exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 26930

Secunia Security Advisory 26930
Posted Sep 25, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for php. This fixes some vulnerabilities, which can be exploited by malicious, local users to bypass certain security restrictions and by malicious people to bypass certain security restrictions and cause a DoS (Denial of Service).

tags | advisory, denial of service, local, php, vulnerability
systems | linux, fedora
SHA-256 | f458d57f892d1e4b72bc1c968130ea81ad93280334db276f67448cf6407865bb

Secunia Security Advisory 26930

Change Mirror Download


----------------------------------------------------------------------

Try a new way to discover vulnerabilities that ALREADY EXIST in your
IT infrastructure.

The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT
vulnerabilities in more than 4,700 different Windows applications.

Request your account, the Secunia Network Software Inspector (NSI):
http://secunia.com/network_software_inspector/

----------------------------------------------------------------------

TITLE:
Fedora update for php

SECUNIA ADVISORY ID:
SA26930

VERIFY ADVISORY:
http://secunia.com/advisories/26930/

CRITICAL:
Less critical

IMPACT:
Security Bypass, Exposure of sensitive information, DoS

WHERE:
>From remote

OPERATING SYSTEM:
Fedora Core 6
http://secunia.com/product/12487/

DESCRIPTION:
Fedora has issued an update for php. This fixes some vulnerabilities,
which can be exploited by malicious, local users to bypass certain
security restrictions and by malicious people to bypass certain
security restrictions and cause a DoS (Denial of Service).

For more information:
SA25378
SA25456
SA26642

SOLUTION:
Apply updated packages.

