Action not permitted
Modal body text goes here.
cve-2004-0594
Vulnerability from cvelistv5
Published
2004-07-16 04:00
Modified
2024-08-08 00:24
Severity ?
EPSS score ?
Summary
The memory_limit functionality in PHP 4.x up to 4.3.7, and 5.x up to 5.0.0RC3, under certain conditions such as when register_globals is enabled, allows remote attackers to execute arbitrary code by triggering a memory_limit abort during execution of the zend_hash_init function and overwriting a HashTable destructor pointer before the initialization of key data structures is complete.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:24:26.318Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "2004-0039", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX", "x_transferred" ], "url": "http://www.trustix.org/errata/2004/0039/" }, { "name": "20040714 Advisory 11/2004: PHP memory_limit remote vulnerability", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-July/023908.html" }, { "name": "CLA-2004:847", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA", "x_transferred" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000847" }, { "name": "20040714 TSSA-2004-013 - php", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=108982983426031\u0026w=2" }, { "name": "DSA-669", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2005/dsa-669" }, { "name": "RHSA-2004:395", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-395.html" }, { "name": "RHSA-2004:405", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-405.html" }, { "name": "oval:org.mitre.oval:def:10896", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10896" }, { "name": "RHSA-2004:392", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-392.html" }, { "name": "DSA-531", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2004/dsa-531" }, { "name": "SUSE-SA:2004:021", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2004_21_php4.html" }, { "name": "MDKSA-2004:068", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred" ], "url": "http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:068" }, { "name": "RHSA-2005:816", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-816.html" }, { "name": "SSRT4777", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=109181600614477\u0026w=2" }, { "name": "php-memorylimit-code-execution(16693)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16693" }, { "name": "20040722 [OpenPKG-SA-2004.034] OpenPKG Security Advisory (php)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=109051444105182\u0026w=2" }, { "name": "10725", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/10725" }, { "name": "20040713 Advisory 11/2004: PHP memory_limit remote vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=108981780109154\u0026w=2" }, { "name": "GLSA-200407-13", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200407-13.xml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-07-14T00:00:00", "descriptions": [ { "lang": "en", "value": "The memory_limit functionality in PHP 4.x up to 4.3.7, and 5.x up to 5.0.0RC3, under certain conditions such as when register_globals is enabled, allows remote attackers to execute arbitrary code by triggering a memory_limit abort during execution of the zend_hash_init function and overwriting a HashTable destructor pointer before the initialization of key data structures is complete." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T00:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "2004-0039", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX" ], "url": "http://www.trustix.org/errata/2004/0039/" }, { "name": "20040714 Advisory 11/2004: PHP memory_limit remote vulnerability", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-July/023908.html" }, { "name": "CLA-2004:847", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000847" }, { "name": "20040714 TSSA-2004-013 - php", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=108982983426031\u0026w=2" }, { "name": "DSA-669", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2005/dsa-669" }, { "name": "RHSA-2004:395", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-395.html" }, { "name": "RHSA-2004:405", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-405.html" }, { "name": "oval:org.mitre.oval:def:10896", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10896" }, { "name": "RHSA-2004:392", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-392.html" }, { "name": "DSA-531", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2004/dsa-531" }, { "name": "SUSE-SA:2004:021", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2004_21_php4.html" }, { "name": "MDKSA-2004:068", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE" ], "url": "http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:068" }, { "name": "RHSA-2005:816", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-816.html" }, { "name": "SSRT4777", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=109181600614477\u0026w=2" }, { "name": "php-memorylimit-code-execution(16693)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16693" }, { "name": "20040722 [OpenPKG-SA-2004.034] OpenPKG Security Advisory (php)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=109051444105182\u0026w=2" }, { "name": "10725", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/10725" }, { "name": "20040713 Advisory 11/2004: PHP memory_limit remote vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=108981780109154\u0026w=2" }, { "name": "GLSA-200407-13", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200407-13.xml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0594", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The memory_limit functionality in PHP 4.x up to 4.3.7, and 5.x up to 5.0.0RC3, under certain conditions such as when register_globals is enabled, allows remote attackers to execute arbitrary code by triggering a memory_limit abort during execution of the zend_hash_init function and overwriting a HashTable destructor pointer before the initialization of key data structures is complete." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "2004-0039", "refsource": "TRUSTIX", "url": "http://www.trustix.org/errata/2004/0039/" }, { "name": "20040714 Advisory 11/2004: PHP memory_limit remote vulnerability", "refsource": "FULLDISC", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-July/023908.html" }, { "name": "CLA-2004:847", "refsource": "CONECTIVA", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000847" }, { "name": "20040714 TSSA-2004-013 - php", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=108982983426031\u0026w=2" }, { "name": "DSA-669", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2005/dsa-669" }, { "name": "RHSA-2004:395", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2004-395.html" }, { "name": "RHSA-2004:405", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2004-405.html" }, { "name": "oval:org.mitre.oval:def:10896", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10896" }, { "name": "RHSA-2004:392", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2004-392.html" }, { "name": "DSA-531", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2004/dsa-531" }, { "name": "SUSE-SA:2004:021", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2004_21_php4.html" }, { "name": "MDKSA-2004:068", "refsource": "MANDRAKE", "url": "http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:068" }, { "name": "RHSA-2005:816", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2005-816.html" }, { "name": "SSRT4777", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=109181600614477\u0026w=2" }, { "name": "php-memorylimit-code-execution(16693)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16693" }, { "name": "20040722 [OpenPKG-SA-2004.034] OpenPKG Security Advisory (php)", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=109051444105182\u0026w=2" }, { "name": "10725", "refsource": "BID", "url": "http://www.securityfocus.com/bid/10725" }, { "name": "20040713 Advisory 11/2004: PHP memory_limit remote vulnerability", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=108981780109154\u0026w=2" }, { "name": "GLSA-200407-13", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-200407-13.xml" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-0594", "datePublished": "2004-07-16T04:00:00", "dateReserved": "2004-06-23T00:00:00", "dateUpdated": "2024-08-08T00:24:26.318Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2004-0594\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2004-07-27T04:00:00.000\",\"lastModified\":\"2024-02-15T21:17:59.723\",\"vulnStatus\":\"Analyzed\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"The memory_limit functionality in PHP 4.x up to 4.3.7, and 5.x up to 5.0.0RC3, under certain conditions such as when register_globals is enabled, allows remote attackers to execute arbitrary code by triggering a memory_limit abort during execution of the zend_hash_init function and overwriting a HashTable destructor pointer before the initialization of key data structures is complete.\"},{\"lang\":\"es\",\"value\":\"La funcionalidad memory_limit de PHP 4.x a 4.3.7 y 5.x a 5.0.0RC3, bajo ciertas condiciones, como cuando register_globals est\u00e1 habilitado, permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n disparando un aborto por memory_limit de la funci\u00f3n zend_hash_init y sobrescribiendo un puntero de destructor de HashTable antes de que la incializaci\u00f3n de las estructuras de datos clave se haya completado.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:H/Au:N/C:P/I:P/A:P\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"HIGH\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\",\"baseScore\":5.1},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":4.9,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":true,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-367\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openpkg:openpkg:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48A4B336-2D5B-4D9B-AA87-E5266FED05BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openpkg:openpkg:2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37042CDE-E4FE-442E-891A-CD84433D36E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:avaya:converged_communications_server:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E586558A-ABC3-42EB-8B4D-DC92A0D695E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CAE037F-111C-4A76-8FFE-716B74D65EF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:hp-ux:b.11.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54C09E05-4FAA-4893-BF36-9DD967525C4E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:hp-ux:b.11.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"972D4ABF-2E80-4902-910D-5BD0CBEC9765\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:hp-ux:b.11.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE7425AE-26A6-48A4-B883-C6220FCAC32B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:hp-ux:b.11.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12C73959-3E02-4847-8962-651D652800EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:trustix:secure_linux:1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39605B96-BAD6-45C9-BB9A-43D6E2C51ADD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53AF1A2D-B0A2-4097-AD1D-DF3AF27171BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A67735E5-E43E-4164-BDB2-ADC6E0288E9F\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0\",\"versionEndExcluding\":\"4.3.7\",\"matchCriteriaId\":\"04AA8CFD-CEAD-455C-A96A-E1FE87196C86\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:5.0.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"E727CECE-E452-489A-A42F-5A069D6AF80E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:5.0.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"149A1FB8-593E-412B-8E1C-3E560301D500\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:5.0.0:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D6E8982-D7AE-4A52-8F7C-A4D59D2A2CA4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:5.0.0:beta4:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FC144FA-8F84-44C0-B263-B639FEAD20FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:5.0.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"295907B4-C3DE-4021-BE3B-A8826D4379E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:5.0.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBC98F82-6E1D-4A89-8ED4-ECD9BD954EB4\"}]}]}],\"references\":[{\"url\":\"http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000847\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.grok.org.uk/pipermail/full-disclosure/2004-July/023908.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"URL Repurposed\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=108981780109154\u0026w=2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=108982983426031\u0026w=2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=109051444105182\u0026w=2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=109181600614477\u0026w=2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2004/dsa-531\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.debian.org/security/2005/dsa-669\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://www.gentoo.org/security/en/glsa/glsa-200407-13.xml\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:068\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.novell.com/linux/security/advisories/2004_21_php4.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2004-392.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2004-395.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2004-405.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2005-816.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.securityfocus.com/bid/10725\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.trustix.org/errata/2004/0039/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/16693\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10896\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]}]}}" } }
rhsa-2004_392
Vulnerability from csaf_redhat
Published
2004-07-19 20:42
Modified
2024-11-05 16:24
Summary
Red Hat Security Advisory: php security update
Notes
Topic
Updated php packages that fix various security issues are now available.
Details
PHP is an HTML-embedded scripting language commonly used with the Apache
HTTP server.
Stefan Esser discovered a flaw when memory_limit is enabled in versions of
PHP 4 before 4.3.8. If a remote attacker could force the PHP interpreter to
allocate more memory than the memory_limit setting before script execution
begins, then the attacker may be able to supply the contents of a PHP hash
table remotely. This hash table could then be used to execute arbitrary
code as the 'apache' user. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CAN-2004-0594 to this issue.
This issue has a higher risk when PHP is running on an instance of Apache
which is vulnerable to CAN-2004-0493. For Red Hat Enterprise Linux 3, this
Apache memory exhaustion issue was fixed by a previous update,
RHSA-2004:342. It may also be possible to exploit this issue if using a
non-default PHP configuration with the "register_defaults" setting is
changed to "On". Red Hat does not believe that this flaw is exploitable in
the default configuration of Red Hat Enterprise Linux 3.
Stefan Esser discovered a flaw in the strip_tags function in versions of
PHP before 4.3.8. The strip_tags function is commonly used by PHP scripts
to prevent Cross-Site-Scripting attacks by removing HTML tags from
user-supplied form data. By embedding NUL bytes into form data, HTML tags
can in some cases be passed intact through the strip_tags function, which
may allow a Cross-Site-Scripting attack. The Common Vulnerabilities and
Exposures project (cve.mitre.org) has assigned the name CAN-2004-0595 to
this issue.
