Package name php
Date July 13th, 2006
Advisory ID MDKSA-2006:122
Affected versions CS3.0, MNF2.0, 10.2, 2006.0
Synopsis Updated php packages fix multiple vulnerabilities

Problem Description

Multiple buffer overflows in the gd graphics library (libgd) 2.0.21 and
earlier may allow remote attackers to execute arbitrary code via
malformed image files that trigger the overflows due to improper calls
to the gdMalloc function. One instance in gd_io_dp.c does not appear to
be corrected in the embedded copy of GD used in php to build the php-gd
package. (CVE-2004-0941)

Integer overflows were reported in the GD Graphics Library (libgd)
2.0.28, and possibly other versions. These overflows allow remote
attackers to cause a denial of service and possibly execute arbitrary
code via PNG image files with large image rows values that lead to a
heap-based buffer overflow in the gdImageCreateFromPngCtx() function.
PHP, as packaged in Mandriva Linux, contains an embedded copy of the
GD library, used to build the php-gd package. (CVE-2004-0990)

The c-client library 2000, 2001, or 2004 for PHP 3.x, 4.x, and 5.x,
when used in applications that accept user-controlled input for the
mailbox argument to the imap_open function, allow remote attackers to
obtain access to an IMAP stream data structure and conduct unauthorized
IMAP actions. (CVE-2006-1017)

Integer overflow in the wordwrap function in string.c in might allow
context-dependent attackers to execute arbitrary code via certain long
arguments that cause a small buffer to be allocated, which triggers a
heap-based buffer overflow in a memcpy function call, a different
vulnerability than CVE-2002-1396. (CVE-2006-1990) The previous update
for this issue did not resolve the issue on 64bit platforms.

The cURL library (libcurl) in PHP 4.4.2 and 5.1.4 allows attackers to
bypass safe mode and read files via a file:// request containing nul
characters. (CVE-2006-2563)

Buffer consumption vulnerability in the tempnam function in PHP 5.1.4
and 4.x before 4.4.3 allows local users to bypass restrictions and
create PHP files with fixed names in other directories via a pathname
argument longer than MAXPATHLEN, which prevents a unique string from
being appended to the filename. (CVE-2006-2660)

The LZW decoding in the gdImageCreateFromGifPtr function in the Thomas
Boutell graphics draw (GD) library (aka libgd) 2.0.33 allows remote
attackers to cause a denial of service (CPU consumption) via malformed
GIF data that causes an infinite loop. PHP, as packaged in Mandriva
Linux, contains an embedded copy of the GD library, used to build the
php-gd package. (CVE-2006-2906)

The error_log function in PHP allows local users to bypass safe mode
and open_basedir restrictions via a "php://" or other scheme in the
third argument, which disables safe mode. (CVE-2006-3011)

An unspecified vulnerability in session.c in PHP before 5.1.3 has
unknown impact and attack vectors, related to "certain characters in
session names", including special characters that are frequently
associated with CRLF injection, SQL injection, and cross-site scripting
(XSS) vulnerabilities. NOTE: while the nature of the vulnerability is
unspecified, it is likely that this is related to a violation of an
expectation by PHP applications that the session name is alphanumeric,
as implied in the PHP manual for session_name(). (CVE-2006-3016)

An unspecified vulnerability in PHP before 5.1.3 can prevent a variable
from being unset even when the unset function is called, which might
cause the variable's value to be used in security-relevant operations.
(CVE-2006-3017)

An unspecified vulnerability in the session extension functionality in
PHP before 5.1.3 has unkown impact and attack vectors related to heap
corruption. (CVE-2006-3018)

Multiple heap-based buffer overflows in the (1) str_repeat and (2) wordwrap
functions in ext/standard/string.c in PHP before 5.1.5, when used on a
64-bit system, have unspecified impact and attack vectors, a different
vulnerability than CVE-2006-1990. (CVE-2006-4482)

The cURL extension files (1) ext/curl/interface.c and (2) ext/curl/streams.c
in PHP before 5.1.5 permit the CURLOPT_FOLLOWLOCATION option when open_basedir
or safe_mode is enabled, which allows attackers to perform unauthorized
actions, possibly related to the realpath cache. (CVE-2006-4483)

Unspecified vulnerability in PHP before 5.1.6, when running on a 64-bit
system, has unknown impact and attack vectors related to the memory_limit
restriction. (CVE-2006-4486)

The GD related issues (CVE-2004-0941, CVE-2004-0990, CVE-2006-2906)
affect only Corporate 3 and Mandrake Network Firewall 2.

The php-curl issues (CVE-2006-2563, CVE-2006-4483) affect only Mandriva 2006.0.

Updated packages have been patched to address all these issues. Once
these packages have been installed, you will need to restart Apache
(service httpd restart) in order for the changes to take effect.

Updated Packages

Corporate Server 3.0

 8bfc40ebf399d5742075eeb33c1a8a72  corporate/3.0/RPMS/libphp_common432-4.3.4-4.18.C30mdk.i586.rpm
 ea00cd47c8a866b07c6081a8e1a3475b  corporate/3.0/RPMS/php432-devel-4.3.4-4.18.C30mdk.i586.rpm
 cfc50d1bc5aaf96760938648d8f30715  corporate/3.0/RPMS/php-cgi-4.3.4-4.18.C30mdk.i586.rpm
 66b65fce45465361ead9272a8fc6146d  corporate/3.0/RPMS/php-cli-4.3.4-4.18.C30mdk.i586.rpm
 219f2fa835442a1b4f3fab1cf9433de7  corporate/3.0/RPMS/php-gd-4.3.4-1.3.C30mdk.i586.rpm
 6d3b9ba8bc1dcb77f00308e54dc2ab64  corporate/3.0/RPMS/php-imap-4.3.4-1.3.C30mdk.i586.rpm
 6ec95f80b1f1cf3644847b1c83c33a16  corporate/3.0/SRPMS/php-4.3.4-4.18.C30mdk.src.rpm
 37bada32aaafa6e85e936543a2a28b9b  corporate/3.0/SRPMS/php-gd-4.3.4-1.3.C30mdk.src.rpm
 d5b7b08aa1cff8aba9d3e6c011529d33  corporate/3.0/SRPMS/php-imap-4.3.4-1.3.C30mdk.src.rpm

Corporate Server 3.0/X86_64

 e46dc14256b5ad29c193c9701aed8e71  x86_64/corporate/3.0/RPMS/lib64php_common432-4.3.4-4.18.C30mdk.x86_64.rpm
 03b90618d19cfe790148a9f2f57985ba  x86_64/corporate/3.0/RPMS/php432-devel-4.3.4-4.18.C30mdk.x86_64.rpm
 f9fc560f573ab7911abe22db70decdca  x86_64/corporate/3.0/RPMS/php-cgi-4.3.4-4.18.C30mdk.x86_64.rpm
 eb9b7e8f2cc0eea84d0fe599bd93c902  x86_64/corporate/3.0/RPMS/php-cli-4.3.4-4.18.C30mdk.x86_64.rpm
 338e3f7c9c0a022a0512e7ef8252d37c  x86_64/corporate/3.0/RPMS/php-gd-4.3.4-1.3.C30mdk.x86_64.rpm
 e054fe6114520c57b5e9f991a362e313  x86_64/corporate/3.0/RPMS/php-imap-4.3.4-1.3.C30mdk.x86_64.rpm
 6ec95f80b1f1cf3644847b1c83c33a16  x86_64/corporate/3.0/SRPMS/php-4.3.4-4.18.C30mdk.src.rpm
 37bada32aaafa6e85e936543a2a28b9b  x86_64/corporate/3.0/SRPMS/php-gd-4.3.4-1.3.C30mdk.src.rpm
 d5b7b08aa1cff8aba9d3e6c011529d33  x86_64/corporate/3.0/SRPMS/php-imap-4.3.4-1.3.C30mdk.src.rpm

Multi Network Firewall 2.0

 be0aa10810884606a6378a340b170438  mnf/2.0/RPMS/libphp_common432-4.3.4-4.18.M20mdk.i586.rpm
 ef8fac6784866d24b16fb9bbf15069a9  mnf/2.0/RPMS/php432-devel-4.3.4-4.18.M20mdk.i586.rpm
 8132b0cdc8bfb94d7e3d4e0712eae5cc  mnf/2.0/RPMS/php-cgi-4.3.4-4.18.M20mdk.i586.rpm
 5783b1dc5c2f5ac6d3392d284ca5e42e  mnf/2.0/RPMS/php-cli-4.3.4-4.18.M20mdk.i586.rpm
 d88b4c66f31f707bb46098658497876f  mnf/2.0/RPMS/php-gd-4.3.4-1.3.M20mdk.i586.rpm
 0b563d4b740e9d5d21d1eb6464fc573b  mnf/2.0/SRPMS/php-4.3.4-4.18.M20mdk.src.rpm
 05b34d21c7d168fcbb4404dbe08f45ac  mnf/2.0/SRPMS/php-gd-4.3.4-1.3.M20mdk.src.rpm

Mandriva Linux LE2005

 78c38db9594e6f378a541d8656a348cd  10.2/RPMS/libphp_common432-4.3.10-7.14.102mdk.i586.rpm
 20874c0f88c0eabb71227562e7b76d99  10.2/RPMS/php432-devel-4.3.10-7.14.102mdk.i586.rpm
 959e27855da01eeda3bce928b81a505e  10.2/RPMS/php-cgi-4.3.10-7.14.102mdk.i586.rpm
 af8f5d5d30248a0dceeb5f477f243521  10.2/RPMS/php-cli-4.3.10-7.14.102mdk.i586.rpm
 3490de40093a12603e1fa2e52fe44936  10.2/RPMS/php-imap-4.3.10-6.3.102mdk.i586.rpm
 ed6c4147816b189ba23131f30246a953  10.2/SRPMS/php-4.3.10-7.14.102mdk.src.rpm
 396e14746eb0f291e212b2d53bea520c  10.2/SRPMS/php-imap-4.3.10-6.3.102mdk.src.rpm

