Description: | Description: The remote host is missing an update to php-eaccelerator announced via advisory FEDORA-2010-19011.
Update Information:
Security Enhancements and Fixes in PHP 5.3.4:
* Fixed crash in zip extract method (possible CWE-170). * Paths with NULL in them (foo\0bar.txt) are now considered as invalid (CVE-2006-7243). * Fixed a possible double free in imap extension (Identified by Mateusz Kocielski). (CVE-2010-4150). * Fixed NULL pointer dereference in ZipArchive::getArchiveComment. (CVE-2010-3709). * Fixed possible flaw in open_basedir (CVE-2010-3436). * Fixed MOPS-2010-24, fix string validation. (CVE-2010-2950). * Fixed symbolic resolution support when the target is a DFS share. * Fixed bug #52929 (Segfault in filter_var with FILTER_VALIDATE_EMAIL with large amount of data) (CVE-2010-3710).
Key Bug Fixes in PHP 5.3.4 include:
* Added stat support for zip stream. * Added follow_location (enabled by default) option for the http stream support. * Added a 3rd parameter to get_html_translation_table. It now takes a charset hint, like htmlentities et al. * Implemented FR #52348, added new constant ZEND_MULTIBYTE to detect zend multibyte at runtime.
Full upstream Changelog : http://www.php.net/ChangeLog-5.php#5.3.4
This update also provides php-eaccelerator and maniadrive packages rebuild against update php.
References:
[ 1 ] Bug #649056 - CVE-2010-3870 php: XSS mitigation bypass via utf8_decode() https://bugzilla.redhat.com/show_bug.cgi?id=649056 [ 2 ] Bug #651206 - CVE-2010-3709 php: NULL pointer dereference in ZipArchive::getArchiveComment https://bugzilla.redhat.com/show_bug.cgi?id=651206 [ 3 ] Bug #651682 - CVE-2010-4156 php information disclosure via mb_strcut() https://bugzilla.redhat.com/show_bug.cgi?id=651682 [ 4 ] Bug #652836 - CVE-2009-5016 php: XSS and SQL injection bypass via crafted overlong UTF-8 encoded string https://bugzilla.redhat.com/show_bug.cgi?id=652836 [ 5 ] Bug #660382 - CVE-2010-4409 php: getSymbol() integer overflow vulnerability https://bugzilla.redhat.com/show_bug.cgi?id=660382 [ 6 ] Bug #656917 - CVE-2010-4150 php: Double free in the imap extension https://bugzilla.redhat.com/show_bug.cgi?id=656917 [ 7 ] Bug #646684 - CVE-2010-3710 php: DoS in filter_var() via long email string https://bugzilla.redhat.com/show_bug.cgi?id=646684
Solution: Apply the appropriate updates.
This update can be installed with the yum update program. Use su -c 'yum update php-eaccelerator' at the command line. For more information, refer to Managing Software with yum, available at http://docs.fedoraproject.org/yum/.
http://www.securityspace.com/smysecure/catid.html?in=FEDORA-2010-19011
Risk factor : High
CVSS Score: 6.8
|