-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - -------------------------------------------------------------------------- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -------------------------------------------------------------------------- PACKAGE : php4 SUMMARY : Fix for php4 vulnerability DATE : 2005-07-14 10:44:00 ID : CLA-2005:980 RELEVANT RELEASES : 9, 10 - ------------------------------------------------------------------------- DESCRIPTION PHP[1] is a very popular scripting language used by web servers to offer dynamic content. This announcement fixes a XML_RPC vulnerability[2] that allows remote attackers to execute arbitrary PHP code via an XML file, which is not properly sanitized before being used in an eval statement. SOLUTION It is recommended that all PHP4 users upgrade their packages. IMPORTANT: If PHP4 is being used as an Apache module, the web server has to be restarted after the upgrade if it was already running. To do so, please run, as root: # service httpd stop (wait a few seconds and check with "ps ax|grep httpd" if there are any httpd processes running. On a busy webserver this could take a little longer.) # service httpd start REFERENCES 1.http://www.php.net/ 2.http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1921 UPDATED PACKAGES ftp://atualizacoes.conectiva.com.br/10/SRPMS/php4-4.3.11-72720U10_13cl.src.rpm ftp://atualizacoes.conectiva.com.br/10/RPMS/php4-4.3.11-72720U10_13cl.i386.rpm ftp://atualizacoes.conectiva.com.br/10/RPMS/php4-dba-4.3.11-72720U10_13cl.i386.rpm ftp://atualizacoes.conectiva.com.br/10/RPMS/php4-devel-4.3.11-72720U10_13cl.i386.rpm ftp://atualizacoes.conectiva.com.br/10/RPMS/php4-doc-4.3.11-72720U10_13cl.i386.rpm ftp://atualizacoes.conectiva.com.br/10/RPMS/php4-doc-es-4.3.11-72720U10_13cl.i386.rpm ftp://atualizacoes.conectiva.com.br/10/RPMS/php4-doc-pt_BR-4.3.11-72720U10_13cl.i386.rpm ftp://atualizacoes.conectiva.com.br/10/RPMS/php4-imap-4.3.11-72720U10_13cl.i386.rpm ftp://atualizacoes.conectiva.com.br/10/RPMS/php4-ldap-4.3.11-72720U10_13cl.i386.rpm ftp://atualizacoes.conectiva.com.br/10/RPMS/php4-mcrypt-4.3.11-72720U10_13cl.i386.rpm ftp://atualizacoes.conectiva.com.br/10/RPMS/php4-mhash-4.3.11-72720U10_13cl.i386.rpm ftp://atualizacoes.conectiva.com.br/10/RPMS/php4-mnogosearch-4.3.11-72720U10_13cl.i386.rpm ftp://atualizacoes.conectiva.com.br/10/RPMS/php4-mssql-4.3.11-72720U10_13cl.i386.rpm ftp://atualizacoes.conectiva.com.br/10/RPMS/php4-mysql-4.3.11-72720U10_13cl.i386.rpm ftp://atualizacoes.conectiva.com.br/10/RPMS/php4-odbc-4.3.11-72720U10_13cl.i386.rpm ftp://atualizacoes.conectiva.com.br/10/RPMS/php4-pgsql-4.3.11-72720U10_13cl.i386.rpm ftp://atualizacoes.conectiva.com.br/10/RPMS/php4-snmp-4.3.11-72720U10_13cl.i386.rpm ftp://atualizacoes.conectiva.com.br/10/RPMS/php4-sybase-4.3.11-72720U10_13cl.i386.rpm ftp://atualizacoes.conectiva.com.br/10/RPMS/php4-sybase-ct-4.3.11-72720U10_13cl.i386.rpm ftp://atualizacoes.conectiva.com.br/9/SRPMS/php4-4.3.11-27009U90_10cl.src.rpm ftp://atualizacoes.conectiva.com.br/9/RPMS/php4-4.3.11-27009U90_10cl.i386.rpm ftp://atualizacoes.conectiva.com.br/9/RPMS/php4-devel-4.3.11-27009U90_10cl.i386.rpm ftp://atualizacoes.conectiva.com.br/9/RPMS/php4-doc-4.3.11-27009U90_10cl.i386.rpm ftp://atualizacoes.conectiva.com.br/9/RPMS/php4-doc-es-4.3.11-27009U90_10cl.i386.rpm ftp://atualizacoes.conectiva.com.br/9/RPMS/php4-doc-pt_BR-4.3.11-27009U90_10cl.i386.rpm ftp://atualizacoes.conectiva.com.br/9/RPMS/php4-imap-4.3.11-27009U90_10cl.i386.rpm ftp://atualizacoes.conectiva.com.br/9/RPMS/php4-ldap-4.3.11-27009U90_10cl.i386.rpm ftp://atualizacoes.conectiva.com.br/9/RPMS/php4-mcrypt-4.3.11-27009U90_10cl.i386.rpm ftp://atualizacoes.conectiva.com.br/9/RPMS/php4-mysql-4.3.11-27009U90_10cl.i386.rpm ftp://atualizacoes.conectiva.com.br/9/RPMS/php4-odbc-4.3.11-27009U90_10cl.i386.rpm ftp://atualizacoes.conectiva.com.br/9/RPMS/php4-pgsql-4.3.11-27009U90_10cl.i386.rpm ftp://atualizacoes.conectiva.com.br/9/RPMS/php4-snmp-4.3.11-27009U90_10cl.i386.rpm ADDITIONAL INSTRUCTIONS The apt tool can be used to perform RPM packages upgrades: - run: apt-get update - after that, execute: apt-get upgrade Detailed instructions regarding the use of apt and upgrade examples can be found at http://distro.conectiva.com.br/atualizacoes/#apt?idioma=en - ------------------------------------------------------------------------- All packages are signed with Conectiva's GPG key. The key and instructions on how to import it can be found at http://distro.conectiva.com.br/seguranca/chave/?idioma=en Instructions on how to check the signatures of the RPM packages can be found at http://distro.conectiva.com.br/seguranca/politica/?idioma=en - ------------------------------------------------------------------------- All our advisories and generic update instructions can be viewed at http://distro.conectiva.com.br/atualizacoes/?idioma=en - ------------------------------------------------------------------------- Copyright (c) 2004 Conectiva Inc. http://www.conectiva.com - ------------------------------------------------------------------------- subscribe: conectiva-updates-subscribe@xxxxxxxxxxxxxxxxxxxxxxxxxxx unsubscribe: conectiva-updates-unsubscribe@xxxxxxxxxxxxxxxxxxxxxxxxxxx -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (GNU/Linux) Comment: For info see http://www.gnupg.org iD8DBQFC1mxg42jd0JmAcZARAkPKAKC42kHg4TlBN3xEgfoh/SYcY9++kgCgxzZt Mi4I5n+hxLNkJeg9sPuFN+o= =hzC9 -----END PGP SIGNATURE----- ______________________________________________________________________ subscribe: conectiva-updates-subscribe@xxxxxxxxxxxxxxxxxxxxxxxxxxx unsubscribe: conectiva-updates-unsubscribe@xxxxxxxxxxxxxxxxxxxxxxxxxxx