SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Web Server/CGI)  >   PHP Vendors:   PHP Group
(Caldera Issues Fix for OpenLinux) PHP File Upload Bugs Let Remote Users Execute Arbitrary Code on a PHP-enabled Web Server
SecurityTracker Alert ID:  1004327
SecurityTracker URL:  http://securitytracker.com/id/1004327
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  May 18 2002
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 3.10 - 3.18, 4.0.1 - 4.1.1
Description:   e-matters released a security advisory warning of multiple vulnerabilities in PHP. A remote user can execute arbitrary code on the web server.

It is reported that there are multiple flaws in the php_mime_split function that is used to process multipart/form-data POST requests.

The following flaws were reportedly identified. No technical details were provided.

In PHP 3.10-3.18, there is a broken boundary check that is apparently difficult to exploit and a heap overlow that is apparently easy to exploit.

In PHP 4.0.1-4.0.3pl1, there is a broken boundary check that is apparently difficult to exploit and a heap 'off by one' vulnerability that is apparently easy to exploit.

In PHP 4.0.2-4.0.5, there are reportedly two broken boundary checks (one very easy and one hard to exploit).

In PHP 4.0.6-4.0.7RC2, there is an easily exploitable broken boundary check.

In PHP 4.0.7RC3-4.1.1, there is a broken boundary check that is apparently difficult to exploit.

Impact:   A remote user can execute arbitrary code on the web server with the privileges of the web server.
Solution:   The vendor has released a fix for OpenServer.

For OpenLinux 3.1.1 Server:

Package Location:

ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1.1/Server/current/RPMS

Packages:

1bbbc55e7dfd717f02b3668c57891edf php-4.0.6-3.2.i386.rpm
20c0812616f3df9c48078134c7e7fac6 php-doc-4.0.6-3.2.i386.rpm

To install:

rpm -Fvh php-4.0.6-3.2.i386.rpm
rpm -Fvh php-doc-4.0.6-3.2.i386.rpm

Source Package Location:

ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1.1/Server/current/SRPMS

Source Packages:

d17abc8b13cc6074475c2eb4d5cda6e1 php-4.0.6-3.2.src.rpm


For OpenLinux 3.1.1 Workstation:

Package Location:

ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1.1/Workstation/current/RPMS

Packages:

476c985cfab14a44ec3b5b1878900277 php-4.0.6-3.2.i386.rpm
e2434fec5c6fb8b877e35dcceb85c44b php-doc-4.0.6-3.2.i386.rpm

To install:

rpm -Fvh php-4.0.6-3.2.i386.rpm
rpm -Fvh php-doc-4.0.6-3.2.i386.rpm

Source Package Location:

ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1.1/Workstation/current/SRPMS

Source Packages:

e51125ee2a73855bf6adf0cdd38baadc php-4.0.6-3.2.src.rpm


For OpenLinux 3.1 Server:

Package Location:

ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1/Server/current/RPMS

Packages:

6714aca296f79646b5e3a1875481dfd5 php-4.0.6-3.2.i386.rpm
fdf7024cc7dde4b3131362080d48c1a3 php-doc-4.0.6-3.2.i386.rpm

To install:

rpm -Fvh php-4.0.6-3.2.i386.rpm
rpm -Fvh php-doc-4.0.6-3.2.i386.rpm

Source Package Location:

ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1/Server/current/SRPMS

Source Packages:

12e7a38c6fecfd011fe244816b6200f7 php-4.0.6-3.2.src.rpm


For OpenLinux 3.1 Workstation:

Package Location:

ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1/Workstation/current/RPMS

Packages:

22ab000e77e3b7cfb320a0bd276f36b8 php-4.0.6-3.2.i386.rpm
520590022934e36c5d4695adb8296f64 php-doc-4.0.6-3.2.i386.rpm

To install:

rpm -Fvh php-4.0.6-3.2.i386.rpm
rpm -Fvh php-doc-4.0.6-3.2.i386.rpm

Source Package Location:

ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1/Workstation/current/SRPMS

Source Packages:

f3b5da8a31e6e557a84c634328564285 php-4.0.6-3.2.src.rpm

Vendor URL:  www.php.net/ (Links to External Site)
Cause:   Boundary error
Underlying OS:  Linux (Caldera/SCO)
Underlying OS Comments:  OpenLinux Server and Workstation; 3.1, 3.1.1

Message History:   This archive entry is a follow-up to the message listed below.
Feb 27 2002 PHP File Upload Bugs Let Remote Users Execute Arbitrary Code on a PHP-enabled Web Server



 Source Message Contents

Subject:  Security Update: [CSSA-2002-023.0] Linux: PHP multipart/form-data vulnerabilities


--9amGYk9869ThD9tj
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline

To: bugtraq@securityfocus.com announce@lists.caldera.com security-alerts@linuxsecurity.com

______________________________________________________________________________

		Caldera International, Inc.  Security Advisory

Subject:		Linux: PHP multipart/form-data vulnerabilities
Advisory number: 	CSSA-2002-023.0
Issue date: 		2002 May 16
Cross reference:
______________________________________________________________________________


1. Problem Description

	Several flaws have been found in the way PHP handles
	multipart/form-data POST requests. Each of the flaws could allow
	an attacker to execute arbitrary code on the victim's system.