All users of PHP are advised to upgrade to these updated packages, which
contain backported patches that address these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated php packages that fix various security issues are now available.", "title": "Topic" }, { "category": "general", "text": "PHP is an HTML-embedded scripting language commonly used with the Apache\nHTTP server.\n\nStefan Esser discovered a flaw when memory_limit is enabled in versions of\nPHP 4 before 4.3.8. If a remote attacker could force the PHP interpreter to\nallocate more memory than the memory_limit setting before script execution\nbegins, then the attacker may be able to supply the contents of a PHP hash\ntable remotely. This hash table could then be used to execute arbitrary\ncode as the \u0027apache\u0027 user. The Common Vulnerabilities and Exposures project\n(cve.mitre.org) has assigned the name CAN-2004-0594 to this issue.\n\nThis issue has a higher risk when PHP is running on an instance of Apache\nwhich is vulnerable to CAN-2004-0493. For Red Hat Enterprise Linux 3, this\nApache memory exhaustion issue was fixed by a previous update,\nRHSA-2004:342. It may also be possible to exploit this issue if using a\nnon-default PHP configuration with the \"register_defaults\" setting is\nchanged to \"On\". Red Hat does not believe that this flaw is exploitable in\nthe default configuration of Red Hat Enterprise Linux 3.\n\nStefan Esser discovered a flaw in the strip_tags function in versions of\nPHP before 4.3.8. The strip_tags function is commonly used by PHP scripts\nto prevent Cross-Site-Scripting attacks by removing HTML tags from\nuser-supplied form data. By embedding NUL bytes into form data, HTML tags\ncan in some cases be passed intact through the strip_tags function, which\nmay allow a Cross-Site-Scripting attack. The Common Vulnerabilities and\nExposures project (cve.mitre.org) has assigned the name CAN-2004-0595 to\nthis issue. \n\nAll users of PHP are advised to upgrade to these updated packages, which\ncontain backported patches that address these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2004:392", "url": "https://access.redhat.com/errata/RHSA-2004:392" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "127642", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=127642" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2004/rhsa-2004_392.json" } ], "title": "Red Hat Security Advisory: php security update", "tracking": { "current_release_date": "2024-11-05T16:24:01+00:00", "generator": { "date": "2024-11-05T16:24:01+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2004:392", "initial_release_date": "2004-07-19T20:42:00+00:00", "revision_history": [ { "date": "2004-07-19T20:42:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2004-07-19T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T16:24:01+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 3", "product": { "name": "Red Hat Enterprise Linux AS version 3", "product_id": "3AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::as" } } }, { "category": "product_name", "name": "Red Hat Desktop version 3", "product": { "name": "Red Hat Desktop version 3", "product_id": "3Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 3", "product": { "name": "Red Hat Enterprise Linux ES version 3", "product_id": "3ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 3", "product": { "name": "Red Hat Enterprise Linux WS version 3", "product_id": "3WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "php-odbc-0:4.3.2-11.1.ent.ia64", "product": { "name": "php-odbc-0:4.3.2-11.1.ent.ia64", "product_id": "php-odbc-0:4.3.2-11.1.ent.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-odbc@4.3.2-11.1.ent?arch=ia64" } } }, { "category": "product_version", "name": "php-devel-0:4.3.2-11.1.ent.ia64", "product": { "name": "php-devel-0:4.3.2-11.1.ent.ia64", "product_id": "php-devel-0:4.3.2-11.1.ent.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-devel@4.3.2-11.1.ent?arch=ia64" } } }, { "category": "product_version", "name": "php-pgsql-0:4.3.2-11.1.ent.ia64", "product": { "name": "php-pgsql-0:4.3.2-11.1.ent.ia64", "product_id": "php-pgsql-0:4.3.2-11.1.ent.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-pgsql@4.3.2-11.1.ent?arch=ia64" } } }, { "category": "product_version", "name": "php-ldap-0:4.3.2-11.1.ent.ia64", "product": { "name": "php-ldap-0:4.3.2-11.1.ent.ia64", "product_id": "php-ldap-0:4.3.2-11.1.ent.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-ldap@4.3.2-11.1.ent?arch=ia64" } } }, { "category": "product_version", "name": "php-0:4.3.2-11.1.ent.ia64", "product": { "name": "php-0:4.3.2-11.1.ent.ia64", "product_id": "php-0:4.3.2-11.1.ent.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/php@4.3.2-11.1.ent?arch=ia64" } } }, { "category": "product_version", "name": "php-mysql-0:4.3.2-11.1.ent.ia64", "product": { "name": "php-mysql-0:4.3.2-11.1.ent.ia64", "product_id": "php-mysql-0:4.3.2-11.1.ent.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-mysql@4.3.2-11.1.ent?arch=ia64" } } }, { "category": "product_version", "name": "php-debuginfo-0:4.3.2-11.1.ent.ia64", "product": { "name": "php-debuginfo-0:4.3.2-11.1.ent.ia64", "product_id": "php-debuginfo-0:4.3.2-11.1.ent.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-debuginfo@4.3.2-11.1.ent?arch=ia64" } } }, { "category": "product_version", "name": "php-imap-0:4.3.2-11.1.ent.ia64", "product": { "name": "php-imap-0:4.3.2-11.1.ent.ia64", "product_id": "php-imap-0:4.3.2-11.1.ent.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-imap@4.3.2-11.1.ent?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "php-odbc-0:4.3.2-11.1.ent.x86_64", "product": { "name": "php-odbc-0:4.3.2-11.1.ent.x86_64", "product_id": "php-odbc-0:4.3.2-11.1.ent.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-odbc@4.3.2-11.1.ent?arch=x86_64" } } }, { "category": "product_version", "name": "php-devel-0:4.3.2-11.1.ent.x86_64", "product": { "name": "php-devel-0:4.3.2-11.1.ent.x86_64", "product_id": "php-devel-0:4.3.2-11.1.ent.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-devel@4.3.2-11.1.ent?arch=x86_64" } } }, { "category": "product_version", "name": "php-pgsql-0:4.3.2-11.1.ent.x86_64", "product": { "name": "php-pgsql-0:4.3.2-11.1.ent.x86_64", "product_id": "php-pgsql-0:4.3.2-11.1.ent.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-pgsql@4.3.2-11.1.ent?arch=x86_64" } } }, { "category": "product_version", "name": "php-ldap-0:4.3.2-11.1.ent.x86_64", "product": { "name": "php-ldap-0:4.3.2-11.1.ent.x86_64", "product_id": "php-ldap-0:4.3.2-11.1.ent.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-ldap@4.3.2-11.1.ent?arch=x86_64" } } }, { "category": "product_version", "name": "php-0:4.3.2-11.1.ent.x86_64", "product": { "name": "php-0:4.3.2-11.1.ent.x86_64", "product_id": "php-0:4.3.2-11.1.ent.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/php@4.3.2-11.1.ent?arch=x86_64" } } }, { "category": "product_version", "name": "php-mysql-0:4.3.2-11.1.ent.x86_64", "product": { "name": "php-mysql-0:4.3.2-11.1.ent.x86_64", "product_id": "php-mysql-0:4.3.2-11.1.ent.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-mysql@4.3.2-11.1.ent?arch=x86_64" } } }, { "category": "product_version", "name": "php-debuginfo-0:4.3.2-11.1.ent.x86_64", "product": { "name": "php-debuginfo-0:4.3.2-11.1.ent.x86_64", "product_id": "php-debuginfo-0:4.3.2-11.1.ent.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-debuginfo@4.3.2-11.1.ent?arch=x86_64" } } }, { "category": "product_version", "name": "php-imap-0:4.3.2-11.1.ent.x86_64", "product": { "name": "php-imap-0:4.3.2-11.1.ent.x86_64", "product_id": "php-imap-0:4.3.2-11.1.ent.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-imap@4.3.2-11.1.ent?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "php-odbc-0:4.3.2-11.1.ent.i386", "product": { "name": "php-odbc-0:4.3.2-11.1.ent.i386", "product_id": "php-odbc-0:4.3.2-11.1.ent.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-odbc@4.3.2-11.1.ent?arch=i386" } } }, { "category": "product_version", "name": "php-devel-0:4.3.2-11.1.ent.i386", "product": { "name": "php-devel-0:4.3.2-11.1.ent.i386", "product_id": "php-devel-0:4.3.2-11.1.ent.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-devel@4.3.2-11.1.ent?arch=i386" } } }, { "category": "product_version", "name": "php-pgsql-0:4.3.2-11.1.ent.i386", "product": { "name": "php-pgsql-0:4.3.2-11.1.ent.i386", "product_id": "php-pgsql-0:4.3.2-11.1.ent.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-pgsql@4.3.2-11.1.ent?arch=i386" } } }, { "category": "product_version", "name": "php-ldap-0:4.3.2-11.1.ent.i386", "product": { "name": "php-ldap-0:4.3.2-11.1.ent.i386", "product_id": "php-ldap-0:4.3.2-11.1.ent.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-ldap@4.3.2-11.1.ent?arch=i386" } } }, { "category": "product_version", "name": "php-0:4.3.2-11.1.ent.i386", "product": { "name": "php-0:4.3.2-11.1.ent.i386", "product_id": "php-0:4.3.2-11.1.ent.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/php@4.3.2-11.1.ent?arch=i386" } } }, { "category": "product_version", "name": "php-mysql-0:4.3.2-11.1.ent.i386", "product": { "name": "php-mysql-0:4.3.2-11.1.ent.i386", "product_id": "php-mysql-0:4.3.2-11.1.ent.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-mysql@4.3.2-11.1.ent?arch=i386" } } }, { "category": "product_version", "name": "php-debuginfo-0:4.3.2-11.1.ent.i386", "product": { "name": "php-debuginfo-0:4.3.2-11.1.ent.i386", "product_id": "php-debuginfo-0:4.3.2-11.1.ent.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-debuginfo@4.3.2-11.1.ent?arch=i386" } } }, { "category": "product_version", "name": "php-imap-0:4.3.2-11.1.ent.i386", "product": { "name": "php-imap-0:4.3.2-11.1.ent.i386", "product_id": "php-imap-0:4.3.2-11.1.ent.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-imap@4.3.2-11.1.ent?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "php-0:4.3.2-11.1.ent.src", "product": { "name": "php-0:4.3.2-11.1.ent.src", "product_id": "php-0:4.3.2-11.1.ent.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/php@4.3.2-11.1.ent?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "php-odbc-0:4.3.2-11.1.ent.ppc", "product": { "name": "php-odbc-0:4.3.2-11.1.ent.ppc", "product_id": "php-odbc-0:4.3.2-11.1.ent.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-odbc@4.3.2-11.1.ent?arch=ppc" } } }, { "category": "product_version", "name": "php-devel-0:4.3.2-11.1.ent.ppc", "product": { "name": "php-devel-0:4.3.2-11.1.ent.ppc", "product_id": "php-devel-0:4.3.2-11.1.ent.