Mandriva Linux LE2005/X86_64

 aea78fff707fcf9313f8ea705fe49304  x86_64/10.2/RPMS/lib64php_common432-4.3.10-7.14.102mdk.x86_64.rpm
 24825f38408b5e17ddb030cb6cafbebc  x86_64/10.2/RPMS/php432-devel-4.3.10-7.14.102mdk.x86_64.rpm
 c01955be46b9ee3c01f34cd3ff96fdd5  x86_64/10.2/RPMS/php-cgi-4.3.10-7.14.102mdk.x86_64.rpm
 7b0ea6ea8a37f89fa00240a88d667a13  x86_64/10.2/RPMS/php-cli-4.3.10-7.14.102mdk.x86_64.rpm
 3f2f4c714be10ca1931be7fab5f16ed7  x86_64/10.2/RPMS/php-imap-4.3.10-6.3.102mdk.x86_64.rpm
 ed6c4147816b189ba23131f30246a953  x86_64/10.2/SRPMS/php-4.3.10-7.14.102mdk.src.rpm
 396e14746eb0f291e212b2d53bea520c  x86_64/10.2/SRPMS/php-imap-4.3.10-6.3.102mdk.src.rpm

Mandriva Linux 2006

 ac3a35ac0db18fe07aed82c55bc9495c  2006.0/RPMS/libphp5_common5-5.0.4-9.12.20060mdk.i586.rpm
 eddf792e9ac30c60ba29967469c94721  2006.0/RPMS/php-cgi-5.0.4-9.12.20060mdk.i586.rpm
 7ad40230e703fb0dbddb9b6b864305de  2006.0/RPMS/php-cli-5.0.4-9.12.20060mdk.i586.rpm
 847ea3aa279af20470a4e4fc0ccefc7f  2006.0/RPMS/php-curl-5.0.4-1.3.20060mdk.i586.rpm
 e81718f6e31cb7aced9d2ff7462c0b80  2006.0/RPMS/php-devel-5.0.4-9.12.20060mdk.i586.rpm
 188757b3e34afb445a288f4156232b77  2006.0/RPMS/php-fcgi-5.0.4-9.12.20060mdk.i586.rpm
 b8487a338e7c0be6baf08f3231169574  2006.0/RPMS/php-imap-5.0.4-2.3.20060mdk.i586.rpm
 cdda5acab01891036e955b4b89509552  2006.0/SRPMS/php-5.0.4-9.12.20060mdk.src.rpm
 6f59b73dc4ad989fc1cf82981a78447b  2006.0/SRPMS/php-curl-5.0.4-1.3.20060mdk.src.rpm
 1ca1cd0433f93e7a5338d265e5fe31a1  2006.0/SRPMS/php-imap-5.0.4-2.3.20060mdk.src.rpm

Mandriva Linux 2006/X86_64

 91133e3df28354e321a52b868605f5b4  x86_64/2006.0/RPMS/lib64php5_common5-5.0.4-9.12.20060mdk.x86_64.rpm
 348350bfa9bb17ac01b574d1ce53e212  x86_64/2006.0/RPMS/php-cgi-5.0.4-9.12.20060mdk.x86_64.rpm
 c33ab51b3b82a33140625c1dda6ed397  x86_64/2006.0/RPMS/php-cli-5.0.4-9.12.20060mdk.x86_64.rpm
 070e8e1f3d4a5035cd2ca7b4b9dc6f61  x86_64/2006.0/RPMS/php-curl-5.0.4-1.3.20060mdk.x86_64.rpm
 d1cae6289e3625693902b52730dbf95f  x86_64/2006.0/RPMS/php-devel-5.0.4-9.12.20060mdk.x86_64.rpm
 e8ae1224fab30562d7d66c981893897c  x86_64/2006.0/RPMS/php-fcgi-5.0.4-9.12.20060mdk.x86_64.rpm
 991c3a4f7cb708aa3c2f9ef4b525017e  x86_64/2006.0/RPMS/php-imap-5.0.4-2.3.20060mdk.x86_64.rpm
 cdda5acab01891036e955b4b89509552  x86_64/2006.0/SRPMS/php-5.0.4-9.12.20060mdk.src.rpm
 6f59b73dc4ad989fc1cf82981a78447b  x86_64/2006.0/SRPMS/php-curl-5.0.4-1.3.20060mdk.src.rpm
 1ca1cd0433f93e7a5338d265e5fe31a1  x86_64/2006.0/SRPMS/php-imap-5.0.4-2.3.20060mdk.src.rpm

References

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3018
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3017
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3016
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3011
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2906
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2660
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2563
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1990
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1017
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0990
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0941
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4482
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4483
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4486

Upgrade

To upgrade automatically, use MandrivaUpdate.


Verification

Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command :

                rpm --checksig package.rpm
                

You can get the GPG public key of the Mandriva Security Team to verify the GPG signature of each RPM.

If you use MandrivaUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.