SB2004121901 - Gentoo update for PHP



SB2004121901 - Gentoo update for PHP

Published: December 19, 2004 Updated: June 28, 2025

Security Bulletin ID SB2004121901
Severity
High
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Input validation error (CVE-ID: CVE-2004-1063)

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

PHP 4.x to 4.3.9, and PHP 5.x to 5.0.2, when running in safe mode on a multithreaded Unix webserver, allows local users to bypass safe_mode_exec_dir restrictions and execute commands outside of the intended safe_mode_exec_dir via shell metacharacters in the current directory name. NOTE: this issue was originally REJECTed by its CNA before publication, but that decision is in active dispute. This candidate may change significantly in the future as a result of further discussion.


2) Input validation error (CVE-ID: CVE-2004-1064)

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

The safe mode checks in PHP 4.x to 4.3.9 and PHP 5.x to 5.0.2 truncate the file path before passing the data to the realpath function, which could allow attackers to bypass safe mode. NOTE: this issue was originally REJECTed by its CNA before publication, but that decision is in active dispute. This candidate may change significantly in the future as a result of further discussion.


3) Input validation error (CVE-ID: CVE-2004-1065)

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

Buffer overflow in the exif_read_data function in PHP before 4.3.10 and PHP 5.x up to 5.0.2 allows remote attackers to execute arbitrary code via a long section name in an image file.


Remediation

Install update from vendor's website.