what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Mandriva Linux Security Advisory 2006.028

Mandriva Linux Security Advisory 2006.028
Posted Feb 2, 2006
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - Multiple response splitting vulnerabilities in PHP allow remote attackers to inject arbitrary HTTP headers via unknown attack vectors, possibly involving a crafted Set-Cookie header, related to the session extension (aka ext/session) and the header function. Multiple cross-site scripting (XSS) vulnerabilities in PHP allow remote attackers to inject arbitrary web script or HTML via unknown attack vectors in certain error conditions.

tags | advisory, remote, web, arbitrary, php, vulnerability, xss
systems | linux, mandriva
advisories | CVE-2006-0207, CVE-2006-0208
SHA-256 | c98385883dccd198b6d3864905ce4577e8f33952b37da51c5c40bcbe9a83eb70

Mandriva Linux Security Advisory 2006.028

Change Mirror Download

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDKSA-2006:028
http://www.mandriva.com/security/
_______________________________________________________________________

Package : php
Date : February 1, 2006
Affected: 10.1, 10.2, 2006.0, Corporate 2.1, Corporate 3.0,
Multi Network Firewall 2.0
_______________________________________________________________________

Problem Description:

Multiple response splitting vulnerabilities in PHP allow remote attackers to
inject arbitrary HTTP headers via unknown attack vectors, possibly involving a
crafted Set-Cookie header, related to the (1) session extension
(aka ext/session) and the (2) header function. (CVE-2006-0207)

Multiple cross-site scripting (XSS) vulnerabilities in PHP allow remote
attackers to inject arbitrary web script or HTML via unknown attack vectors in
"certain error conditions." (CVE-2006-0208). This issue does not affect
Corporate Server 2.1.

Updated packages are patched to address these issues. Users must execute
"service httpd restart" for the new PHP modules to be loaded by Apache.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0207
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0208
_______________________________________________________________________

Updated Packages:

Mandriva Linux 10.1:
df01c3861affe2f3e1c889018bb2bdbf 10.1/RPMS/libphp_common432-4.3.8-3.7.101mdk.i586.rpm
f9df1052bc1f6ce85a3bbb5ec544b077 10.1/RPMS/php432-devel-4.3.8-3.7.101mdk.i586.rpm
3be049c85f40f7051f3cf1e44b165485 10.1/RPMS/php-cgi-4.3.8-3.7.101mdk.i586.rpm
de903ca3c9126f451f48d71e30042066 10.1/RPMS/php-cli-4.3.8-3.7.101mdk.i586.rpm
d697297c4330d93379848b2f3ea5b59c 10.1/SRPMS/php-4.3.8-3.7.101mdk.src.rpm

Mandriva Linux 10.1/X86_64:
c9123a9203fd795b7445c2d54b2e0e65 x86_64/10.1/RPMS/lib64php_common432-4.3.8-3.7.101mdk.x86_64.rpm
a8ec659d640715f2cbe8ec5b93868de2 x86_64/10.1/RPMS/php432-devel-4.3.8-3.7.101mdk.x86_64.rpm
76ff7da663400e000c148d5562540097 x86_64/10.1/RPMS/php-cgi-4.3.8-3.7.101mdk.x86_64.rpm
d4c84cc9cf9325560e641f20040579ee x86_64/10.1/RPMS/php-cli-4.3.8-3.7.101mdk.x86_64.rpm
d697297c4330d93379848b2f3ea5b59c x86_64/10.1/SRPMS/php-4.3.8-3.7.101mdk.src.rpm

Mandriva Linux 10.2:
fb20504431c87a13d3dccc44a14cc8fb 10.2/RPMS/libphp_common432-4.3.10-7.5.102mdk.i586.rpm
a4a9a3e923ad9fb3364cb40fc65d4dda 10.2/RPMS/php432-devel-4.3.10-7.5.102mdk.i586.rpm
603deaacb7e29fbb89c45bbedc5669dd 10.2/RPMS/php-cgi-4.3.10-7.5.102mdk.i586.rpm
80c2c8841acd4119ef49be89c0fcc2d0 10.2/RPMS/php-cli-4.3.10-7.5.102mdk.i586.rpm
7e608b7cc03ac505f9a118f75fd62d25 10.2/SRPMS/php-4.3.10-7.5.102mdk.src.rpm

Mandriva Linux 10.2/X86_64:
17a7eb595d3d46d7a5aaface597c8667 x86_64/10.2/RPMS/lib64php_common432-4.3.10-7.5.102mdk.x86_64.rpm
b1e1b44ebdefde1f92fd4067f8dbabf5 x86_64/10.2/RPMS/php432-devel-4.3.10-7.5.102mdk.x86_64.rpm
778fa2d2adaf31a8cb7e31dbd808066e x86_64/10.2/RPMS/php-cgi-4.3.10-7.5.102mdk.x86_64.rpm
d02642564aa38691a881194c2662d98c x86_64/10.2/RPMS/php-cli-4.3.10-7.5.102mdk.x86_64.rpm
7e608b7cc03ac505f9a118f75fd62d25 x86_64/10.2/SRPMS/php-4.3.10-7.5.102mdk.src.rpm

Mandriva Linux 2006.0:
f2b7973428979dd09f52accd547568da 2006.0/RPMS/libphp5_common5-5.0.4-9.3.20060mdk.i586.rpm
5f4d832f023ab7a89ef0100bf84f5287 2006.0/RPMS/php-cgi-5.0.4-9.3.20060mdk.i586.rpm
2670bb765568506f6747a73974939c07 2006.0/RPMS/php-cli-5.0.4-9.3.20060mdk.i586.rpm
379cda215916c997a1dc2dbd5fb2620c 2006.0/RPMS/php-devel-5.0.4-9.3.20060mdk.i586.rpm
ca8db2763cf64ea2bac4322ee9cca899 2006.0/RPMS/php-fcgi-5.0.4-9.3.20060mdk.i586.rpm
92af673ab17df4b7dfe7fdebee76a48b 2006.0/SRPMS/php-5.0.4-9.3.20060mdk.src.rpm

Mandriva Linux 2006.0/X86_64:
f3d43c707c9a8d5cec75bafcb78e6ab1 x86_64/2006.0/RPMS/lib64php5_common5-5.0.4-9.3.20060mdk.x86_64.rpm
2f94a04a14fe62fae94111b6cb684ece x86_64/2006.0/RPMS/php-cgi-5.0.4-9.3.20060mdk.x86_64.rpm
4ede0e512810b584bed25e09fca6ba4a x86_64/2006.0/RPMS/php-cli-5.0.4-9.3.20060mdk.x86_64.rpm
f172b4c76fcf58cd9dc090a25103f6a5 x86_64/2006.0/RPMS/php-devel-5.0.4-9.3.20060mdk.x86_64.rpm
79efe6cf1c641439fe1bbd4e75b8fc4f x86_64/2006.0/RPMS/php-fcgi-5.0.4-9.3.20060mdk.x86_64.rpm
92af673ab17df4b7dfe7fdebee76a48b x86_64/2006.0/SRPMS/php-5.0.4-9.3.20060mdk.src.rpm

Corporate Server 2.1:
09f5076909971d5604836d7b9ea9fd45 corporate/2.1/RPMS/php-4.2.3-4.7.C21mdk.i586.rpm
8c035441a66315b1eff8b17312c3a930 corporate/2.1/RPMS/php-common-4.2.3-4.7.C21mdk.i586.rpm
c6f1fd24fe3e8f1ab43dcac22606486f corporate/2.1/RPMS/php-devel-4.2.3-4.7.C21mdk.i586.rpm
86819061809b349bd18566a406273570 corporate/2.1/RPMS/php-pear-4.2.3-4.7.C21mdk.i586.rpm
7dd951360a264bf5866d065a00d5238f corporate/2.1/SRPMS/php-4.2.3-4.7.C21mdk.src.rpm