40617402ea17756914cc16cff8761708f4c84c8a
SRPMS/php-5.1.6-3.7.fc6.src.rpm
40617402ea17756914cc16cff8761708f4c84c8a
noarch/php-5.1.6-3.7.fc6.src.rpm
156a661d38364742764006f44e56c9db5a05a99c
ppc/php-soap-5.1.6-3.7.fc6.ppc.rpm
c6b3a2282c55e53ce402f389fb9d67ac0803abe4
ppc/php-common-5.1.6-3.7.fc6.ppc.rpm
3b26a05eb9ef1df3144b096957270b93e201c74a
ppc/php-mysql-5.1.6-3.7.fc6.ppc.rpm
1f66d45592fc6bbe44c44cd4352e92366d5504d0
ppc/php-xml-5.1.6-3.7.fc6.ppc.rpm
8bfa0fee16749a42cc181ad0c68f66ff5e08974c
ppc/php-bcmath-5.1.6-3.7.fc6.ppc.rpm
f6f7f8e99e028fb007cc3566620a00dd68f33731
ppc/php-odbc-5.1.6-3.7.fc6.ppc.rpm
87e606c35c72878af5625e884a57b44d0b731446
ppc/php-imap-5.1.6-3.7.fc6.ppc.rpm
3265cb00d4f29a37e6ea50cc8676fd4e5f75226d
ppc/php-mbstring-5.1.6-3.7.fc6.ppc.rpm
2da81f62336b2b3c241bc0fa424caeaa47a2d15a
ppc/php-pdo-5.1.6-3.7.fc6.ppc.rpm
4066cee3f7a00a4cd59225210d9e4cfae6d2d1cd
ppc/php-ldap-5.1.6-3.7.fc6.ppc.rpm
dcef339b4b7b21e58fbe65c79046e7d1b7c62739
ppc/php-cli-5.1.6-3.7.fc6.ppc.rpm
b8d1be39ee2913152baa65a79c3bb0927a0a91bc
ppc/debug/php-debuginfo-5.1.6-3.7.fc6.ppc.rpm
68d3da614e1e0bae323fc0f0a0ec053366f16b44
ppc/php-5.1.6-3.7.fc6.ppc.rpm
e4ed88cee8ca8ba54d10b01a3640e6281475b9ad
ppc/php-pgsql-5.1.6-3.7.fc6.ppc.rpm
ea20e1498063bc81abd19a96b8132ca7977b4762
ppc/php-dba-5.1.6-3.7.fc6.ppc.rpm
3869a097c54388ff5141b54a0ce00b8d452b1550
ppc/php-ncurses-5.1.6-3.7.fc6.ppc.rpm
355f42e6b1abbf0305cd9c70717972c25d8c0892
ppc/php-gd-5.1.6-3.7.fc6.ppc.rpm
b7c5c5b4752ca070eb8156d22b62cac5da4861bb
ppc/php-xmlrpc-5.1.6-3.7.fc6.ppc.rpm
c8e1a662404d18cd5a13206facc260a6069f2af4
ppc/php-devel-5.1.6-3.7.fc6.ppc.rpm
06cc862f246a47aa7c27a96b7be16244fd5bdde9
ppc/php-snmp-5.1.6-3.7.fc6.ppc.rpm
85d7ec4dfdb1b3beef121e133924aa930cbffda6
x86_64/debug/php-debuginfo-5.1.6-3.7.fc6.x86_64.rpm
c67c441e4e16f650c17b50529c3d55ef6d3cca2b
x86_64/php-mbstring-5.1.6-3.7.fc6.x86_64.rpm
c68cac45c3fb12cd4e0df49d92c6f1abea9874a0
x86_64/php-ncurses-5.1.6-3.7.fc6.x86_64.rpm
e42bf18d61e54ef1383072aa0dda6fd2ea9a72a3
x86_64/php-pgsql-5.1.6-3.7.fc6.x86_64.rpm
4e1fabe888a68c928c7f9a621d6a852a31b28e6a
x86_64/php-soap-5.1.6-3.7.fc6.x86_64.rpm
7651ee688a52120680ce2c19af23e13c8b9ed71a
x86_64/php-common-5.1.6-3.7.fc6.x86_64.rpm
b3ebec5c12f86a139ab64e1dd82e954f1f9ca17f
x86_64/php-dba-5.1.6-3.7.fc6.x86_64.rpm
c4e64f31b419370aa3810c78bc48736592f16184
x86_64/php-snmp-5.1.6-3.7.fc6.x86_64.rpm
53f65efacbc81e43f6cef52abf6052a28cd45958
x86_64/php-bcmath-5.1.6-3.7.fc6.x86_64.rpm
7becddfd2c95ad56704b8296c31ffb7d54a38f38
x86_64/php-xmlrpc-5.1.6-3.7.fc6.x86_64.rpm
efc10eebadf9cb94056669bddad2c84b9e9bd011
x86_64/php-devel-5.1.6-3.7.fc6.x86_64.rpm
ec7541ab90abd13e2e864bfa6f20c1571aa9ae55
x86_64/php-mysql-5.1.6-3.7.fc6.x86_64.rpm
9a1992e0ee196ba9533d5a83d15b8b10a18b58ee
x86_64/php-pdo-5.1.6-3.7.fc6.x86_64.rpm
1b1e3f81fd29a55021d1e2b5771ce6843d5fdd01
x86_64/php-gd-5.1.6-3.7.fc6.x86_64.rpm
a46df7dc6a38714fbd415574fbd71adc04384045
x86_64/php-ldap-5.1.6-3.7.fc6.x86_64.rpm
670f6464f884e1d54ebd2f5435161bb060912783
x86_64/php-imap-5.1.6-3.7.fc6.x86_64.rpm
476a85431df1f50ee9e1e93e7fb61c6f96c1483a
x86_64/php-odbc-5.1.6-3.7.fc6.x86_64.rpm
1f72d6e4b1739c955d6a543aaac4551646339247
x86_64/php-5.1.6-3.7.fc6.x86_64.rpm
b22272c21f4cb2ffbb77c76a1e8179ff287c02cb
x86_64/php-xml-5.1.6-3.7.fc6.x86_64.rpm
50d95bc2e0d5f69b14a779e74b69a1359cdbeff8
x86_64/php-cli-5.1.6-3.7.fc6.x86_64.rpm
8082b5f587e1a3b4e4430dbfe03b48da84c203a6
i386/php-snmp-5.1.6-3.7.fc6.i386.rpm
ea4786a52946c06b74100007de098297023e6cf0
i386/php-cli-5.1.6-3.7.fc6.i386.rpm
9096476c1f2c589d05b9d084433687caea0c8f3a
i386/php-mysql-5.1.6-3.7.fc6.i386.rpm
c2d4bd9640548aeef84479fb67de178f929905e9
i386/php-ncurses-5.1.6-3.7.fc6.i386.rpm
78a5544aefbb098f415fdd6683cd1780038230d3
i386/php-5.1.6-3.7.fc6.i386.rpm
f820783d03577edfe99b8e978527f2b73facfc3b
i386/php-ldap-5.1.6-3.7.fc6.i386.rpm
267039177c0206641343e6e57352687d1a66c897
i386/php-common-5.1.6-3.7.fc6.i386.rpm
3cfc1e8e5d933ecf3cf91a07cde8b30821ed8abb
i386/php-gd-5.1.6-3.7.fc6.i386.rpm
a5eca01f44a0bcf2e600527bd3c3edb868c891ba
i386/debug/php-debuginfo-5.1.6-3.7.fc6.i386.rpm
abd19d5e783596bea6790b4ccd705257948ca26c
i386/php-pdo-5.1.6-3.7.fc6.i386.rpm
e49960b6f3d2298ffb8fc9c70e2d0954771473a3
i386/php-soap-5.1.6-3.7.fc6.i386.rpm
ee4062f0368332b52fcd9a4c6fd64fca294207aa
i386/php-odbc-5.1.6-3.7.fc6.i386.rpm
65792f15eaa6a886813eb7c23f5e9a3fc2fc3471
i386/php-xml-5.1.6-3.7.fc6.i386.rpm
b33bcaa6f6ce51ec09985ce72d3ab3818299620e
i386/php-imap-5.1.6-3.7.fc6.i386.rpm
3bb5affd1bc6c5986deaa8b48efe6e866d399459
i386/php-bcmath-5.1.6-3.7.fc6.i386.rpm
412ace8bd9bc18b2a8495d70b853c492b086d9e2
i386/php-devel-5.1.6-3.7.fc6.i386.rpm
9f89a7ac45c773d8e34ce0a3dc32316c0ff5d35e
i386/php-pgsql-5.1.6-3.7.fc6.i386.rpm
9435ba4ffa9cc8d09554bbd0a58a9cba008f0492
i386/php-xmlrpc-5.1.6-3.7.fc6.i386.rpm
570069b5849458383238d3b96ab74f43e12dd1dc
i386/php-mbstring-5.1.6-3.7.fc6.i386.rpm
e5c834f592f44e433a6d444d6489b0c551636a16
i386/php-dba-5.1.6-3.7.fc6.i386.rpm

ORIGINAL ADVISORY:
https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00354.html

OTHER REFERENCES:
SA25378:
http://secunia.com/advisories/25378/

SA25456:
http://secunia.com/advisories/25456/

SA26642:
http://secunia.com/advisories/26642/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close