2. Vulnerable Supported Versions

	System				Package
	----------------------------------------------------------------------

	OpenLinux 3.1.1 Server		prior to php-4.0.6-3.2.i386.rpm
					prior to php-doc-4.0.6-3.2.i386.rpm

	OpenLinux 3.1.1 Workstation	prior to php-4.0.6-3.2.i386.rpm
					prior to php-doc-4.0.6-3.2.i386.rpm

	OpenLinux 3.1 Server		prior to php-4.0.6-3.2.i386.rpm
					prior to php-doc-4.0.6-3.2.i386.rpm

	OpenLinux 3.1 Workstation	prior to php-4.0.6-3.2.i386.rpm
					prior to php-doc-4.0.6-3.2.i386.rpm


3. Solution

	The proper solution is to install the latest packages.


4. OpenLinux 3.1.1 Server

	4.1 Package Location

	ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1.1/Server/current/RPMS

	4.2 Packages

	1bbbc55e7dfd717f02b3668c57891edf	php-4.0.6-3.2.i386.rpm
	20c0812616f3df9c48078134c7e7fac6	php-doc-4.0.6-3.2.i386.rpm

	4.3 Installation

	rpm -Fvh php-4.0.6-3.2.i386.rpm
	rpm -Fvh php-doc-4.0.6-3.2.i386.rpm

	4.4 Source Package Location

	ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1.1/Server/current/SRPMS

	4.5 Source Packages

	d17abc8b13cc6074475c2eb4d5cda6e1	php-4.0.6-3.2.src.rpm


5. OpenLinux 3.1.1 Workstation

	5.1 Package Location

	ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1.1/Workstation/current/RPMS

	5.2 Packages

	476c985cfab14a44ec3b5b1878900277	php-4.0.6-3.2.i386.rpm
	e2434fec5c6fb8b877e35dcceb85c44b	php-doc-4.0.6-3.2.i386.rpm

	5.3 Installation

	rpm -Fvh php-4.0.6-3.2.i386.rpm
	rpm -Fvh php-doc-4.0.6-3.2.i386.rpm

	5.4 Source Package Location

	ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1.1/Workstation/current/SRPMS

	5.5 Source Packages

	e51125ee2a73855bf6adf0cdd38baadc	php-4.0.6-3.2.src.rpm


6. OpenLinux 3.1 Server

	6.1 Package Location

	ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1/Server/current/RPMS

	6.2 Packages

	6714aca296f79646b5e3a1875481dfd5	php-4.0.6-3.2.i386.rpm
	fdf7024cc7dde4b3131362080d48c1a3	php-doc-4.0.6-3.2.i386.rpm

	6.3 Installation

	rpm -Fvh php-4.0.6-3.2.i386.rpm
	rpm -Fvh php-doc-4.0.6-3.2.i386.rpm

	6.4 Source Package Location

	ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1/Server/current/SRPMS

	6.5 Source Packages

	12e7a38c6fecfd011fe244816b6200f7	php-4.0.6-3.2.src.rpm


7. OpenLinux 3.1 Workstation

	7.1 Package Location

	ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1/Workstation/current/RPMS

	7.2 Packages

	22ab000e77e3b7cfb320a0bd276f36b8	php-4.0.6-3.2.i386.rpm
	520590022934e36c5d4695adb8296f64	php-doc-4.0.6-3.2.i386.rpm

	7.3 Installation

	rpm -Fvh php-4.0.6-3.2.i386.rpm
	rpm -Fvh php-doc-4.0.6-3.2.i386.rpm

	7.4 Source Package Location

	ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1/Workstation/current/SRPMS

	7.5 Source Packages

	f3b5da8a31e6e557a84c634328564285	php-4.0.6-3.2.src.rpm


8. References

	Specific references for this advisory:

		http://security.e-matters.de/advisories/012002.html
		http://www.kb.cert.org/vuls/id/297363
		http://bugs.php.net/bug.php?id=15736

	Caldera OpenLinux security resources:
		http://www.caldera.com/support/security/index.html

	Caldera UNIX security resources:
		http://stage.caldera.com/support/security/

	This security fix closes Caldera incidents sr861013, fz520246,
	erg711976 and erg711968.


9. Disclaimer

	Caldera International, Inc. is not responsible for the misuse
	of any of the information we provide on this website and/or
	through our security advisories. Our advisories are a service
	to our customers intended to promote secure installation and
	use of Caldera products.


10. Acknowledgements

	Stefan Esser (s.esser@e-matters.de) reported these
	vulnerabilities.

______________________________________________________________________________

--9amGYk9869ThD9tj
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (SCO_SV)
Comment: For info see http://www.gnupg.org

iEYEARECAAYFAjzlSgYACgkQbluZssSXDTFcoQCgwFgy1lIqK9fYawvvlbnRS5c3
3+gAoMsSfteE0/Rf5QNz+sMDSqDcukOR
=l2PP
-----END PGP SIGNATURE-----

--9amGYk9869ThD9tj--

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC