OpenPKG CVS Repository http://cvs.openpkg.org/ ____________________________________________________________________________
Server: cvs.openpkg.org Name: Thomas Lotterer Root: /e/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-web Date: 07-Jul-2003 15:48:09 Branch: HEAD Handle: 2003070714480800 Added files: openpkg-web/security OpenPKG-SA-2003.032-php.txt Modified files: openpkg-web security.txt security.wml Log: SA-2003.032-php; CAN-2002-0985, CAN-2002-0986, CAN-2003-0442 Summary: Revision Changes Path 1.38 +1 -0 openpkg-web/security.txt 1.54 +1 -0 openpkg-web/security.wml 1.1 +93 -0 openpkg-web/security/OpenPKG-SA-2003.032-php.txt ____________________________________________________________________________ patch -p0 <<'@@ .' Index: openpkg-web/security.txt ============================================================================ $ cvs diff -u -r1.37 -r1.38 security.txt --- openpkg-web/security.txt 11 Jun 2003 11:04:36 -0000 1.37 +++ openpkg-web/security.txt 7 Jul 2003 13:48:08 -0000 1.38 @@ -1,3 +1,4 @@ +07-Jul-2003: Security Advisory: S<OpenPKG-SA-2003.032-php> 11-Jun-2003: Security Advisory: S<OpenPKG-SA-2003.031-gzip> 03-Jun-2003: Security Advisory: S<OpenPKG-SA-2003.030-ghostscript> 16-May-2003: Security Advisory: S<OpenPKG-SA-2003.029-gnupg> @@ . patch -p0 <<'@@ .' Index: openpkg-web/security.wml ============================================================================ $ cvs diff -u -r1.53 -r1.54 security.wml --- openpkg-web/security.wml 11 Jun 2003 11:04:36 -0000 1.53 +++ openpkg-web/security.wml 7 Jul 2003 13:48:08 -0000 1.54 @@ -78,6 +78,7 @@ </define-tag> <box bdwidth=1 bdcolor="#a5a095" bdspace=10 bgcolor="#e5e0d5"> <table cellspacing=0 cellpadding=0 border=0> + <sa 2003.032 php> <sa 2003.031 gzip> <sa 2003.030 ghostscript> <sa 2003.029 gnupg> @@ . patch -p0 <<'@@ .' Index: openpkg-web/security/OpenPKG-SA-2003.032-php.txt ============================================================================ $ cvs diff -u -r0 -r1.1 OpenPKG-SA-2003.032-php.txt --- /dev/null 2003-07-07 15:48:08.000000000 +0200 +++ OpenPKG-SA-2003.032-php.txt 2003-07-07 15:48:09.000000000 +0200 @@ -0,0 +1,93 @@ +________________________________________________________________________ + +OpenPKG Security Advisory The OpenPKG Project +http://www.openpkg.org/security.html http://www.openpkg.org [EMAIL PROTECTED] [EMAIL PROTECTED] +OpenPKG-SA-2003.032 07-Jul-2003 +________________________________________________________________________ + +Package: php, apache +Vulnerability: XSS; bypass safe mode +OpenPKG Specific: no + +Affected Releases: Affected Packages: Corrected Packages: +OpenPKG CURRENT <= php-4.3.1-20030516 >= php-4.3.2-20030529 + <= apache-1.3.27-20030516 >= apache-1.3.27-20030529 +OpenPKG 1.2 none N.A. +OpenPKG 1.1 <= php-4.2.2-1.1.1 >= php-4.2.2-1.1.2 + <= apache-1.3.26-1.1.4 >= apache-1.3.26-1.1.5 + +Dependent Packages: none + +Description: + Wojciech Purczynski found [2] out that it is possible to allow remote + attackers to bypass safe mode restrictions in PHP [1] 4.x to 4.2.2 and + modify command line arguments to the MTA (e.g. sendmail) in the 5th + argument to mail(), altering MTA behavior and possibly executing + commands. The Common Vulnerabilities and Exposures (CVE) project + assigned the id CAN-2002-0985 [4] to the problem. + + Wojciech Purczynski also reported [2] that the mail function in PHP + [1] 4.x to 4.2.2 does not filter ASCII control characters from its + arguments, which could allow remote attackers to modify mail message + content, including mail headers, and possibly use PHP as a "spam + proxy." Depending on how The Common Vulnerabilities and Exposures + (CVE) project assigned the id CAN-2002-0986 [5] to the problem. + + A security advisory [3] states that in PHP [1] version 4.3.1 (but we + at OpenPKG believe 4.2.x) and earlier, when transparent session ID + support is enabled using the "session.use_trans_sid" option, the + session ID is not escaped before use, which allows remote attackers to + insert arbitrary script via the PHPSESSID parameter, The Common + Vulnerabilities and Exposures (CVE) project assigned the id + CAN-2003-0442 [6] to the problem. + + Please check whether you are affected by running "<prefix>/bin/rpm + -q php". If you have the "php" package installed and its version + is affected (see above), we recommend that you immediately upgrade + it (see Solution). + +Solution: + Select the updated source RPM appropriate for your OpenPKG release + [9], fetch it from the OpenPKG FTP service [10] or a mirror + location, verify its integrity [11], build a corresponding binary RPM + from it [7] and update your OpenPKG installation by applying the binary + RPM [8]. For the current release OpenPKG 1.2, perform the following + operations to permanently fix the security problem (for other releases + adjust accordingly). + + $ ftp ftp.openpkg.org + ftp> bin + ftp> cd release/1.2/UPD + ftp> get php-4.2.2-1.1.2.src.rpm + ftp> bye + $ <prefix>/bin/rpm -v --checksig php-4.2.2-1.1.2.src.rpm + $ <prefix>/bin/rpm --rebuild php-4.2.2-1.1.2.src.rpm + $ su - + # <prefix>/bin/rpm -Fvh <prefix>/RPM/PKG/php-4.2.2-1.1.2.*.rpm + + Additionally, we recommend that you rebuild and reinstall + all dependent packages (see above), if any, too. [7][8] +________________________________________________________________________ + +References: + [1] http://www.php.net/ + [2] http://isec.pl/vulnerabilities/0005.txt + [3] http://shh.thathost.com/secadv/2003-05-11-php.txt + [4] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0985 + [5] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0986 + [6] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0442 + [7] http://www.openpkg.org/tutorial.html#regular-source + [8] http://www.openpkg.org/tutorial.html#regular-binary + [9] ftp://ftp.openpkg.org/release/1.1/UPD/php-4.2.2-1.1.2.src.rpm + [10] ftp://ftp.openpkg.org/release/1.1/UPD/ + [11] http://www.openpkg.org/security.html#signature +________________________________________________________________________ + +For security reasons, this advisory was digitally signed with the +OpenPGP public key "OpenPKG <[EMAIL PROTECTED]>" (ID 63C4CB9F) of the +OpenPKG project which you can retrieve from http://pgp.openpkg.org and +hkp://pgp.openpkg.org. Follow the instructions on http://pgp.openpkg.org/ +for details on how to verify the integrity of this advisory. +________________________________________________________________________ + @@ . ______________________________________________________________________ The OpenPKG Project www.openpkg.org CVS Repository Commit List [EMAIL PROTECTED]