rPSA-2007-0073-1 php php-mysql php-pgsql Apr 18 2007 04:03PM
rPath Update Announcements (announce-noreply rpath com)
rPath Security Advisory: 2007-0073-1
Published: 2007-04-18
Products: rPath Linux 1
Rating: Severe
Exposure Level Classification:
Remote System User Deterministic Unauthorized Access
Updated Versions:
php=/conary.rpath.com@rpl:devel//1/4.3.11-15.10-1
php-mysql=/conary.rpath.com@rpl:devel//1/4.3.11-15.10-1
php-pgsql=/conary.rpath.com@rpl:devel//1/4.3.11-15.10-1

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1285
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1286
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1583
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1711
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1001
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0455
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0906
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0910
https://issues.rpath.com/browse/RPL-1268

Description:
Previous versions of the php package are vulnerable to many attacks,
the worst of which enable various remote attackers to run arbitrary
code as the "apache" user. These vulnerabilities are exposed by a
wide variety of applications written in the PHP language.

[ reply ]


 

Privacy Statement
Copyright 2010, SecurityFocus