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-devel@4.3.2-11.1.ent?arch=ppc" } } }, { "category": "product_version", "name": "php-pgsql-0:4.3.2-11.1.ent.ppc", "product": { "name": "php-pgsql-0:4.3.2-11.1.ent.ppc", "product_id": "php-pgsql-0:4.3.2-11.1.ent.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-pgsql@4.3.2-11.1.ent?arch=ppc" } } }, { "category": "product_version", "name": "php-ldap-0:4.3.2-11.1.ent.ppc", "product": { "name": "php-ldap-0:4.3.2-11.1.ent.ppc", "product_id": "php-ldap-0:4.3.2-11.1.ent.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-ldap@4.3.2-11.1.ent?arch=ppc" } } }, { "category": "product_version", "name": "php-0:4.3.2-11.1.ent.ppc", "product": { "name": "php-0:4.3.2-11.1.ent.ppc", "product_id": "php-0:4.3.2-11.1.ent.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/php@4.3.2-11.1.ent?arch=ppc" } } }, { "category": "product_version", "name": "php-mysql-0:4.3.2-11.1.ent.ppc", "product": { "name": "php-mysql-0:4.3.2-11.1.ent.ppc", "product_id": "php-mysql-0:4.3.2-11.1.ent.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-mysql@4.3.2-11.1.ent?arch=ppc" } } }, { "category": "product_version", "name": "php-debuginfo-0:4.3.2-11.1.ent.ppc", "product": { "name": "php-debuginfo-0:4.3.2-11.1.ent.ppc", "product_id": "php-debuginfo-0:4.3.2-11.1.ent.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-debuginfo@4.3.2-11.1.ent?arch=ppc" } } }, { "category": "product_version", "name": "php-imap-0:4.3.2-11.1.ent.ppc", "product": { "name": "php-imap-0:4.3.2-11.1.ent.ppc", "product_id": "php-imap-0:4.3.2-11.1.ent.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-imap@4.3.2-11.1.ent?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "php-odbc-0:4.3.2-11.1.ent.s390x", "product": { "name": "php-odbc-0:4.3.2-11.1.ent.s390x", "product_id": "php-odbc-0:4.3.2-11.1.ent.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-odbc@4.3.2-11.1.ent?arch=s390x" } } }, { "category": "product_version", "name": "php-devel-0:4.3.2-11.1.ent.s390x", "product": { "name": "php-devel-0:4.3.2-11.1.ent.s390x", "product_id": "php-devel-0:4.3.2-11.1.ent.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-devel@4.3.2-11.1.ent?arch=s390x" } } }, { "category": "product_version", "name": "php-pgsql-0:4.3.2-11.1.ent.s390x", "product": { "name": "php-pgsql-0:4.3.2-11.1.ent.s390x", "product_id": "php-pgsql-0:4.3.2-11.1.ent.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-pgsql@4.3.2-11.1.ent?arch=s390x" } } }, { "category": "product_version", "name": "php-ldap-0:4.3.2-11.1.ent.s390x", "product": { "name": "php-ldap-0:4.3.2-11.1.ent.s390x", "product_id": "php-ldap-0:4.3.2-11.1.ent.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-ldap@4.3.2-11.1.ent?arch=s390x" } } }, { "category": "product_version", "name": "php-0:4.3.2-11.1.ent.s390x", "product": { "name": "php-0:4.3.2-11.1.ent.s390x", "product_id": "php-0:4.3.2-11.1.ent.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/php@4.3.2-11.1.ent?arch=s390x" } } }, { "category": "product_version", "name": "php-mysql-0:4.3.2-11.1.ent.s390x", "product": { "name": "php-mysql-0:4.3.2-11.1.ent.s390x", "product_id": "php-mysql-0:4.3.2-11.1.ent.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-mysql@4.3.2-11.1.ent?arch=s390x" } } }, { "category": "product_version", "name": "php-debuginfo-0:4.3.2-11.1.ent.s390x", "product": { "name": "php-debuginfo-0:4.3.2-11.1.ent.s390x", "product_id": "php-debuginfo-0:4.3.2-11.1.ent.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-debuginfo@4.3.2-11.1.ent?arch=s390x" } } }, { "category": "product_version", "name": "php-imap-0:4.3.2-11.1.ent.s390x", "product": { "name": "php-imap-0:4.3.2-11.1.ent.s390x", "product_id": "php-imap-0:4.3.2-11.1.ent.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-imap@4.3.2-11.1.ent?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "php-odbc-0:4.3.2-11.1.ent.s390", "product": { "name": "php-odbc-0:4.3.2-11.1.ent.s390", "product_id": "php-odbc-0:4.3.2-11.1.ent.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-odbc@4.3.2-11.1.ent?arch=s390" } } }, { "category": "product_version", "name": "php-devel-0:4.3.2-11.1.ent.s390", "product": { "name": "php-devel-0:4.3.2-11.1.ent.s390", "product_id": "php-devel-0:4.3.2-11.1.ent.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-devel@4.3.2-11.1.ent?arch=s390" } } }, { "category": "product_version", "name": "php-pgsql-0:4.3.2-11.1.ent.s390", "product": { "name": "php-pgsql-0:4.3.2-11.1.ent.s390", "product_id": "php-pgsql-0:4.3.2-11.1.ent.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-pgsql@4.3.2-11.1.ent?arch=s390" } } }, { "category": "product_version", "name": "php-ldap-0:4.3.2-11.1.ent.s390", "product": { "name": "php-ldap-0:4.3.2-11.1.ent.s390", "product_id": "php-ldap-0:4.3.2-11.1.ent.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-ldap@4.3.2-11.1.ent?arch=s390" } } }, { "category": "product_version", "name": "php-0:4.3.2-11.1.ent.s390", "product": { "name": "php-0:4.3.2-11.1.ent.s390", "product_id": "php-0:4.3.2-11.1.ent.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/php@4.3.2-11.1.ent?arch=s390" } } }, { "category": "product_version", "name": "php-mysql-0:4.3.2-11.1.ent.s390", "product": { "name": "php-mysql-0:4.3.2-11.1.ent.s390", "product_id": "php-mysql-0:4.3.2-11.1.ent.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-mysql@4.3.2-11.1.ent?arch=s390" } } }, { "category": "product_version", "name": "php-debuginfo-0:4.3.2-11.1.ent.s390", "product": { "name": "php-debuginfo-0:4.3.2-11.1.ent.s390", "product_id": "php-debuginfo-0:4.3.2-11.1.ent.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-debuginfo@4.3.2-11.1.ent?arch=s390" } } }, { "category": "product_version", "name": "php-imap-0:4.3.2-11.1.ent.s390", "product": { "name": "php-imap-0:4.3.2-11.1.ent.s390", "product_id": "php-imap-0:4.3.2-11.1.ent.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-imap@4.3.2-11.1.ent?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.2-11.1.ent.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-0:4.3.2-11.1.ent.i386" }, "product_reference": "php-0:4.3.2-11.1.ent.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.2-11.1.ent.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-0:4.3.2-11.1.ent.ia64" }, "product_reference": "php-0:4.3.2-11.1.ent.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.2-11.1.ent.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-0:4.3.2-11.1.ent.ppc" }, "product_reference": "php-0:4.3.2-11.1.ent.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.2-11.1.ent.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-0:4.3.2-11.1.ent.s390" }, "product_reference": "php-0:4.3.2-11.1.ent.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.2-11.1.ent.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-0:4.3.2-11.1.ent.s390x" }, "product_reference": "php-0:4.3.2-11.1.ent.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.2-11.1.ent.src as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-0:4.3.2-11.1.ent.src" }, "product_reference": "php-0:4.3.2-11.1.ent.src", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.2-11.1.ent.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-0:4.3.2-11.1.ent.x86_64" }, "product_reference": "php-0:4.3.2-11.1.ent.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-debuginfo-0:4.3.2-11.1.ent.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-debuginfo-0:4.3.2-11.1.ent.i386" }, "product_reference": "php-debuginfo-0:4.3.2-11.1.ent.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-debuginfo-0:4.3.2-11.1.ent.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-debuginfo-0:4.3.2-11.1.ent.ia64" }, "product_reference": "php-debuginfo-0:4.3.2-11.1.ent.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-debuginfo-0:4.3.2-11.1.ent.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-debuginfo-0:4.3.2-11.1.ent.ppc" }, "product_reference": "php-debuginfo-0:4.3.2-11.1.ent.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-debuginfo-0:4.3.2-11.1.ent.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-debuginfo-0:4.3.2-11.1.ent.s390" }, "product_reference": "php-debuginfo-0:4.3.2-11.1.ent.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-debuginfo-0:4.3.2-11.1.ent.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-debuginfo-0:4.3.2-11.1.ent.s390x" }, "product_reference": "php-debuginfo-0:4.3.2-11.1.ent.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-debuginfo-0:4.3.2-11.1.ent.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-debuginfo-0:4.3.2-11.1.ent.x86_64" }, "product_reference": "php-debuginfo-0:4.3.2-11.1.ent.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-devel-0:4.3.2-11.1.ent.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-devel-0:4.3.2-11.1.ent.i386" }, "product_reference": "php-devel-0:4.3.2-11.1.ent.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-devel-0:4.3.2-11.1.ent.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-devel-0:4.3.2-11.1.ent.ia64" }, "product_reference": "php-devel-0:4.3.2-11.1.ent.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-devel-0:4.3.2-11.1.ent.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-devel-0:4.3.2-11.1.ent.ppc" }, "product_reference": "php-devel-0:4.3.2-11.1.ent.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-devel-0:4.3.2-11.1.ent.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-devel-0:4.3.2-11.1.ent.s390" }, "product_reference": "php-devel-0:4.3.2-11.1.ent.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-devel-0:4.3.2-11.1.ent.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-devel-0:4.3.2-11.1.ent.s390x" }, "product_reference": "php-devel-0:4.3.2-11.1.ent.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-devel-0:4.3.2-11.1.ent.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-devel-0:4.3.2-11.1.ent.x86_64" }, "product_reference": "php-devel-0:4.3.2-11.1.ent.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-imap-0:4.3.2-11.1.ent.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-imap-0:4.3.2-11.1.ent.i386" }, "product_reference": "php-imap-0:4.3.2-11.1.ent.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-imap-0:4.3.2-11.1.ent.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-imap-0:4.3.2-11.1.ent.ia64" }, "product_reference": "php-imap-0:4.3.2-11.1.ent.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-imap-0:4.3.2-11.1.ent.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-imap-0:4.3.2-11.1.ent.ppc" }, "product_reference": "php-imap-0:4.3.2-11.1.ent.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-imap-0:4.3.2-11.1.ent.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-imap-0:4.3.2-11.1.ent.s390" }, "product_reference": "php-imap-0:4.3.2-11.1.ent.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-imap-0:4.3.2-11.1.ent.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-imap-0:4.3.2-11.1.ent.s390x" }, "product_reference": "php-imap-0:4.3.2-11.1.ent.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-imap-0:4.3.2-11.1.ent.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-imap-0:4.3.2-11.1.ent.x86_64" }, "product_reference": "php-imap-0:4.3.2-11.1.ent.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-ldap-0:4.3.2-11.1.ent.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-ldap-0:4.3.2-11.1.ent.i386" }, "product_reference": "php-ldap-0:4.3.2-11.1.ent.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-ldap-0:4.3.2-11.1.ent.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-ldap-0:4.3.2-11.1.ent.ia64" }, "product_reference": "php-ldap-0:4.3.2-11.1.ent.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-ldap-0:4.3.2-11.1.ent.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-ldap-0:4.3.2-11.1.ent.ppc" }, "product_reference": "php-ldap-0:4.3.2-11.1.ent.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-ldap-0:4.3.2-11.1.ent.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-ldap-0:4.3.2-11.1.ent.s390" }, "product_reference": "php-ldap-0:4.3.2-11.1.ent.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-ldap-0:4.3.2-11.1.ent.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-ldap-0:4.3.2-11.1.ent.s390x" }, "product_reference": "php-ldap-0:4.3.2-11.1.ent.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-ldap-0:4.3.2-11.1.ent.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-ldap-0:4.3.2-11.1.ent.x86_64" }, "product_reference": "php-ldap-0:4.3.2-11.1.ent.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-mysql-0:4.3.2-11.1.ent.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-mysql-0:4.3.2-11.1.ent.i386" }, "product_reference": "php-mysql-0:4.3.2-11.1.ent.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-mysql-0:4.3.2-11.1.ent.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-mysql-0:4.3.2-11.1.ent.ia64" }, "product_reference": "php-mysql-0:4.3.2-11.1.ent.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-mysql-0:4.3.2-11.1.ent.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-mysql-0:4.3.2-11.1.ent.ppc" }, "product_reference": "php-mysql-0:4.3.2-11.1.ent.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-mysql-0:4.3.2-11.1.ent.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-mysql-0:4.3.2-11.1.ent.s390" }, "product_reference": "php-mysql-0:4.3.2-11.1.ent.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-mysql-0:4.3.2-11.1.ent.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-mysql-0:4.3.2-11.1.ent.s390x" }, "product_reference": "php-mysql-0:4.3.2-11.1.ent.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-mysql-0:4.3.2-11.1.ent.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-mysql-0:4.3.2-11.1.ent.x86_64" }, "product_reference": "php-mysql-0:4.3.2-11.1.ent.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-odbc-0:4.3.2-11.1.ent.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-odbc-0:4.3.2-11.1.ent.i386" }, "product_reference": "php-odbc-0:4.3.2-11.1.ent.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-odbc-0:4.3.2-11.1.ent.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-odbc-0:4.3.2-11.1.ent.ia64" }, "product_reference": "php-odbc-0:4.3.2-11.1.ent.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-odbc-0:4.3.2-11.1.ent.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-odbc-0:4.3.2-11.1.ent.ppc" }, "product_reference": "php-odbc-0:4.3.2-11.1.ent.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-odbc-0:4.3.2-11.1.ent.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-odbc-0:4.3.2-11.1.ent.s390" }, "product_reference": "php-odbc-0:4.3.2-11.1.ent.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-odbc-0:4.3.2-11.1.ent.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-odbc-0:4.3.2-11.1.ent.s390x" }, "product_reference": "php-odbc-0:4.3.2-11.1.ent.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-odbc-0:4.3.2-11.1.ent.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-odbc-0:4.3.2-11.1.ent.x86_64" }, "product_reference": "php-odbc-0:4.3.2-11.1.ent.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-pgsql-0:4.3.2-11.1.ent.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-pgsql-0:4.3.2-11.1.ent.i386" }, "product_reference": "php-pgsql-0:4.3.2-11.1.ent.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-pgsql-0:4.3.2-11.1.ent.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-pgsql-0:4.3.2-11.1.ent.ia64" }, "product_reference": "php-pgsql-0:4.3.2-11.1.ent.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-pgsql-0:4.3.2-11.1.ent.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-pgsql-0:4.3.2-11.1.ent.ppc" }, "product_reference": "php-pgsql-0:4.3.2-11.1.ent.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-pgsql-0:4.3.2-11.1.ent.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-pgsql-0:4.3.2-11.1.ent.s390" }, "product_reference": "php-pgsql-0:4.3.2-11.1.ent.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-pgsql-0:4.3.2-11.1.ent.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-pgsql-0:4.3.2-11.1.ent.s390x" }, "product_reference": "php-pgsql-0:4.3.2-11.1.ent.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-pgsql-0:4.3.2-11.1.ent.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:php-pgsql-0:4.3.2-11.1.ent.x86_64" }, "product_reference": "php-pgsql-0:4.3.2-11.1.ent.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.2-11.1.ent.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-0:4.3.2-11.1.ent.i386" }, "product_reference": "php-0:4.3.2-11.1.ent.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.2-11.1.ent.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-0:4.3.2-11.1.ent.ia64" }, "product_reference": "php-0:4.3.2-11.1.ent.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.2-11.1.ent.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-0:4.3.2-11.1.ent.ppc" }, "product_reference": "php-0:4.3.2-11.1.ent.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.2-11.1.ent.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-0:4.3.2-11.1.ent.s390" }, "product_reference": "php-0:4.3.2-11.1.ent.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.2-11.1.ent.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-0:4.3.2-11.1.ent.s390x" }, "product_reference": "php-0:4.3.2-11.1.ent.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.2-11.1.ent.src as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-0:4.3.2-11.1.ent.src" }, "product_reference": "php-0:4.3.2-11.1.ent.src", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.2-11.1.ent.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-0:4.3.2-11.1.ent.x86_64" }, "product_reference": "php-0:4.3.2-11.1.ent.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-debuginfo-0:4.3.2-11.1.ent.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-debuginfo-0:4.3.2-11.1.ent.i386" }, "product_reference": "php-debuginfo-0:4.3.2-11.1.ent.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-debuginfo-0:4.3.2-11.1.ent.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-debuginfo-0:4.3.2-11.1.ent.ia64" }, "product_reference": "php-debuginfo-0:4.3.2-11.1.ent.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-debuginfo-0:4.3.2-11.1.ent.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-debuginfo-0:4.3.2-11.1.ent.ppc" }, "product_reference": "php-debuginfo-0:4.3.2-11.1.ent.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-debuginfo-0:4.3.2-11.1.ent.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-debuginfo-0:4.3.2-11.1.ent.s390" }, "product_reference": "php-debuginfo-0:4.3.2-11.1.ent.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-debuginfo-0:4.3.2-11.1.ent.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-debuginfo-0:4.3.2-11.1.ent.s390x" }, "product_reference": "php-debuginfo-0:4.3.2-11.1.ent.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-debuginfo-0:4.3.2-11.1.ent.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-debuginfo-0:4.3.2-11.1.ent.x86_64" }, "product_reference": "php-debuginfo-0:4.3.2-11.1.ent.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-devel-0:4.3.2-11.1.ent.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-devel-0:4.3.2-11.1.ent.i386" }, "product_reference": "php-devel-0:4.3.2-11.1.ent.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-devel-0:4.3.2-11.1.ent.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-devel-0:4.3.2-11.1.ent.ia64" }, "product_reference": "php-devel-0:4.3.2-11.1.ent.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-devel-0:4.3.2-11.1.ent.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-devel-0:4.3.2-11.1.ent.ppc" }, "product_reference": "php-devel-0:4.3.2-11.1.ent.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-devel-0:4.3.2-11.1.ent.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-devel-0:4.3.2-11.1.ent.s390" }, "product_reference": "php-devel-0:4.3.2-11.1.ent.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-devel-0:4.3.2-11.1.ent.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-devel-0:4.3.2-11.1.ent.s390x" }, "product_reference": "php-devel-0:4.3.2-11.1.ent.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-devel-0:4.3.2-11.1.ent.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-devel-0:4.3.2-11.1.ent.x86_64" }, "product_reference": "php-devel-0:4.3.2-11.1.ent.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-imap-0:4.3.2-11.1.ent.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-imap-0:4.3.2-11.1.ent.i386" }, "product_reference": "php-imap-0:4.3.2-11.1.ent.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-imap-0:4.3.2-11.1.ent.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-imap-0:4.3.2-11.1.ent.ia64" }, "product_reference": "php-imap-0:4.3.2-11.1.ent.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-imap-0:4.3.2-11.1.ent.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-imap-0:4.3.2-11.1.ent.ppc" }, "product_reference": "php-imap-0:4.3.2-11.1.ent.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-imap-0:4.3.2-11.1.ent.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-imap-0:4.3.2-11.1.ent.s390" }, "product_reference": "php-imap-0:4.3.2-11.1.ent.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-imap-0:4.3.2-11.1.ent.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-imap-0:4.3.2-11.1.ent.s390x" }, "product_reference": "php-imap-0:4.3.2-11.1.ent.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-imap-0:4.3.2-11.1.ent.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-imap-0:4.3.2-11.1.ent.x86_64" }, "product_reference": "php-imap-0:4.3.2-11.1.ent.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-ldap-0:4.3.2-11.1.ent.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-ldap-0:4.3.2-11.1.ent.i386" }, "product_reference": "php-ldap-0:4.3.2-11.1.ent.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-ldap-0:4.3.2-11.1.ent.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-ldap-0:4.3.2-11.1.ent.ia64" }, "product_reference": "php-ldap-0:4.3.2-11.1.ent.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-ldap-0:4.3.2-11.1.ent.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-ldap-0:4.3.2-11.1.ent.ppc" }, "product_reference": "php-ldap-0:4.3.2-11.1.ent.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-ldap-0:4.3.2-11.1.ent.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-ldap-0:4.3.2-11.1.ent.s390" }, "product_reference": "php-ldap-0:4.3.2-11.1.ent.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-ldap-0:4.3.2-11.1.ent.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-ldap-0:4.3.2-11.1.ent.s390x" }, "product_reference": "php-ldap-0:4.3.2-11.1.ent.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-ldap-0:4.3.2-11.1.ent.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-ldap-0:4.3.2-11.1.ent.x86_64" }, "product_reference": "php-ldap-0:4.3.2-11.1.ent.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-mysql-0:4.3.2-11.1.ent.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-mysql-0:4.3.2-11.1.ent.i386" }, "product_reference": "php-mysql-0:4.3.2-11.1.ent.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-mysql-0:4.3.2-11.1.ent.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-mysql-0:4.3.2-11.1.ent.ia64" }, "product_reference": "php-mysql-0:4.3.2-11.1.ent.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-mysql-0:4.3.2-11.1.ent.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-mysql-0:4.3.2-11.1.ent.ppc" }, "product_reference": "php-mysql-0:4.3.2-11.1.ent.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-mysql-0:4.3.2-11.1.ent.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-mysql-0:4.3.2-11.1.ent.s390" }, "product_reference": "php-mysql-0:4.3.2-11.1.ent.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-mysql-0:4.3.2-11.1.ent.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-mysql-0:4.3.2-11.1.ent.s390x" }, "product_reference": "php-mysql-0:4.3.2-11.1.ent.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-mysql-0:4.3.2-11.1.ent.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-mysql-0:4.3.2-11.1.ent.x86_64" }, "product_reference": "php-mysql-0:4.3.2-11.1.ent.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-odbc-0:4.3.2-11.1.ent.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-odbc-0:4.3.2-11.1.ent.i386" }, "product_reference": "php-odbc-0:4.3.2-11.1.ent.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-odbc-0:4.3.2-11.1.ent.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-odbc-0:4.3.2-11.1.ent.ia64" }, "product_reference": "php-odbc-0:4.3.2-11.1.ent.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-odbc-0:4.3.2-11.1.ent.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-odbc-0:4.3.2-11.1.ent.ppc" }, "product_reference": "php-odbc-0:4.3.2-11.1.ent.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-odbc-0:4.3.2-11.1.ent.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-odbc-0:4.3.2-11.1.ent.s390" }, "product_reference": "php-odbc-0:4.3.2-11.1.ent.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-odbc-0:4.3.2-11.1.ent.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-odbc-0:4.3.2-11.1.ent.s390x" }, "product_reference": "php-odbc-0:4.3.2-11.1.ent.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-odbc-0:4.3.2-11.1.ent.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-odbc-0:4.3.2-11.1.ent.x86_64" }, "product_reference": "php-odbc-0:4.3.2-11.1.ent.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-pgsql-0:4.3.2-11.1.ent.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-pgsql-0:4.3.2-11.1.ent.i386" }, "product_reference": "php-pgsql-0:4.3.2-11.1.ent.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-pgsql-0:4.3.2-11.1.ent.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-pgsql-0:4.3.2-11.1.ent.ia64" }, "product_reference": "php-pgsql-0:4.3.2-11.1.ent.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-pgsql-0:4.3.2-11.1.ent.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-pgsql-0:4.3.2-11.1.ent.ppc" }, "product_reference": "php-pgsql-0:4.3.2-11.1.ent.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-pgsql-0:4.3.2-11.1.ent.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-pgsql-0:4.3.2-11.1.ent.s390" }, "product_reference": "php-pgsql-0:4.3.2-11.1.ent.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-pgsql-0:4.3.2-11.1.ent.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-pgsql-0:4.3.2-11.1.ent.s390x" }, "product_reference": "php-pgsql-0:4.3.2-11.1.ent.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-pgsql-0:4.3.2-11.1.ent.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:php-pgsql-0:4.3.2-11.1.ent.x86_64" }, "product_reference": "php-pgsql-0:4.3.2-11.1.ent.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.2-11.1.ent.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-0:4.3.2-11.1.ent.i386" }, "product_reference": "php-0:4.3.2-11.1.ent.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.2-11.1.ent.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-0:4.3.2-11.1.ent.ia64" }, "product_reference": "php-0:4.3.2-11.1.ent.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.2-11.1.ent.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-0:4.3.2-11.1.ent.ppc" }, "product_reference": "php-0:4.3.2-11.1.ent.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.2-11.1.ent.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-0:4.3.2-11.1.ent.s390" }, "product_reference": "php-0:4.3.2-11.1.ent.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.2-11.1.ent.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-0:4.3.2-11.1.ent.s390x" }, "product_reference": "php-0:4.3.2-11.1.ent.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.2-11.1.ent.src as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-0:4.3.2-11.1.ent.src" }, "product_reference": "php-0:4.3.2-11.1.ent.src", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.2-11.1.ent.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-0:4.3.2-11.1.ent.x86_64" }, "product_reference": "php-0:4.3.2-11.1.ent.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-debuginfo-0:4.3.2-11.1.ent.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-debuginfo-0:4.3.2-11.1.ent.i386" }, "product_reference": "php-debuginfo-0:4.3.2-11.1.ent.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-debuginfo-0:4.3.2-11.1.ent.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-debuginfo-0:4.3.2-11.1.ent.ia64" }, "product_reference": "php-debuginfo-0:4.3.2-11.1.ent.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-debuginfo-0:4.3.2-11.1.ent.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-debuginfo-0:4.3.2-11.1.ent.ppc" }, "product_reference": "php-debuginfo-0:4.3.2-11.1.ent.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-debuginfo-0:4.3.2-11.1.ent.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-debuginfo-0:4.3.2-11.1.ent.s390" }, "product_reference": "php-debuginfo-0:4.3.2-11.1.ent.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-debuginfo-0:4.3.2-11.1.ent.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-debuginfo-0:4.3.2-11.1.ent.s390x" }, "product_reference": "php-debuginfo-0:4.3.2-11.1.ent.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-debuginfo-0:4.3.2-11.1.ent.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-debuginfo-0:4.3.2-11.1.ent.x86_64" }, "product_reference": "php-debuginfo-0:4.3.2-11.1.ent.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-devel-0:4.3.2-11.1.ent.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-devel-0:4.3.2-11.1.ent.i386" }, "product_reference": "php-devel-0:4.3.2-11.1.ent.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-devel-0:4.3.2-11.1.ent.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-devel-0:4.3.2-11.1.ent.ia64" }, "product_reference": "php-devel-0:4.3.2-11.1.ent.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-devel-0:4.3.2-11.1.ent.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-devel-0:4.3.2-11.1.ent.ppc" }, "product_reference": "php-devel-0:4.3.2-11.1.ent.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-devel-0:4.3.2-11.1.ent.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-devel-0:4.3.2-11.1.ent.s390" }, "product_reference": "php-devel-0:4.3.2-11.1.ent.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-devel-0:4.3.2-11.1.ent.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-devel-0:4.3.2-11.1.ent.s390x" }, "product_reference": "php-devel-0:4.3.2-11.1.ent.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-devel-0:4.3.2-11.1.ent.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-devel-0:4.3.2-11.1.ent.x86_64" }, "product_reference": "php-devel-0:4.3.2-11.1.ent.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-imap-0:4.3.2-11.1.ent.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-imap-0:4.3.2-11.1.ent.i386" }, "product_reference": "php-imap-0:4.3.2-11.1.ent.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-imap-0:4.3.2-11.1.ent.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-imap-0:4.3.2-11.1.ent.ia64" }, "product_reference": "php-imap-0:4.3.2-11.1.ent.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-imap-0:4.3.2-11.1.ent.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-imap-0:4.3.2-11.1.ent.ppc" }, "product_reference": "php-imap-0:4.3.2-11.1.ent.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-imap-0:4.3.2-11.1.ent.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-imap-0:4.3.2-11.1.ent.s390" }, "product_reference": "php-imap-0:4.3.2-11.1.ent.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-imap-0:4.3.2-11.1.ent.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-imap-0:4.3.2-11.1.ent.s390x" }, "product_reference": "php-imap-0:4.3.2-11.1.ent.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-imap-0:4.3.2-11.1.ent.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-imap-0:4.3.2-11.1.ent.x86_64" }, "product_reference": "php-imap-0:4.3.2-11.1.ent.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-ldap-0:4.3.2-11.1.ent.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-ldap-0:4.3.2-11.1.ent.i386" }, "product_reference": "php-ldap-0:4.3.2-11.1.ent.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-ldap-0:4.3.2-11.1.ent.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-ldap-0:4.3.2-11.1.ent.ia64" }, "product_reference": "php-ldap-0:4.3.2-11.1.ent.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-ldap-0:4.3.2-11.1.ent.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-ldap-0:4.3.2-11.1.ent.ppc" }, "product_reference": "php-ldap-0:4.3.2-11.1.ent.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-ldap-0:4.3.2-11.1.ent.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-ldap-0:4.3.2-11.1.ent.s390" }, "product_reference": "php-ldap-0:4.3.2-11.1.ent.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-ldap-0:4.3.2-11.1.ent.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-ldap-0:4.3.2-11.1.ent.s390x" }, "product_reference": "php-ldap-0:4.3.2-11.1.ent.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-ldap-0:4.3.2-11.1.ent.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-ldap-0:4.3.2-11.1.ent.x86_64" }, "product_reference": "php-ldap-0:4.3.2-11.1.ent.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-mysql-0:4.3.2-11.1.ent.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-mysql-0:4.3.2-11.1.ent.i386" }, "product_reference": "php-mysql-0:4.3.2-11.1.ent.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-mysql-0:4.3.2-11.1.ent.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-mysql-0:4.3.2-11.1.ent.ia64" }, "product_reference": "php-mysql-0:4.3.2-11.1.ent.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-mysql-0:4.3.2-11.1.ent.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-mysql-0:4.3.2-11.1.ent.ppc" }, "product_reference": "php-mysql-0:4.3.2-11.1.ent.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-mysql-0:4.3.2-11.1.ent.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-mysql-0:4.3.2-11.1.ent.s390" }, "product_reference": "php-mysql-0:4.3.2-11.1.ent.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-mysql-0:4.3.2-11.1.ent.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-mysql-0:4.3.2-11.1.ent.s390x" }, "product_reference": "php-mysql-0:4.3.2-11.1.ent.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-mysql-0:4.3.2-11.1.ent.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-mysql-0:4.3.2-11.1.ent.x86_64" }, "product_reference": "php-mysql-0:4.3.2-11.1.ent.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-odbc-0:4.3.2-11.1.ent.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-odbc-0:4.3.2-11.1.ent.i386" }, "product_reference": "php-odbc-0:4.3.2-11.1.ent.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-odbc-0:4.3.2-11.1.ent.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-odbc-0:4.3.2-11.1.ent.ia64" }, "product_reference": "php-odbc-0:4.3.2-11.1.ent.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-odbc-0:4.3.2-11.1.ent.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-odbc-0:4.3.2-11.1.ent.ppc" }, "product_reference": "php-odbc-0:4.3.2-11.1.ent.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-odbc-0:4.3.2-11.1.ent.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-odbc-0:4.3.2-11.1.ent.s390" }, "product_reference": "php-odbc-0:4.3.2-11.1.ent.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-odbc-0:4.3.2-11.1.ent.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-odbc-0:4.3.2-11.1.ent.s390x" }, "product_reference": "php-odbc-0:4.3.2-11.1.ent.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-odbc-0:4.3.2-11.1.ent.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-odbc-0:4.3.2-11.1.ent.x86_64" }, "product_reference": "php-odbc-0:4.3.2-11.1.ent.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-pgsql-0:4.3.2-11.1.ent.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-pgsql-0:4.3.2-11.1.ent.i386" }, "product_reference": "php-pgsql-0:4.3.2-11.1.ent.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-pgsql-0:4.3.2-11.1.ent.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-pgsql-0:4.3.2-11.1.ent.ia64" }, "product_reference": "php-pgsql-0:4.3.2-11.1.ent.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-pgsql-0:4.3.2-11.1.ent.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-pgsql-0:4.3.2-11.1.ent.ppc" }, "product_reference": "php-pgsql-0:4.3.2-11.1.ent.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-pgsql-0:4.3.2-11.1.ent.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-pgsql-0:4.3.2-11.1.ent.s390" }, "product_reference": "php-pgsql-0:4.3.2-11.1.ent.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-pgsql-0:4.3.2-11.1.ent.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-pgsql-0:4.3.2-11.1.ent.s390x" }, "product_reference": "php-pgsql-0:4.3.2-11.1.ent.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-pgsql-0:4.3.2-11.1.ent.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:php-pgsql-0:4.3.2-11.1.ent.x86_64" }, "product_reference": "php-pgsql-0:4.3.2-11.1.ent.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.2-11.1.ent.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-0:4.3.2-11.1.ent.i386" }, "product_reference": "php-0:4.3.2-11.1.ent.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.2-11.1.ent.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-0:4.3.2-11.1.ent.ia64" }, "product_reference": "php-0:4.3.2-11.1.ent.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.2-11.1.ent.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-0:4.3.2-11.1.ent.ppc" }, "product_reference": "php-0:4.3.2-11.1.ent.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.2-11.1.ent.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-0:4.3.2-11.1.ent.s390" }, "product_reference": "php-0:4.3.2-11.1.ent.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.2-11.1.ent.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-0:4.3.2-11.1.ent.s390x" }, "product_reference": "php-0:4.3.2-11.1.ent.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.2-11.1.ent.src as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-0:4.3.2-11.1.ent.src" }, "product_reference": "php-0:4.3.2-11.1.ent.src", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.3.2-11.1.ent.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-0:4.3.2-11.1.ent.x86_64" }, "product_reference": "php-0:4.3.2-11.1.ent.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-debuginfo-0:4.3.2-11.1.ent.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-debuginfo-0:4.3.2-11.1.ent.i386" }, "product_reference": "php-debuginfo-0:4.3.2-11.1.ent.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-debuginfo-0:4.3.2-11.1.ent.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-debuginfo-0:4.3.2-11.1.ent.ia64" }, "product_reference": "php-debuginfo-0:4.3.2-11.1.ent.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-debuginfo-0:4.3.2-11.1.ent.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-debuginfo-0:4.3.2-11.1.ent.ppc" }, "product_reference": "php-debuginfo-0:4.3.2-11.1.ent.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-debuginfo-0:4.3.2-11.1.ent.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-debuginfo-0:4.3.2-11.1.ent.s390" }, "product_reference": "php-debuginfo-0:4.3.2-11.1.ent.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-debuginfo-0:4.3.2-11.1.ent.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-debuginfo-0:4.3.2-11.1.ent.s390x" }, "product_reference": "php-debuginfo-0:4.3.2-11.1.ent.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-debuginfo-0:4.3.2-11.1.ent.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-debuginfo-0:4.3.2-11.1.ent.x86_64" }, "product_reference": "php-debuginfo-0:4.3.2-11.1.ent.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-devel-0:4.3.2-11.1.ent.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-devel-0:4.3.2-11.1.ent.i386" }, "product_reference": "php-devel-0:4.3.2-11.1.ent.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-devel-0:4.3.2-11.1.ent.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-devel-0:4.3.2-11.1.ent.ia64" }, "product_reference": "php-devel-0:4.3.2-11.1.ent.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-devel-0:4.3.2-11.1.ent.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-devel-0:4.3.2-11.1.ent.ppc" }, "product_reference": "php-devel-0:4.3.2-11.1.ent.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-devel-0:4.3.2-11.1.ent.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-devel-0:4.3.2-11.1.ent.s390" }, "product_reference": "php-devel-0:4.3.2-11.1.ent.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-devel-0:4.3.2-11.1.ent.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-devel-0:4.3.2-11.1.ent.s390x" }, "product_reference": "php-devel-0:4.3.2-11.1.ent.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-devel-0:4.3.2-11.1.ent.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-devel-0:4.3.2-11.1.ent.x86_64" }, "product_reference": "php-devel-0:4.3.2-11.1.ent.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-imap-0:4.3.2-11.1.ent.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-imap-0:4.3.2-11.1.ent.i386" }, "product_reference": "php-imap-0:4.3.2-11.1.ent.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-imap-0:4.3.2-11.1.ent.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-imap-0:4.3.2-11.1.ent.ia64" }, "product_reference": "php-imap-0:4.3.2-11.1.ent.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-imap-0:4.3.2-11.1.ent.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-imap-0:4.3.2-11.1.ent.ppc" }, "product_reference": "php-imap-0:4.3.2-11.1.ent.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-imap-0:4.3.2-11.1.ent.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-imap-0:4.3.2-11.1.ent.s390" }, "product_reference": "php-imap-0:4.3.2-11.1.ent.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-imap-0:4.3.2-11.1.ent.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-imap-0:4.3.2-11.1.ent.s390x" }, "product_reference": "php-imap-0:4.3.2-11.1.ent.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-imap-0:4.3.2-11.1.ent.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-imap-0:4.3.2-11.1.ent.x86_64" }, "product_reference": "php-imap-0:4.3.2-11.1.ent.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-ldap-0:4.3.2-11.1.ent.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-ldap-0:4.3.2-11.1.ent.i386" }, "product_reference": "php-ldap-0:4.3.2-11.1.ent.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-ldap-0:4.3.2-11.1.ent.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-ldap-0:4.3.2-11.1.ent.ia64" }, "product_reference": "php-ldap-0:4.3.2-11.1.ent.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-ldap-0:4.3.2-11.1.ent.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-ldap-0:4.3.2-11.1.ent.ppc" }, "product_reference": "php-ldap-0:4.3.2-11.1.ent.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-ldap-0:4.3.2-11.1.ent.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-ldap-0:4.3.2-11.1.ent.s390" }, "product_reference": "php-ldap-0:4.3.2-11.1.ent.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-ldap-0:4.3.2-11.1.ent.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-ldap-0:4.3.2-11.1.ent.s390x" }, "product_reference": "php-ldap-0:4.3.2-11.1.ent.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-ldap-0:4.3.2-11.1.ent.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-ldap-0:4.3.2-11.1.ent.x86_64" }, "product_reference": "php-ldap-0:4.3.2-11.1.ent.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-mysql-0:4.3.2-11.1.ent.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-mysql-0:4.3.2-11.1.ent.i386" }, "product_reference": "php-mysql-0:4.3.2-11.1.ent.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-mysql-0:4.3.2-11.1.ent.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-mysql-0:4.3.2-11.1.ent.ia64" }, "product_reference": "php-mysql-0:4.3.2-11.1.ent.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-mysql-0:4.3.2-11.1.ent.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-mysql-0:4.3.2-11.1.ent.ppc" }, "product_reference": "php-mysql-0:4.3.2-11.1.ent.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-mysql-0:4.3.2-11.1.ent.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-mysql-0:4.3.2-11.1.ent.s390" }, "product_reference": "php-mysql-0:4.3.2-11.1.ent.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-mysql-0:4.3.2-11.1.ent.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-mysql-0:4.3.2-11.1.ent.s390x" }, "product_reference": "php-mysql-0:4.3.2-11.1.ent.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-mysql-0:4.3.2-11.1.ent.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-mysql-0:4.3.2-11.1.ent.x86_64" }, "product_reference": "php-mysql-0:4.3.2-11.1.ent.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-odbc-0:4.3.2-11.1.ent.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-odbc-0:4.3.2-11.1.ent.i386" }, "product_reference": "php-odbc-0:4.3.2-11.1.ent.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-odbc-0:4.3.2-11.1.ent.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-odbc-0:4.3.2-11.1.ent.ia64" }, "product_reference": "php-odbc-0:4.3.2-11.1.ent.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-odbc-0:4.3.2-11.1.ent.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-odbc-0:4.3.2-11.1.ent.ppc" }, "product_reference": "php-odbc-0:4.3.2-11.1.ent.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-odbc-0:4.3.2-11.1.ent.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-odbc-0:4.3.2-11.1.ent.s390" }, "product_reference": "php-odbc-0:4.3.2-11.1.ent.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-odbc-0:4.3.2-11.1.ent.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-odbc-0:4.3.2-11.1.ent.s390x" }, "product_reference": "php-odbc-0:4.3.2-11.1.ent.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-odbc-0:4.3.2-11.1.ent.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-odbc-0:4.3.2-11.1.ent.x86_64" }, "product_reference": "php-odbc-0:4.3.2-11.1.ent.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-pgsql-0:4.3.2-11.1.ent.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-pgsql-0:4.3.2-11.1.ent.i386" }, "product_reference": "php-pgsql-0:4.3.2-11.1.ent.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-pgsql-0:4.3.2-11.1.ent.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-pgsql-0:4.3.2-11.1.ent.ia64" }, "product_reference": "php-pgsql-0:4.3.2-11.1.ent.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-pgsql-0:4.3.2-11.1.ent.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-pgsql-0:4.3.2-11.1.ent.ppc" }, "product_reference": "php-pgsql-0:4.3.2-11.1.ent.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-pgsql-0:4.3.2-11.1.ent.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-pgsql-0:4.3.2-11.1.ent.s390" }, "product_reference": "php-pgsql-0:4.3.2-11.1.ent.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-pgsql-0:4.3.2-11.1.ent.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-pgsql-0:4.3.2-11.1.ent.s390x" }, "product_reference": "php-pgsql-0:4.3.2-11.1.ent.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-pgsql-0:4.3.2-11.1.ent.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:php-pgsql-0:4.3.2-11.1.ent.x86_64" }, "product_reference": "php-pgsql-0:4.3.2-11.1.ent.x86_64", "relates_to_product_reference": "3WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2004-0594", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617233" } ], "notes": [ { "category": "description", "text": "The memory_limit functionality in PHP 4.x up to 4.3.7, and 5.x up to 5.0.0RC3, under certain conditions such as when register_globals is enabled, allows remote attackers to execute arbitrary code by triggering a memory_limit abort during execution of the zend_hash_init function and overwriting a HashTable destructor pointer before the initialization of key data structures is complete.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:php-0:4.3.2-11.1.ent.i386", "3AS:php-0:4.3.2-11.1.ent.ia64", "3AS:php-0:4.3.2-11.1.ent.ppc", "3AS:php-0:4.3.2-11.1.ent.s390", "3AS:php-0:4.3.2-11.1.ent.s390x", "3AS:php-0:4.3.2-11.1.ent.src", "3AS:php-0:4.3.2-11.1.ent.x86_64", "3AS:php-debuginfo-0:4.3.2-11.1.ent.i386", "3AS:php-debuginfo-0:4.3.2-11.1.ent.ia64", "3AS:php-debuginfo-0:4.3.2-11.1.ent.ppc", "3AS:php-debuginfo-0:4.3.2-11.1.ent.s390", "3AS:php-debuginfo-0:4.3.2-11.1.ent.s390x", "3AS:php-debuginfo-0:4.3.2-11.1.ent.x86_64", "3AS:php-devel-0:4.3.2-11.1.ent.i386", "3AS:php-devel-0:4.3.2-11.1.ent.ia64", "3AS:php-devel-0:4.3.2-11.1.ent.ppc", "3AS:php-devel-0:4.3.2-11.1.ent.s390", "3AS:php-devel-0:4.3.2-11.1.ent.s390x", "3AS:php-devel-0:4.3.2-11.1.ent.x86_64", "3AS:php-imap-0:4.3.2-11.1.ent.i386", "3AS:php-imap-0:4.3.2-11.1.ent.ia64", "3AS:php-imap-0:4.3.2-11.1.ent.ppc", "3AS:php-imap-0:4.3.2-11.1.ent.s390", "3AS:php-imap-0:4.3.2-11.1.ent.s390x", "3AS:php-imap-0:4.3.2-11.1.ent.x86_64", "3AS:php-ldap-0:4.3.2-11.1.ent.i386", "3AS:php-ldap-0:4.3.2-11.1.ent.ia64", "3AS:php-ldap-0:4.3.2-11.1.ent.ppc", "3AS:php-ldap-0:4.3.2-11.1.ent.s390", "3AS:php-ldap-0:4.3.2-11.1.ent.s390x", "3AS:php-ldap-0:4.3.2-11.1.ent.x86_64", "3AS:php-mysql-0:4.3.2-11.1.ent.i386", "3AS:php-mysql-0:4.3.2-11.1.ent.ia64", "3AS:php-mysql-0:4.3.2-11.1.ent.ppc", "3AS:php-mysql-0:4.3.2-11.1.ent.s390", "3AS:php-mysql-0:4.3.2-11.1.ent.s390x", "3AS:php-mysql-0:4.3.2-11.1.ent.x86_64", "3AS:php-odbc-0:4.3.2-11.1.ent.i386", "3AS:php-odbc-0:4.3.2-11.1.ent.ia64", "3AS:php-odbc-0:4.3.2-11.1.ent.ppc", "3AS:php-odbc-0:4.3.2-11.1.ent.s390", "3AS:php-odbc-0:4.3.2-11.1.ent.s390x", "3AS:php-odbc-0:4.3.2-11.1.ent.x86_64", "3AS:php-pgsql-0:4.3.2-11.1.ent.i386", "3AS:php-pgsql-0:4.3.2-11.1.ent.ia64", "3AS:php-pgsql-0:4.3.2-11.1.ent.ppc", "3AS:php-pgsql-0:4.3.2-11.1.ent.s390", "3AS:php-pgsql-0:4.3.2-11.1.ent.s390x", "3AS:php-pgsql-0:4.3.2-11.1.ent.x86_64", "3Desktop:php-0:4.3.2-11.1.ent.i386", "3Desktop:php-0:4.3.2-11.1.ent.ia64", "3Desktop:php-0:4.3.2-11.1.ent.ppc", "3Desktop:php-0:4.3.2-11.1.ent.s390", "3Desktop:php-0:4.3.2-11.1.ent.s390x", "3Desktop:php-0:4.3.2-11.1.ent.src", "3Desktop:php-0:4.3.2-11.1.ent.x86_64", "3Desktop:php-debuginfo-0:4.3.2-11.1.ent.i386", "3Desktop:php-debuginfo-0:4.3.2-11.1.ent.ia64", "3Desktop:php-debuginfo-0:4.3.2-11.1.ent.ppc", "3Desktop:php-debuginfo-0:4.3.2-11.1.ent.s390", "3Desktop:php-debuginfo-0:4.3.2-11.1.ent.s390x", "3Desktop:php-debuginfo-0:4.3.2-11.1.ent.x86_64", "3Desktop:php-devel-0:4.3.2-11.1.ent.i386", "3Desktop:php-devel-0:4.3.2-11.1.ent.ia64", "3Desktop:php-devel-0:4.3.2-11.1.ent.ppc", "3Desktop:php-devel-0:4.3.2-11.1.ent.s390", "3Desktop:php-devel-0:4.3.2-11.1.ent.s390x", "3Desktop:php-devel-0:4.3.2-11.1.ent.x86_64", "3Desktop:php-imap-0:4.3.2-11.1.ent.i386", "3Desktop:php-imap-0:4.3.2-11.1.ent.ia64", "3Desktop:php-imap-0:4.3.2-11.1.ent.ppc", "3Desktop:php-imap-0:4.3.2-11.1.ent.s390", "3Desktop:php-imap-0:4.3.2-11.1.ent.s390x", "3Desktop:php-imap-0:4.3.2-11.1.ent.x86_64", "3Desktop:php-ldap-0:4.3.2-11.1.ent.i386", "3Desktop:php-ldap-0:4.3.2-11.1.ent.ia64", "3Desktop:php-ldap-0:4.3.2-11.1.ent.ppc", "3Desktop:php-ldap-0:4.3.2-11.1.ent.s390", "3Desktop:php-ldap-0:4.3.2-11.1.ent.s390x", "3Desktop:php-ldap-0:4.3.2-11.1.ent.x86_64", "3Desktop:php-mysql-0:4.3.2-11.1.ent.i386", "3Desktop:php-mysql-0:4.3.2-11.1.ent.ia64", "3Desktop:php-mysql-0:4.3.2-11.1.ent.ppc", "3Desktop:php-mysql-0:4.3.2-11.1.ent.s390", "3Desktop:php-mysql-0:4.3.2-11.1.ent.s390x", "3Desktop:php-mysql-0:4.3.2-11.1.ent.x86_64", "3Desktop:php-odbc-0:4.3.2-11.1.ent.i386", "3Desktop:php-odbc-0:4.3.2-11.1.ent.ia64", "3Desktop:php-odbc-0:4.3.2-11.1.ent.ppc", "3Desktop:php-odbc-0:4.3.2-11.1.ent.s390", "3Desktop:php-odbc-0:4.3.2-11.1.ent.s390x", "3Desktop:php-odbc-0:4.3.2-11.1.ent.x86_64", "3Desktop:php-pgsql-0:4.3.2-11.1.ent.i386", "3Desktop:php-pgsql-0:4.3.2-11.1.ent.ia64", "3Desktop:php-pgsql-0:4.3.2-11.1.ent.ppc", "3Desktop:php-pgsql-0:4.3.2-11.1.ent.s390", "3Desktop:php-pgsql-0:4.3.2-11.1.ent.s390x", "3Desktop:php-pgsql-0:4.3.2-11.1.ent.x86_64", "3ES:php-0:4.3.2-11.1.ent.i386", "3ES:php-0:4.3.2-11.1.ent.ia64", "3ES:php-0:4.3.2-11.1.ent.ppc", "3ES:php-0:4.3.2-11.1.ent.s390", "3ES:php-0:4.3.2-11.1.ent.s390x", "3ES:php-0:4.3.2-11.1.ent.src", "3ES:php-0:4.3.2-11.1.ent.x86_64", "3ES:php-debuginfo-0:4.3.2-11.1.ent.i386", "3ES:php-debuginfo-0:4.3.2-11.1.ent.ia64", "3ES:php-debuginfo-0:4.3.2-11.1.ent.ppc", "3ES:php-debuginfo-0:4.3.2-11.1.ent.s390", "3ES:php-debuginfo-0:4.3.2-11.1.ent.s390x", "3ES:php-debuginfo-0:4.3.2-11.1.ent.x86_64", "3ES:php-devel-0:4.3.2-11.1.ent.i386", "3ES:php-devel-0:4.3.2-11.1.ent.ia64", "3ES:php-devel-0:4.3.2-11.1.ent.ppc", "3ES:php-devel-0:4.3.2-11.1.ent.s390", "3ES:php-devel-0:4.3.2-11.1.ent.s390x", "3ES:php-devel-0:4.3.2-11.1.ent.x86_64", "3ES:php-imap-0:4.3.2-11.1.ent.i386", "3ES:php-imap-0:4.3.2-11.1.ent.ia64", "3ES:php-imap-0:4.3.2-11.1.ent.ppc", "3ES:php-imap-0:4.3.2-11.1.ent.s390", "3ES:php-imap-0:4.3.2-11.1.ent.s390x", "3ES:php-imap-0:4.3.2-11.1.ent.x86_64", "3ES:php-ldap-0:4.3.2-11.1.ent.i386", "3ES:php-ldap-0:4.3.2-11.1.ent