-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - -------------------------------------------------------------------------- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -------------------------------------------------------------------------- PACKAGE : php4 SUMMARY : Safe mode bypass and other vulnerabilities DATE : 2002-11-13 20:17:00 ID : CLA-2002:545 RELEVANT RELEASES : 6.0, 7.0, 8 - ------------------------------------------------------------------------- DESCRIPTION PHP[1] is a very popular scripting language used by web servers to offer dynamic content. This update addresses the following issues: 1) Safe mode bypass vulnerability[3] Wojciech Purczynski <cliph@isec.pl> reported[2] a vulnerability in the mail() function which could be used to bypass PHP's safe mode setting and execute any program as if this mode was not enabled. Since PHP 4.0.5, the mail() function has a fifth parameter which is used to pass additional command line parameters to the sendmail binary. It is possible to use this parameter to change the behaviour of sendmail and use it to execute arbitrary programs or scripts. The updated PHP packages disallow the use of this fifth parameter if safe mode is in use. This vulnerability affects Conectiva Linux 7.0 and 8 if safe mode is in use. Conectiva Linux 6.0 was shipped with an earlier version of PHP which does not have this parameter. 2) Control characters injection[4] Wojciech Purczynski <cliph@isec.pl> also reported that it is possible to insert ASCII control characters (such as '\n') in the text supplied as parameter to the mail() function. Depending on how the PHP script handles user input (wheter it is filtered or not, and how), this could be used to add other mail headers to the message. This vulnerability affects PHP4 and PHP3. The fix applied to the packages listed here change such characters, if found in the "subject" or "to" parameter, to a white space (" "). In a similar way, other functions such as fopen() also accept control characters in their parameters. This is now also being filtered, and such characters are being changed to "_" (underscore). 3) Old file upload vulnerability[4][6] While preparing the updates for the above issues, it has come to our attention that the PHP3 packages in Conectiva Linux 7.0 were not updated regarding the file upload vulnerability which was addressed in the CLSA-2002:468[6] advisory. PHP4 is the default PHP package for that distribution and PHP3 was shipped in the second CD only for backwards compatibility. The PHP3 packages for CL 7.0 have now been fixed. SOLUTION It is recommended that all PHP users upgrade their packages. IMPORTANT: if PHP is being used as an Apache module, the web server has to be restarted after the upgrade if it was already running. To do so, please run, as root: service httpd stop (wait a few seconds and check with "ps ax|grep httpd" if there are any httpd processes running. On a busy webserver this could take a little longer.) service httpd start REFERENCES 1.http://www.php.net/ 2.http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0985 3.http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0986 4.http://online.securityfocus.com/bid/4183 5.http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000468&idioma=en DIRECT DOWNLOAD LINKS TO THE UPDATED PACKAGES ftp://atualizacoes.conectiva.com.br/6.0/SRPMS/mod_php3-3.0.18-9U60_2cl.src.rpm ftp://atualizacoes.conectiva.com.br/6.0/SRPMS/php4-4.0.4pl1-2U60_3cl.src.rpm ftp://atualizacoes.conectiva.com.br/6.0/RPMS/php4-4.0.4pl1-2U60_3cl.i386.rpm ftp://atualizacoes.conectiva.com.br/6.0/RPMS/mod_php3-3.0.18-9U60_2cl.i386.rpm ftp://atualizacoes.conectiva.com.br/6.0/RPMS/mod_php3-doc-3.0.18-9U60_2cl.i386.rpm ftp://atualizacoes.conectiva.com.br/6.0/RPMS/mod_php3-gd-3.0.18-9U60_2cl.i386.rpm ftp://atualizacoes.conectiva.com.br/6.0/RPMS/mod_php3-imap-3.0.18-9U60_2cl.i386.rpm ftp://atualizacoes.conectiva.com.br/6.0/RPMS/mod_php3-ldap-3.0.18-9U60_2cl.i386.rpm ftp://atualizacoes.conectiva.com.br/6.0/RPMS/mod_php3-mysql-3.0.18-9U60_2cl.i386.rpm ftp://atualizacoes.conectiva.com.br/6.0/RPMS/mod_php3-pgsql-3.0.18-9U60_2cl.i386.rpm ftp://atualizacoes.conectiva.com.br/6.0/RPMS/mod_php3-xml-3.0.18-9U60_2cl.i386.rpm ftp://atualizacoes.conectiva.com.br/6.0/RPMS/mod_php4-4.0.4pl1-2U60_3cl.i386.rpm ftp://atualizacoes.conectiva.com.br/6.0/RPMS/php3-cgi-3.0.18-9U60_2cl.i386.rpm ftp://atualizacoes.conectiva.com.br/6.0/RPMS/php3-cgi-gd-3.0.18-9U60_2cl.i386.rpm ftp://atualizacoes.conectiva.com.br/6.0/RPMS/php3-cgi-imap-3.0.18-9U60_2cl.i386.rpm ftp://atualizacoes.conectiva.com.br/6.0/RPMS/php3-cgi-ldap-3.0.18-9U60_2cl.i386.rpm ftp://atualizacoes.conectiva.com.br/6.0/RPMS/php3-cgi-mysql-3.0.18-9U60_2cl.i386.rpm ftp://atualizacoes.conectiva.com.br/6.0/RPMS/php3-cgi-pgsql-3.0.18-9U60_2cl.i386.rpm ftp://atualizacoes.conectiva.com.br/6.0/RPMS/php3-cgi-xml-3.0.18-9U60_2cl.i386.rpm ftp://atualizacoes.conectiva.com.br/6.0/RPMS/php4-doc-4.0.4pl1-2U60_3cl.i386.rpm