vulnerabilities php [+solution]

Ye' old general discussion board. Basically, for everything that isn't covered elsewhere. Come here to shoot the breeze, shoot your mouth off, or whatever suits your fancy.
This forum is not for asking programming related questions.

Moderator: General Moderators

Post Reply
User avatar
ol4pr0
Forum Regular
Posts: 926
Joined: Thu Jan 08, 2004 11:22 am
Location: ecuador

vulnerabilities php [+solution]

Post by ol4pr0 »

For those that didnt know yet, and for those who take an interessed in it.

DESCRIPTION:
Multiple vulnerabilities have been reported in PHP, which can be
exploited to gain escalated privileges, bypass certain security
restrictions, gain knowledge of sensitive information, or compromise
a vulnerable system.

1) An integer overflow in the "pack()" function can be exploited to
cause a heap-based buffer overflow by passing some specially crafted
parameters to the function.

Successful exploitation bypasses the safe_mode feature and allows
execution of arbitrary code with the privileges of the web server.

2) An integer overflow in the "unpack()" function can be exploited to
leak information stored on the heap by passing specially crafted
parameters to the function.

In combination with the first vulnerability, this may also allow
bypassing of heap canary protection mechanisms.

3) An error within safe_mode when executing commands can be exploited
to bypass the safe_mode_exec_dir restriction by injecting shell
commands into the current directory name.

Successful exploitation requires that PHP runs on a multi-threaded
Unix web server.

4) An error in safe_mode combined with certain implementations of
"realpath()" can be exploited to bypass safe_mode via a specially
crafted file path.

5) An error within the handling of file paths may potentially lead to
file inclusion vulnerabilities. The problem is that "realpath()",
which in some implementations truncate filenames, is used in various
places to obtain the real path of a file.

6) Various errors within the deserialization code can be exploited to
disclose information or execute arbitrary code via specially crafted
strings passed to the "unserialize()" function.

7) An unspecified error in the "shmop_write()" function may result in
an attempt to write to an out-of-bounds memory location.

8) An unspecified error in the "addslashes()" function causes it to
not escape "\0" correctly.

9) An unspecified boundary error exists in the "exif_read_data()"
function when handling long section names.

10) An unspecified error within "magic_quotes_gpc" may allow a
one-level directory traversal when uploading files.

NOTE: Other potential security issues have also been reported.

SOLUTION:
Update to version 4.3.10 or 5.0.3.
User avatar
Weirdan
Moderator
Posts: 5978
Joined: Mon Nov 03, 2003 6:13 pm
Location: Odessa, Ukraine

Post by Weirdan »

It's already posted here.
Post Reply