vulnerabilities php [+solution]
Posted: Thu Dec 16, 2004 2:00 pm
For those that didnt know yet, and for those who take an interessed in it.
DESCRIPTION:
Multiple vulnerabilities have been reported in PHP, which can be
exploited to gain escalated privileges, bypass certain security
restrictions, gain knowledge of sensitive information, or compromise
a vulnerable system.
1) An integer overflow in the "pack()" function can be exploited to
cause a heap-based buffer overflow by passing some specially crafted
parameters to the function.
Successful exploitation bypasses the safe_mode feature and allows
execution of arbitrary code with the privileges of the web server.
2) An integer overflow in the "unpack()" function can be exploited to
leak information stored on the heap by passing specially crafted
parameters to the function.
In combination with the first vulnerability, this may also allow
bypassing of heap canary protection mechanisms.
3) An error within safe_mode when executing commands can be exploited
to bypass the safe_mode_exec_dir restriction by injecting shell
commands into the current directory name.
Successful exploitation requires that PHP runs on a multi-threaded
Unix web server.
4) An error in safe_mode combined with certain implementations of
"realpath()" can be exploited to bypass safe_mode via a specially
crafted file path.
5) An error within the handling of file paths may potentially lead to
file inclusion vulnerabilities. The problem is that "realpath()",
which in some implementations truncate filenames, is used in various
places to obtain the real path of a file.
6) Various errors within the deserialization code can be exploited to
disclose information or execute arbitrary code via specially crafted
strings passed to the "unserialize()" function.
7) An unspecified error in the "shmop_write()" function may result in
an attempt to write to an out-of-bounds memory location.
An unspecified error in the "addslashes()" function causes it to
not escape "\0" correctly.
9) An unspecified boundary error exists in the "exif_read_data()"
function when handling long section names.
10) An unspecified error within "magic_quotes_gpc" may allow a
one-level directory traversal when uploading files.
NOTE: Other potential security issues have also been reported.
SOLUTION:
Update to version 4.3.10 or 5.0.3.
DESCRIPTION:
Multiple vulnerabilities have been reported in PHP, which can be
exploited to gain escalated privileges, bypass certain security
restrictions, gain knowledge of sensitive information, or compromise
a vulnerable system.
1) An integer overflow in the "pack()" function can be exploited to
cause a heap-based buffer overflow by passing some specially crafted
parameters to the function.
Successful exploitation bypasses the safe_mode feature and allows
execution of arbitrary code with the privileges of the web server.
2) An integer overflow in the "unpack()" function can be exploited to
leak information stored on the heap by passing specially crafted
parameters to the function.
In combination with the first vulnerability, this may also allow
bypassing of heap canary protection mechanisms.
3) An error within safe_mode when executing commands can be exploited
to bypass the safe_mode_exec_dir restriction by injecting shell
commands into the current directory name.
Successful exploitation requires that PHP runs on a multi-threaded
Unix web server.
4) An error in safe_mode combined with certain implementations of
"realpath()" can be exploited to bypass safe_mode via a specially
crafted file path.
5) An error within the handling of file paths may potentially lead to
file inclusion vulnerabilities. The problem is that "realpath()",
which in some implementations truncate filenames, is used in various
places to obtain the real path of a file.
6) Various errors within the deserialization code can be exploited to
disclose information or execute arbitrary code via specially crafted
strings passed to the "unserialize()" function.
7) An unspecified error in the "shmop_write()" function may result in
an attempt to write to an out-of-bounds memory location.
not escape "\0" correctly.
9) An unspecified boundary error exists in the "exif_read_data()"
function when handling long section names.
10) An unspecified error within "magic_quotes_gpc" may allow a
one-level directory traversal when uploading files.
NOTE: Other potential security issues have also been reported.
SOLUTION:
Update to version 4.3.10 or 5.0.3.