SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Generic)  >   PHP Vendors:   PHP Group
PHP Buffer Overflows, Filtering Bypass, and Configuration Bypass Bugs May Let Users Gain Elevated Privileges
SecurityTracker Alert ID:  1018934
SecurityTracker URL:  http://securitytracker.com/id/1018934
CVE Reference:   CVE-2007-5898, CVE-2007-5900   (Links to External Site)
Updated:  Feb 17 2008
Original Entry Date:  Nov 12 2007
Impact:   Execution of arbitrary code via local system, Modification of user information, User access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 5.2.5
Description:   A vulnerability was reported in PHP. A user may be able to obtain elevated privileges on the target system.

A user may be able to trigger a buffer overflow in the fnmatch(), setlocale() and glob() functions. Laurent Gaffie reported this vulnerability.

A user can supply partial multibyte sequences to the htmlentities() and htmlspecialchars() functions to potentially bypass the filtering functions. Rasmus Lerdorf reported this vulnerability.

A user can invoke the ini_set() function to overwrite values set with php_admin_* in the 'httpd.conf' file. samy-delux at gmx dot de reported this vulnerability.

Impact:   A user may be able to obtain elevated privileges on the target system.
Solution:   The vendor has issued a fixed version (5.2.5).

The PHP advisory is available at:

http://www.php.net/releases/5_2_5.php

Vendor URL:  www.php.net/releases/5_2_5.php (Links to External Site)
Cause:   Access control error, Boundary error, State error
Underlying OS:   Linux (Any), UNIX (Any), Windows (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Jul 2 2008 (Red Hat Issues Fix for Red Hat Application Stack) PHP Buffer Overflows, Filtering Bypass, and Configuration Bypass Bugs May Let Users Gain Elevated Privileges   (bugzilla@redhat.com)
Red Hat has released a fix for for Red Hat Application Stack v2 for for Enterprise Linux 5.
Jul 16 2008 (Red Hat Issues Fix) PHP Buffer Overflows, Filtering Bypass, and Configuration Bypass Bugs May Let Users Gain Elevated Privileges   (bugzilla@redhat.com)
Red Hat has released a fix for Red Hat Enterprise Linux 3 and 5.
Jul 16 2008 (Red Hat Issues Fix) PHP Buffer Overflows, Filtering Bypass, and Configuration Bypass Bugs May Let Users Gain Elevated Privileges   (bugzilla@redhat.com)
Red Hat has released a fix for Red Hat Enterprise Linux 2.1.
Jul 16 2008 (Red Hat Issues Fix) PHP Buffer Overflows, Filtering Bypass, and Configuration Bypass Bugs May Let Users Gain Elevated Privileges   (bugzilla@redhat.com)
Red Hat has released a fix for CVE-2007-5898 on Red Hat Enterprise Linux 4.
Jul 22 2008 (Red Hat Issues Fix) PHP Buffer Overflows, Filtering Bypass, and Configuration Bypass Bugs May Let Users Gain Elevated Privileges   (bugzilla@redhat.com)
Red Hat has released a fix for Red Hat Application Stack v1.



 Source Message Contents

Date:  Mon, 12 Nov 2007 07:29:21 -0500
Subject:  PHP


http://www.php.net/releases/5_2_5.php

> Security Enhancements and Fixes in PHP 5.2.5
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2014, SecurityGlobal.net LLC