Corporate Server 2.1/X86_64:
37b27434d1c44f27d8c277ae564b936e x86_64/corporate/2.1/RPMS/php-4.2.3-4.7.C21mdk.x86_64.rpm
6136563a8257ef44180ca6b4401901f6 x86_64/corporate/2.1/RPMS/php-common-4.2.3-4.7.C21mdk.x86_64.rpm
bbdb1dbdda2d70b035ef466443bfc422 x86_64/corporate/2.1/RPMS/php-devel-4.2.3-4.7.C21mdk.x86_64.rpm
5d44bf1bfea2cf67b4d8e89199163451 x86_64/corporate/2.1/RPMS/php-pear-4.2.3-4.7.C21mdk.x86_64.rpm
7dd951360a264bf5866d065a00d5238f x86_64/corporate/2.1/SRPMS/php-4.2.3-4.7.C21mdk.src.rpm

Corporate 3.0:
f888ebc54f82378b18d93215be73d644 corporate/3.0/RPMS/libphp_common432-4.3.4-4.9.C30mdk.i586.rpm
1b24d7a3868b0ad3447306d68278ea9a corporate/3.0/RPMS/php432-devel-4.3.4-4.9.C30mdk.i586.rpm
5bc5839d0a2747b4752af35136e198e7 corporate/3.0/RPMS/php-cgi-4.3.4-4.9.C30mdk.i586.rpm
d78925d4af67aa5485e5b46c41989b9c corporate/3.0/RPMS/php-cli-4.3.4-4.9.C30mdk.i586.rpm
27ef8f959b0f289b57762ff27a5ac80b corporate/3.0/SRPMS/php-4.3.4-4.9.C30mdk.src.rpm

Corporate 3.0/X86_64:
9bed4b632f00c11be8a5ad2f18f55856 x86_64/corporate/3.0/RPMS/lib64php_common432-4.3.4-4.9.C30mdk.x86_64.rpm
46f077064f5f9c200fda31f35975a16c x86_64/corporate/3.0/RPMS/php432-devel-4.3.4-4.9.C30mdk.x86_64.rpm
ed1e1bba020c45e77f29193925639e2e x86_64/corporate/3.0/RPMS/php-cgi-4.3.4-4.9.C30mdk.x86_64.rpm
6bdd852998838bc68e15bd336aedd197 x86_64/corporate/3.0/RPMS/php-cli-4.3.4-4.9.C30mdk.x86_64.rpm
27ef8f959b0f289b57762ff27a5ac80b x86_64/corporate/3.0/SRPMS/php-4.3.4-4.9.C30mdk.src.rpm

Multi Network Firewall 2.0:
5addfadc57bce90e16b99fa09c8223d0 mnf/2.0/RPMS/libphp_common432-4.3.4-4.9.M20mdk.i586.rpm
68ebbc08d9225e65e7760a98a440fc50 mnf/2.0/RPMS/php432-devel-4.3.4-4.9.M20mdk.i586.rpm
c3e1085df6f3e9802d25c31201f91004 mnf/2.0/RPMS/php-cgi-4.3.4-4.9.M20mdk.i586.rpm
ae86a53032acd9d82f9dbfba561a173c mnf/2.0/RPMS/php-cli-4.3.4-4.9.M20mdk.i586.rpm
01bd5e9d8cb5520e29a9dec0358c1ecd mnf/2.0/SRPMS/php-4.3.4-4.9.M20mdk.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQFD4QVimqjQ0CJFipgRAvw9AKCIQsnG6F29XOIxOyP8+Nbz5UjTcgCfQGp8
C2vb3/bapIAQwAjWIDWy/tM=
=1kiW
-----END PGP SIGNATURE-----

Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close