OpenPKG CVS Repository
  http://cvs.openpkg.org/
  ____________________________________________________________________________

  Server: cvs.openpkg.org                  Name:   Thomas Lotterer
  Root:   /e/openpkg/cvs                   Email:  [EMAIL PROTECTED]
  Module: openpkg-src openpkg-web          Date:   07-Jul-2003 15:49:02
  Branch: OPENPKG_1_1_SOLID HEAD           Handle: 2003070714490001

  Modified files:
    openpkg-web             news.txt
  Modified files:           (Branch: OPENPKG_1_1_SOLID)
    openpkg-src/apache      apache.spec php.patch

  Log:
    SA-2003.032-php; CAN-2002-0985, CAN-2002-0986, CAN-2003-0442

  Summary:
    Revision    Changes     Path
    1.81.2.7    +1  -1      openpkg-src/apache/apache.spec
    1.1.2.2     +85 -0      openpkg-src/apache/php.patch
    1.5422      +1  -0      openpkg-web/news.txt
  ____________________________________________________________________________

  patch -p0 <<'@@ .'
  Index: openpkg-src/apache/apache.spec
  ============================================================================
  $ cvs diff -u -r1.81.2.6 -r1.81.2.7 apache.spec
  --- openpkg-src/apache/apache.spec    18 Mar 2003 15:04:22 -0000      1.81.2.6
  +++ openpkg-src/apache/apache.spec    7 Jul 2003 13:49:01 -0000       1.81.2.7
  @@ -143,7 +143,7 @@
   Group:        Web
   License:      ASF
   Version:      %{V_apache}
  -Release:      1.1.4
  +Release:      1.1.5
   
   #   list of sources
   Source0:      http://www.apache.org/dist/httpd/apache_%{V_apache}.tar.gz
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-src/apache/php.patch
  ============================================================================
  $ cvs diff -u -r1.1.2.1 -r1.1.2.2 php.patch
  --- openpkg-src/apache/php.patch      22 Jan 2003 12:22:27 -0000      1.1.2.1
  +++ openpkg-src/apache/php.patch      7 Jul 2003 13:49:01 -0000       1.1.2.2
  @@ -103,3 +103,88 @@
    
                RETURN_STRINGL(newtext, newtextlen, 0);
        }
  +
  +http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0985
  +    The mail function in PHP 4.x to 4.2.2 may allow remote attackers to
  +    bypass safe mode restrictions and modify command line arguments to
  +    the MTA (e.g. sendmail) in the 5th argument to mail(), altering MTA
  +    behavior and possibly executing commands.
  +
  +http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0986
  +    The mail function in PHP 4.x to 4.2.2 does not filter ASCII control
  +    characters from its arguments, which could allow remote attackers to
  +    modify mail message content, including mail headers, and possibly
  +    use PHP as a "spam proxy."
  +
  +diff -u -r1.48 -r1.48.2.3
  +--- php-4.2.2/ext/standard/mail.c    28 Feb 2002 08:26:46 -0000      1.48
  ++++ php-4.2.2/ext/standard/mail.c    24 Aug 2002 11:38:13 -0000      1.48.2.3
  +@@ -70,8 +70,12 @@
  + PHP_FUNCTION(mail)
  + {
  +     char *to=NULL, *message=NULL, *headers=NULL, *subject=NULL, *extra_cmd=NULL;
  +-    int to_len,message_len,headers_len,subject_len,extra_cmd_len;
  ++    int to_len,message_len,headers_len,subject_len,extra_cmd_len,i;
  +     
  ++    if (PG(safe_mode) && (ZEND_NUM_ARGS() == 5)) {
  ++            php_error(E_WARNING, "%s(): SAFE MODE Restriction in effect.  The 
fifth parameter is disabled in SAFE MODE.", get_active_function_name(TSRMLS_C));
  ++            RETURN_FALSE;
  ++    }
  +     
  +     if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "sss|ss",
  +                                                       &to, &to_len,
  +@@ -83,14 +87,28 @@
  +             return;
  +     }
  + 
  +-    for(to_len--;to_len;to_len--) {
  +-            if(!isspace(to[to_len]))break;
  +-            to[to_len]='\0';
  ++    if (to_len > 0) {
  ++            for(;to_len;to_len--) {
  ++                    if(!isspace((unsigned char)to[to_len-1]))break;
  ++                    to[to_len-1]='\0';
  ++            }
  ++            for(i=0;to[i];i++) {
  ++                    if (iscntrl((unsigned char)to[i])) {
  ++                            to[i]=' ';
  ++                    }
  ++            }
  +     }
  + 
  +-    for(subject_len--;subject_len;subject_len--) {
  +-            if(!isspace(subject[subject_len]))break;
  +-            subject[subject_len]='\0';
  ++    if (subject_len > 0) {
  ++            for(;subject_len;subject_len--) {
  ++                    if(!isspace((unsigned char)subject[subject_len-1]))break;
  ++                    subject[subject_len-1]='\0';
  ++            }
  ++            for(i=0;subject[i];i++) {
  ++                    if (iscntrl((unsigned char)subject[i])) {
  ++                            subject[i]=' ';
  ++                    }
  ++            }
  +     }
  + 
  +     if(extra_cmd)
  +
  +http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0442
  +    Cross-site scripting (XSS) vulnerability in the transparent SID
  +    support capability for PHP before 4.3.2 (session.use_trans_sid)
  +    allows remote attackers to insert arbitrary script via the PHPSESSID
  +    parameter.
  +
  +--- php-4.2.2/ext/session/session.c.orig
  ++++ php-4.2.2/ext/session/session.c
  +@@ -84,7 +84,9 @@
  + static void php_session_output_handler(char *output, uint output_len, char 
**handled_output, uint *handled_output_len, int mode TSRMLS_DC)
  + {
  +     if ((PS(session_status) == php_session_active)) {
  +-            *handled_output = url_adapt_ext_ex(output, output_len, 
PS(session_name), PS(id), handled_output_len, (zend_bool) (mode&PHP_OUTPUT_HANDLER_END 
? 1 : 0) TSRMLS_CC);
  ++            char *encoded = php_url_encode(PS(id), strlen(PS(id)), NULL);
  ++            *handled_output = url_adapt_ext_ex(output, output_len, 
PS(session_name), encoded, handled_output_len, (zend_bool) 
(mode&PHP_OUTPUT_HANDLER_END ? 1 : 0) TSRMLS_CC);
  ++            efree(encoded);
  +     } else {
  +             *handled_output = NULL;
  +     }
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/news.txt
  ============================================================================
  $ cvs diff -u -r1.5421 -r1.5422 news.txt
  --- openpkg-web/news.txt      7 Jul 2003 13:48:25 -0000       1.5421
  +++ openpkg-web/news.txt      7 Jul 2003 13:49:00 -0000       1.5422
  @@ -1,3 +1,4 @@
  +07-Jul-2003: Upgraded package: P<apache-1.3.26-1.1.5>
   07-Jul-2003: Upgraded package: P<php-4.2.2-1.1.2>
   07-Jul-2003: Upgraded package: P<txt2man-1.4.8-20030707>
   07-Jul-2003: Upgraded package: P<bc-1.06-20030707>
  @@ .
______________________________________________________________________
The OpenPKG Project                                    www.openpkg.org
CVS Repository Commit List                     [EMAIL PROTECTED]

Reply via email to