mdk.i586.rpm 60e292858ee79c53e429a141253fa388 9.0/RPMS/php-devel-4.2.3-4.1mdk.i586.rpm 5a1f0075209cb38b3fdba3eeaf785e25 9.0/RPMS/php-pear-4.2.3-4.1mdk.i586.rpm e509b58e93bf56cac67ccc698db40f51 9.0/SRPMS/php-4.2.3-4.1mdk.src.rpm
Mandrakelinux 9.1
6b619580c7746d6fb7de30e18ccbc8eb 9.1/RPMS/libphp_common430-430-11.1mdk.i586.rpm 2257ab6cab4132c3cb3d7194b24f385f 9.1/RPMS/php-cgi-4.3.1-11.1mdk.i586.rpm eefa69b71480d00a111e7ad05f74576a 9.1/RPMS/php-cli-4.3.1-11.1mdk.i586.rpm a60a59d10f0450b324f2b1b5562da780 9.1/RPMS/php430-devel-430-11.1mdk.i586.rpm e5e4397440f44a88bec02fc10328c745 9.1/SRPMS/php-4.3.1-11.1mdk.src.rpm
Mandrakelinux 9.1/PPC
6b619580c7746d6fb7de30e18ccbc8eb ppc/9.1/RPMS/libphp_common430-430-11.1mdk.i586.rpm 2257ab6cab4132c3cb3d7194b24f385f ppc/9.1/RPMS/php-cgi-4.3.1-11.1mdk.i586.rpm eefa69b71480d00a111e7ad05f74576a ppc/9.1/RPMS/php-cli-4.3.1-11.1mdk.i586.rpm a60a59d10f0450b324f2b1b5562da780 ppc/9.1/RPMS/php430-devel-430-11.1mdk.i586.rpm e5e4397440f44a88bec02fc10328c745 ppc/9.1/SRPMS/php-4.3.1-11.1mdk.src.rpm
Multi Network Firewall 8.2
848bd3bb74b2fa3b24d9a1f05ca651c2 mnf8.2/RPMS/php-common-4.1.2-1.1mdk.i586.rpm 465bdb929c9df6bb156b2910a2a21b98 mnf8.2/SRPMS/php-4.1.2-1.1mdk.src.rpm
Corporate Server 2.1
758b1a556caf000d93413eb8c15753c4 corporate/2.1/RPMS/php-4.2.3-4.1mdk.i586.rpm e1d95a181a57c88856f48171fd0d9cff corporate/2.1/RPMS/php-common-4.2.3-4.1mdk.i586.rpm 60e292858ee79c53e429a141253fa388 corporate/2.1/RPMS/php-devel-4.2.3-4.1mdk.i586.rpm 5a1f0075209cb38b3fdba3eeaf785e25 corporate/2.1/RPMS/php-pear-4.2.3-4.1mdk.i586.rpm e509b58e93bf56cac67ccc698db40f51 corporate/2.1/SRPMS/php-4.2.3-4.1mdk.src.rpm
Corporate Server 2.1/X86_64
5d16fe6239287e468dd75852cb43e6d3 x86_64/corporate/2.1/RPMS/php-4.2.3-4.1mdk.x86_64.rpm d712ce373cd416f7e523dba8b0171ccc x86_64/corporate/2.1/RPMS/php-common-4.2.3-4.1mdk.x86_64.rpm 51bd73c0704e20fac62d98e2380edb3e x86_64/corporate/2.1/RPMS/php-devel-4.2.3-4.1mdk.x86_64.rpm 06ef571267aaa0a2e614873d888dbb63 x86_64/corporate/2.1/RPMS/php-pear-4.2.3-4.1mdk.x86_64.rpm e509b58e93bf56cac67ccc698db40f51 x86_64/corporate/2.1/SRPMS/php-4.2.3-4.1mdk.src.rpm
References |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0442
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0985
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0986
Upgrade |
To upgrade automatically, use MandrivaUpdate.
Verification |
Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command :
rpm --checksig package.rpm
You can get the GPG public key of the Mandriva Security Team to verify the GPG signature of each RPM.
If you use MandrivaUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.