SB2011021901 - Multiple vulnerabilities in PHP
Published: February 19, 2011 Updated: August 11, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 7 secuirty vulnerabilities.
1) Resource management error (CVE-ID: CVE-2011-3267)
The vulnerability allows a remote non-authenticated attacker to perform service disruption.
PHP before 5.3.7 does not properly implement the error_log function, which allows context-dependent attackers to cause a denial of service (application crash) via unspecified vectors.
2) Buffer overflow (CVE-ID: CVE-2011-3268)
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
Buffer overflow in the crypt function in PHP before 5.3.7 allows context-dependent attackers to have an unspecified impact via a long salt argument, a different vulnerability than CVE-2011-2483.
3) Input validation error (CVE-ID: CVE-2011-3182)
The vulnerability allows a remote non-authenticated attacker to perform service disruption.
PHP before 5.3.7 does not properly check the return values of the malloc, calloc, and realloc library functions, which allows context-dependent attackers to cause a denial of service (NULL pointer dereference and application crash) or trigger a buffer overflow by leveraging the ability to provide an arbitrary value for a function argument, related to (1) ext/curl/interface.c, (2) ext/date/lib/parse_date.c, (3) ext/date/lib/parse_iso_intervals.c, (4) ext/date/lib/parse_tz.c, (5) ext/date/lib/timelib.c, (6) ext/pdo_odbc/pdo_odbc.c, (7) ext/reflection/php_reflection.c, (8) ext/soap/php_sdl.c, (9) ext/xmlrpc/libxmlrpc/base64.c, (10) TSRM/tsrm_win32.c, and (11) the strtotime function. Per: http://cwe.mitre.org/data/definitions/476.html 'CWE-476: NULL Pointer Dereference'
4) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2011-2202)
The vulnerability allows a remote non-authenticated attacker to manipulate or delete data.
The rfc1867_post_handler function in main/rfc1867.c in PHP before 5.3.7 does not properly restrict filenames in multipart/form-data POST requests, which allows remote attackers to conduct absolute path traversal attacks, and possibly create or overwrite arbitrary files, via a crafted upload request, related to a "file path injection vulnerability."
5) Link following (CVE-ID: CVE-2011-0441)
The vulnerability allows a remote non-authenticated attacker to #BASIC_IMPACT#.
The Debian GNU/Linux /etc/cron.d/php5 cron job for PHP 5.3.5 allows local users to delete arbitrary files via a symlink attack on a directory under /var/lib/php5/.
6) Resource management error (CVE-ID: CVE-2011-1148)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Use-after-free vulnerability in the substr_replace function in PHP 5.3.6 and earlier allows context-dependent attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact by using the same variable for multiple arguments.
7) Input validation error (CVE-ID: CVE-2011-0420)
The vulnerability allows context-dependent attackers to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can cause a denial of service (crash) via an invalid size argument, which triggers a NULL pointer dereference.
Remediation
Cybersecurity Help is not aware of any official remediation provided by the vendor.
References
- http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
- http://osvdb.org/74739
- http://support.apple.com/kb/HT5130
- http://www.mandriva.com/security/advisories?name=MDVSA-2011:165
- http://www.php.net/archive/2011.php#id2011-08-18-1
- http://www.php.net/ChangeLog-5.php#5.3.7
- http://www.securityfocus.com/bid/49241
- https://exchange.xforce.ibmcloud.com/vulnerabilities/69428
- http://osvdb.org/74738
- http://svn.php.net/viewvc/php/php-src/branches/PHP_5_3/ext/standard/php_crypt_r.c?r1=311300&r2=311390&pathrev=315218
- https://exchange.xforce.ibmcloud.com/vulnerabilities/69427
- http://marc.info/?l=full-disclosure&m=131373057621672&w=2
- http://securityreason.com/achievement_securityalert/101
- http://www.openwall.com/lists/oss-security/2011/08/22/9
- http://www.securityfocus.com/bid/49249
- https://exchange.xforce.ibmcloud.com/vulnerabilities/69430
- http://bugs.php.net/bug.php?id=54939
- http://marc.info/?l=bugtraq&m=133469208622507&w=2
- http://openwall.com/lists/oss-security/2011/06/12/5
- http://openwall.com/lists/oss-security/2011/06/13/15
- http://pastebin.com/1edSuSVN
- http://rhn.redhat.com/errata/RHSA-2012-0071.html
- http://secunia.com/advisories/44874
- http://securitytracker.com/id?1025659
- http://svn.php.net/viewvc/php/php-src/branches/PHP_5_3/main/rfc1867.c?r1=312103&r2=312102&pathrev=312103
- http://svn.php.net/viewvc/php/php-src/branches/PHP_5_3/NEWS?view=markup&pathrev=312103
- http://svn.php.net/viewvc?view=revision&revision=312103
- http://www.debian.org/security/2011/dsa-2266
- http://www.redhat.com/support/errata/RHSA-2011-1423.html
- http://www.securityfocus.com/bid/48259
- https://exchange.xforce.ibmcloud.com/vulnerabilities/67999
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=618489
- http://git.debian.org/?p=pkg-php/php.git;a=commit;h=d09fd04ed7bfcf7f008360c6a42025108925df09
- http://www.mandriva.com/security/advisories?name=MDVSA-2011:069
- http://www.securityfocus.com/bid/46928
- http://www.vupen.com/english/advisories/2011/0910
- https://exchange.xforce.ibmcloud.com/vulnerabilities/66180
- http://bugs.php.net/bug.php?id=54238
- http://openwall.com/lists/oss-security/2011/03/13/2
- http://openwall.com/lists/oss-security/2011/03/13/3
- http://openwall.com/lists/oss-security/2011/03/13/9
- http://www.securityfocus.com/bid/46843
- https://exchange.xforce.ibmcloud.com/vulnerabilities/66080
- http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html
- http://securityreason.com/achievement_securityalert/94
- http://securityreason.com/securityalert/8087
- http://support.apple.com/kb/HT5002
- http://svn.php.net/viewvc/php/php-src/trunk/ext/intl/grapheme/grapheme_string.c?r1=306449&r2=306448&pathrev=306449
- http://www.exploit-db.com/exploits/16182
- http://www.kb.cert.org/vuls/id/210829
- http://www.securityfocus.com/archive/1/516504/100/0/threaded
- http://www.securityfocus.com/archive/1/516518/100/0/threaded
- http://www.securityfocus.com/bid/46429
- https://exchange.xforce.ibmcloud.com/vulnerabilities/65437