Jump to content

Advisories MDVSA-2010:007: php


paul
 Share

Recommended Posts

Multiple vulnerabilities has been found and corrected in php:

 

The (1) htmlentities and (2) htmlspecialchars functions in PHP before

5.2.5 accept partial multibyte sequences, which has unknown impact and

attack vectors, a different issue than CVE-2006-5465 (CVE-2007-5898).

 

The zend_restore_ini_entry_cb function in zend_ini.c in PHP 5.3.0,

5.2.10, and earlier versions allows context-specific attackers to

obtain sensitive information (memory contents) and cause a PHP crash

by using the ini_set function to declare a variable, then using the

ini_restore function to restore the variable (CVE-2009-2626).

 

The htmlspecialchars function in PHP before 5.2.12 does not properly

handle (1) overlong UTF-8 sequences, (2) invalid Shift_JIS sequences,

and (3) invalid EUC-JP sequences, which allows remote attackers to

conduct cross-site scripting (XSS) attacks by placing a crafted byte

sequence before a special character (CVE-2009-4142).

 

The updated packages have been patched to correct these issues.

Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
 Share

×
×
  • Create New...