ftp://atualizacoes.conectiva.com.br/6.0/RPMS/php4-imap-4.0.4pl1-2U60_3cl.i386.rpm ftp://atualizacoes.conectiva.com.br/6.0/RPMS/php4-ldap-4.0.4pl1-2U60_3cl.i386.rpm ftp://atualizacoes.conectiva.com.br/6.0/RPMS/php4-mysql-4.0.4pl1-2U60_3cl.i386.rpm ftp://atualizacoes.conectiva.com.br/6.0/RPMS/php4-pgsql-4.0.4pl1-2U60_3cl.i386.rpm ftp://atualizacoes.conectiva.com.br/7.0/RPMS/php4-4.1.1-1U70_5cl.i386.rpm ftp://atualizacoes.conectiva.com.br/7.0/RPMS/mod_php4-4.1.1-1U70_5cl.i386.rpm ftp://atualizacoes.conectiva.com.br/7.0/RPMS/php4-devel-4.1.1-1U70_5cl.i386.rpm ftp://atualizacoes.conectiva.com.br/7.0/RPMS/php4-doc-4.1.1-1U70_5cl.i386.rpm ftp://atualizacoes.conectiva.com.br/7.0/RPMS/php4-imap-4.1.1-1U70_5cl.i386.rpm ftp://atualizacoes.conectiva.com.br/7.0/RPMS/php4-ldap-4.1.1-1U70_5cl.i386.rpm ftp://atualizacoes.conectiva.com.br/7.0/RPMS/php4-mysql-4.1.1-1U70_5cl.i386.rpm ftp://atualizacoes.conectiva.com.br/7.0/RPMS/php4-odbc-4.1.1-1U70_5cl.i386.rpm ftp://atualizacoes.conectiva.com.br/7.0/RPMS/php4-pgsql-4.1.1-1U70_5cl.i386.rpm ftp://atualizacoes.conectiva.com.br/7.0/SRPMS/php4-4.1.1-1U70_5cl.src.rpm ftp://atualizacoes.conectiva.com.br/7.0/RPMS/mod_php3-3.0.18-10U70_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/7.0/RPMS/mod_php3-doc-3.0.18-10U70_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/7.0/RPMS/mod_php3-gd-3.0.18-10U70_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/7.0/RPMS/mod_php3-imap-3.0.18-10U70_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/7.0/RPMS/mod_php3-ldap-3.0.18-10U70_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/7.0/RPMS/mod_php3-mysql-3.0.18-10U70_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/7.0/RPMS/mod_php3-pgsql-3.0.18-10U70_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/7.0/RPMS/php3-cgi-3.0.18-10U70_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/7.0/RPMS/mod_php3-xml-3.0.18-10U70_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/7.0/RPMS/php3-cgi-gd-3.0.18-10U70_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/7.0/RPMS/php3-cgi-imap-3.0.18-10U70_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/7.0/RPMS/php3-cgi-ldap-3.0.18-10U70_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/7.0/RPMS/php3-cgi-mysql-3.0.18-10U70_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/7.0/RPMS/php3-cgi-pgsql-3.0.18-10U70_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/7.0/RPMS/php3-cgi-xml-3.0.18-10U70_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/7.0/RPMS/mod_php3-3.0.18-10U70_1cl.src.rpm ftp://atualizacoes.conectiva.com.br/7.0/SRPMS/mod_php3-3.0.18-10U70_1cl.src.rpm ftp://atualizacoes.conectiva.com.br/8/SRPMS/php4-4.1.1-7U80_1cl.src.rpm ftp://atualizacoes.conectiva.com.br/8/RPMS/mod_php4-4.1.1-7U80_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/8/RPMS/php4-4.1.1-7U80_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/8/RPMS/php4-devel-4.1.1-7U80_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/8/RPMS/php4-doc-4.1.1-7U80_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/8/RPMS/php4-imap-4.1.1-7U80_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/8/RPMS/php4-ldap-4.1.1-7U80_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/8/RPMS/php4-mysql-4.1.1-7U80_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/8/RPMS/php4-odbc-4.1.1-7U80_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/8/RPMS/php4-pgsql-4.1.1-7U80_1cl.i386.rpm ADDITIONAL INSTRUCTIONS Users of Conectiva Linux version 6.0 or higher may use apt to perform upgrades of RPM packages: - add the following line to /etc/apt/sources.list if it is not there yet (you may also use linuxconf to do this): rpm [cncbr] ftp://atualizacoes.conectiva.com.br 6.0/conectiva updates (replace 6.0 with the correct version number if you are not running CL6.0) - run: apt-get update - after that, execute: apt-get upgrade Detailed instructions reagarding the use of apt and upgrade examples can be found at http://distro.conectiva.com.br/atualizacoes/#apt?idioma=en - ------------------------------------------------------------------------- All packages are signed with Conectiva's GPG key. The key and instructions on how to import it can be found at http://distro.conectiva.com.br/seguranca/chave/?idioma=en Instructions on how to check the signatures of the RPM packages can be found at http://distro.conectiva.com.br/seguranca/politica/?idioma=en - ------------------------------------------------------------------------- All our advisories and generic update instructions can be viewed at http://distro.conectiva.com.br/atualizacoes/?idioma=en - ------------------------------------------------------------------------- subscribe: conectiva-updates-subscribe@papaleguas.conectiva.com.br unsubscribe: conectiva-updates-unsubscribe@papaleguas.conectiva.com.br -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (GNU/Linux) Comment: For info see http://www.gnupg.org iD8DBQE90s+242jd0JmAcZARAp7jAKDDmZ8V355UcYVoMDhwJUSR7WsyKQCeOTue y4MQkf/o/JYnpHgkwUnNJvs= =nsaG -----END PGP SIGNATURE-----