.ia64", "3ES:php-ldap-0:4.3.2-11.1.ent.ppc", "3ES:php-ldap-0:4.3.2-11.1.ent.s390", "3ES:php-ldap-0:4.3.2-11.1.ent.s390x", "3ES:php-ldap-0:4.3.2-11.1.ent.x86_64", "3ES:php-mysql-0:4.3.2-11.1.ent.i386", "3ES:php-mysql-0:4.3.2-11.1.ent.ia64", "3ES:php-mysql-0:4.3.2-11.1.ent.ppc", "3ES:php-mysql-0:4.3.2-11.1.ent.s390", "3ES:php-mysql-0:4.3.2-11.1.ent.s390x", "3ES:php-mysql-0:4.3.2-11.1.ent.x86_64", "3ES:php-odbc-0:4.3.2-11.1.ent.i386", "3ES:php-odbc-0:4.3.2-11.1.ent.ia64", "3ES:php-odbc-0:4.3.2-11.1.ent.ppc", "3ES:php-odbc-0:4.3.2-11.1.ent.s390", "3ES:php-odbc-0:4.3.2-11.1.ent.s390x", "3ES:php-odbc-0:4.3.2-11.1.ent.x86_64", "3ES:php-pgsql-0:4.3.2-11.1.ent.i386", "3ES:php-pgsql-0:4.3.2-11.1.ent.ia64", "3ES:php-pgsql-0:4.3.2-11.1.ent.ppc", "3ES:php-pgsql-0:4.3.2-11.1.ent.s390", "3ES:php-pgsql-0:4.3.2-11.1.ent.s390x", "3ES:php-pgsql-0:4.3.2-11.1.ent.x86_64", "3WS:php-0:4.3.2-11.1.ent.i386", "3WS:php-0:4.3.2-11.1.ent.ia64", "3WS:php-0:4.3.2-11.1.ent.ppc", "3WS:php-0:4.3.2-11.1.ent.s390", "3WS:php-0:4.3.2-11.1.ent.s390x", "3WS:php-0:4.3.2-11.1.ent.src", "3WS:php-0:4.3.2-11.1.ent.x86_64", "3WS:php-debuginfo-0:4.3.2-11.1.ent.i386", "3WS:php-debuginfo-0:4.3.2-11.1.ent.ia64", "3WS:php-debuginfo-0:4.3.2-11.1.ent.ppc", "3WS:php-debuginfo-0:4.3.2-11.1.ent.s390", "3WS:php-debuginfo-0:4.3.2-11.1.ent.s390x", "3WS:php-debuginfo-0:4.3.2-11.1.ent.x86_64", "3WS:php-devel-0:4.3.2-11.1.ent.i386", "3WS:php-devel-0:4.3.2-11.1.ent.ia64", "3WS:php-devel-0:4.3.2-11.1.ent.ppc", "3WS:php-devel-0:4.3.2-11.1.ent.s390", "3WS:php-devel-0:4.3.2-11.1.ent.s390x", "3WS:php-devel-0:4.3.2-11.1.ent.x86_64", "3WS:php-imap-0:4.3.2-11.1.ent.i386", "3WS:php-imap-0:4.3.2-11.1.ent.ia64", "3WS:php-imap-0:4.3.2-11.1.ent.ppc", "3WS:php-imap-0:4.3.2-11.1.ent.s390", "3WS:php-imap-0:4.3.2-11.1.ent.s390x", "3WS:php-imap-0:4.3.2-11.1.ent.x86_64", "3WS:php-ldap-0:4.3.2-11.1.ent.i386", "3WS:php-ldap-0:4.3.2-11.1.ent.ia64", "3WS:php-ldap-0:4.3.2-11.1.ent.ppc", "3WS:php-ldap-0:4.3.2-11.1.ent.s390", "3WS:php-ldap-0:4.3.2-11.1.ent.s390x", "3WS:php-ldap-0:4.3.2-11.1.ent.x86_64", "3WS:php-mysql-0:4.3.2-11.1.ent.i386", "3WS:php-mysql-0:4.3.2-11.1.ent.ia64", "3WS:php-mysql-0:4.3.2-11.1.ent.ppc", "3WS:php-mysql-0:4.3.2-11.1.ent.s390", "3WS:php-mysql-0:4.3.2-11.1.ent.s390x", "3WS:php-mysql-0:4.3.2-11.1.ent.x86_64", "3WS:php-odbc-0:4.3.2-11.1.ent.i386", "3WS:php-odbc-0:4.3.2-11.1.ent.ia64", "3WS:php-odbc-0:4.3.2-11.1.ent.ppc", "3WS:php-odbc-0:4.3.2-11.1.ent.s390", "3WS:php-odbc-0:4.3.2-11.1.ent.s390x", "3WS:php-odbc-0:4.3.2-11.1.ent.x86_64", "3WS:php-pgsql-0:4.3.2-11.1.ent.i386", "3WS:php-pgsql-0:4.3.2-11.1.ent.ia64", "3WS:php-pgsql-0:4.3.2-11.1.ent.ppc", "3WS:php-pgsql-0:4.3.2-11.1.ent.s390", "3WS:php-pgsql-0:4.3.2-11.1.ent.s390x", "3WS:php-pgsql-0:4.3.2-11.1.ent.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0594" }, { "category": "external", "summary": "RHBZ#1617233", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617233" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0594", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0594" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0594", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0594" } ], "release_date": "2004-07-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-07-19T20:42:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:php-0:4.3.2-11.1.ent.i386", "3AS:php-0:4.3.2-11.1.ent.ia64", "3AS:php-0:4.3.2-11.1.ent.ppc", "3AS:php-0:4.3.2-11.1.ent.s390", "3AS:php-0:4.3.2-11.1.ent.s390x", "3AS:php-0:4.3.2-11.1.ent.src", "3AS:php-0:4.3.2-11.1.ent.x86_64", "3AS:php-debuginfo-0:4.3.2-11.1.ent.i386", "3AS:php-debuginfo-0:4.3.2-11.1.ent.ia64", "3AS:php-debuginfo-0:4.3.2-11.1.ent.ppc", "3AS:php-debuginfo-0:4.3.2-11.1.ent.s390", "3AS:php-debuginfo-0:4.3.2-11.1.ent.s390x", "3AS:php-debuginfo-0:4.3.2-11.1.ent.x86_64", "3AS:php-devel-0:4.3.2-11.1.ent.i386", "3AS:php-devel-0:4.3.2-11.1.ent.ia64", "3AS:php-devel-0:4.3.2-11.1.ent.ppc", "3AS:php-devel-0:4.3.2-11.1.ent.s390", "3AS:php-devel-0:4.3.2-11.1.ent.s390x", "3AS:php-devel-0:4.3.2-11.1.ent.x86_64", "3AS:php-imap-0:4.3.2-11.1.ent.i386", "3AS:php-imap-0:4.3.2-11.1.ent.ia64", "3AS:php-imap-0:4.3.2-11.1.ent.ppc", "3AS:php-imap-0:4.3.2-11.1.ent.s390", "3AS:php-imap-0:4.3.2-11.1.ent.s390x", "3AS:php-imap-0:4.3.2-11.1.ent.x86_64", "3AS:php-ldap-0:4.3.2-11.1.ent.i386", "3AS:php-ldap-0:4.3.2-11.1.ent.ia64", "3AS:php-ldap-0:4.3.2-11.1.ent.ppc", "3AS:php-ldap-0:4.3.2-11.1.ent.s390", "3AS:php-ldap-0:4.3.2-11.1.ent.s390x", "3AS:php-ldap-0:4.3.2-11.1.ent.x86_64", "3AS:php-mysql-0:4.3.2-11.1.ent.i386", "3AS:php-mysql-0:4.3.2-11.1.ent.ia64", "3AS:php-mysql-0:4.3.2-11.1.ent.ppc", "3AS:php-mysql-0:4.3.2-11.1.ent.s390", "3AS:php-mysql-0:4.3.2-11.1.ent.s390x", "3AS:php-mysql-0:4.3.2-11.1.ent.x86_64", "3AS:php-odbc-0:4.3.2-11.1.ent.i386", "3AS:php-odbc-0:4.3.2-11.1.ent.ia64", "3AS:php-odbc-0:4.3.2-11.1.ent.ppc", "3AS:php-odbc-0:4.3.2-11.1.ent.s390", "3AS:php-odbc-0:4.3.2-11.1.ent.s390x", "3AS:php-odbc-0:4.3.2-11.1.ent.x86_64", "3AS:php-pgsql-0:4.3.2-11.1.ent.i386", "3AS:php-pgsql-0:4.3.2-11.1.ent.ia64", "3AS:php-pgsql-0:4.3.2-11.1.ent.ppc", "3AS:php-pgsql-0:4.3.2-11.1.ent.s390", "3AS:php-pgsql-0:4.3.2-11.1.ent.s390x", "3AS:php-pgsql-0:4.3.2-11.1.ent.x86_64", "3Desktop:php-0:4.3.2-11.1.ent.i386", "3Desktop:php-0:4.3.2-11.1.ent.ia64", "3Desktop:php-0:4.3.2-11.1.ent.ppc", "3Desktop:php-0:4.3.2-11.1.ent.s390", "3Desktop:php-0:4.3.2-11.1.ent.s390x", "3Desktop:php-0:4.3.2-11.1.ent.src", "3Desktop:php-0:4.3.2-11.1.ent.x86_64", "3Desktop:php-debuginfo-0:4.3.2-11.1.ent.i386", "3Desktop:php-debuginfo-0:4.3.2-11.1.ent.ia64", "3Desktop:php-debuginfo-0:4.3.2-11.1.ent.ppc", "3Desktop:php-debuginfo-0:4.3.2-11.1.ent.s390", "3Desktop:php-debuginfo-0:4.3.2-11.1.ent.s390x", "3Desktop:php-debuginfo-0:4.3.2-11.1.ent.x86_64", "3Desktop:php-devel-0:4.3.2-11.1.ent.i386", "3Desktop:php-devel-0:4.3.2-11.1.ent.ia64", "3Desktop:php-devel-0:4.3.2-11.1.ent.ppc", "3Desktop:php-devel-0:4.3.2-11.1.ent.s390", "3Desktop:php-devel-0:4.3.2-11.1.ent.s390x", "3Desktop:php-devel-0:4.3.2-11.1.ent.x86_64", "3Desktop:php-imap-0:4.3.2-11.1.ent.i386", "3Desktop:php-imap-0:4.3.2-11.1.ent.ia64", "3Desktop:php-imap-0:4.3.2-11.1.ent.ppc", "3Desktop:php-imap-0:4.3.2-11.1.ent.s390", "3Desktop:php-imap-0:4.3.2-11.1.ent.s390x", "3Desktop:php-imap-0:4.3.2-11.1.ent.x86_64", "3Desktop:php-ldap-0:4.3.2-11.1.ent.i386", "3Desktop:php-ldap-0:4.3.2-11.1.ent.ia64", "3Desktop:php-ldap-0:4.3.2-11.1.ent.ppc", "3Desktop:php-ldap-0:4.3.2-11.1.ent.s390", "3Desktop:php-ldap-0:4.3.2-11.1.ent.s390x", "3Desktop:php-ldap-0:4.3.2-11.1.ent.x86_64", "3Desktop:php-mysql-0:4.3.2-11.1.ent.i386", "3Desktop:php-mysql-0:4.3.2-11.1.ent.ia64", "3Desktop:php-mysql-0:4.3.2-11.1.ent.ppc", "3Desktop:php-mysql-0:4.3.2-11.1.ent.s390", "3Desktop:php-mysql-0:4.3.2-11.1.ent.s390x", "3Desktop:php-mysql-0:4.3.2-11.1.ent.x86_64", "3Desktop:php-odbc-0:4.3.2-11.1.ent.i386", "3Desktop:php-odbc-0:4.3.2-11.1.ent.ia64", "3Desktop:php-odbc-0:4.3.2-11.1.ent.ppc", "3Desktop:php-odbc-0:4.3.2-11.1.ent.s390", "3Desktop:php-odbc-0:4.3.2-11.1.ent.s390x", "3Desktop:php-odbc-0:4.3.2-11.1.ent.x86_64", "3Desktop:php-pgsql-0:4.3.2-11.1.ent.i386", "3Desktop:php-pgsql-0:4.3.2-11.1.ent.ia64", "3Desktop:php-pgsql-0:4.3.2-11.1.ent.ppc", "3Desktop:php-pgsql-0:4.3.2-11.1.ent.s390", "3Desktop:php-pgsql-0:4.3.2-11.1.ent.s390x", "3Desktop:php-pgsql-0:4.3.2-11.1.ent.x86_64", "3ES:php-0:4.3.2-11.1.ent.i386", "3ES:php-0:4.3.2-11.1.ent.ia64", "3ES:php-0:4.3.2-11.1.ent.ppc", "3ES:php-0:4.3.2-11.1.ent.s390", "3ES:php-0:4.3.2-11.1.ent.s390x", "3ES:php-0:4.3.2-11.1.ent.src", "3ES:php-0:4.3.2-11.1.ent.x86_64", "3ES:php-debuginfo-0:4.3.2-11.1.ent.i386", "3ES:php-debuginfo-0:4.3.2-11.1.ent.ia64", "3ES:php-debuginfo-0:4.3.2-11.1.ent.ppc", "3ES:php-debuginfo-0:4.3.2-11.1.ent.s390", "3ES:php-debuginfo-0:4.3.2-11.1.ent.s390x", "3ES:php-debuginfo-0:4.3.2-11.1.ent.x86_64", "3ES:php-devel-0:4.3.2-11.1.ent.i386", "3ES:php-devel-0:4.3.2-11.1.ent.ia64", "3ES:php-devel-0:4.3.2-11.1.ent.ppc", "3ES:php-devel-0:4.3.2-11.1.ent.s390", "3ES:php-devel-0:4.3.2-11.1.ent.s390x", "3ES:php-devel-0:4.3.2-11.1.ent.x86_64", "3ES:php-imap-0:4.3.2-11.1.ent.i386", "3ES:php-imap-0:4.3.2-11.1.ent.ia64", "3ES:php-imap-0:4.3.2-11.1.ent.ppc", "3ES:php-imap-0:4.3.2-11.1.ent.s390", "3ES:php-imap-0:4.3.2-11.1.ent.s390x", "3ES:php-imap-0:4.3.2-11.1.ent.x86_64", "3ES:php-ldap-0:4.3.2-11.1.ent.i386", "3ES:php-ldap-0:4.3.2-11.1.ent.ia64", "3ES:php-ldap-0:4.3.2-11.1.ent.ppc", "3ES:php-ldap-0:4.3.2-11.1.ent.s390", "3ES:php-ldap-0:4.3.2-11.1.ent.s390x", "3ES:php-ldap-0:4.3.2-11.1.ent.x86_64", "3ES:php-mysql-0:4.3.2-11.1.ent.i386", "3ES:php-mysql-0:4.3.2-11.1.ent.ia64", "3ES:php-mysql-0:4.3.2-11.1.ent.ppc", "3ES:php-mysql-0:4.3.2-11.1.ent.s390", "3ES:php-mysql-0:4.3.2-11.1.ent.s390x", "3ES:php-mysql-0:4.3.2-11.1.ent.x86_64", "3ES:php-odbc-0:4.3.2-11.1.ent.i386", "3ES:php-odbc-0:4.3.2-11.1.ent.ia64", "3ES:php-odbc-0:4.3.2-11.1.ent.ppc", "3ES:php-odbc-0:4.3.2-11.1.ent.s390", "3ES:php-odbc-0:4.3.2-11.1.ent.s390x", "3ES:php-odbc-0:4.3.2-11.1.ent.x86_64", "3ES:php-pgsql-0:4.3.2-11.1.ent.i386", "3ES:php-pgsql-0:4.3.2-11.1.ent.ia64", "3ES:php-pgsql-0:4.3.2-11.1.ent.ppc", "3ES:php-pgsql-0:4.3.2-11.1.ent.s390", "3ES:php-pgsql-0:4.3.2-11.1.ent.s390x", "3ES:php-pgsql-0:4.3.2-11.1.ent.x86_64", "3WS:php-0:4.3.2-11.1.ent.i386", "3WS:php-0:4.3.2-11.1.ent.ia64", "3WS:php-0:4.3.2-11.1.ent.ppc", "3WS:php-0:4.3.2-11.1.ent.s390", "3WS:php-0:4.3.2-11.1.ent.s390x", "3WS:php-0:4.3.2-11.1.ent.src", "3WS:php-0:4.3.2-11.1.ent.x86_64", "3WS:php-debuginfo-0:4.3.2-11.1.ent.i386", "3WS:php-debuginfo-0:4.3.2-11.1.ent.ia64", "3WS:php-debuginfo-0:4.3.2-11.1.ent.ppc", "3WS:php-debuginfo-0:4.3.2-11.1.ent.s390", "3WS:php-debuginfo-0:4.3.2-11.1.ent.s390x", "3WS:php-debuginfo-0:4.3.2-11.1.ent.x86_64", "3WS:php-devel-0:4.3.2-11.1.ent.i386", "3WS:php-devel-0:4.3.2-11.1.ent.ia64", "3WS:php-devel-0:4.3.2-11.1.ent.ppc", "3WS:php-devel-0:4.3.2-11.1.ent.s390", "3WS:php-devel-0:4.3.2-11.1.ent.s390x", "3WS:php-devel-0:4.3.2-11.1.ent.x86_64", "3WS:php-imap-0:4.3.2-11.1.ent.i386", "3WS:php-imap-0:4.3.2-11.1.ent.ia64", "3WS:php-imap-0:4.3.2-11.1.ent.ppc", "3WS:php-imap-0:4.3.2-11.1.ent.s390", "3WS:php-imap-0:4.3.2-11.1.ent.s390x", "3WS:php-imap-0:4.3.2-11.1.ent.x86_64", "3WS:php-ldap-0:4.3.2-11.1.ent.i386", "3WS:php-ldap-0:4.3.2-11.1.ent.ia64", "3WS:php-ldap-0:4.3.2-11.1.ent.ppc", "3WS:php-ldap-0:4.3.2-11.1.ent.s390", "3WS:php-ldap-0:4.3.2-11.1.ent.s390x", "3WS:php-ldap-0:4.3.2-11.1.ent.x86_64", "3WS:php-mysql-0:4.3.2-11.1.ent.i386", "3WS:php-mysql-0:4.3.2-11.1.ent.ia64", "3WS:php-mysql-0:4.3.2-11.1.ent.ppc", "3WS:php-mysql-0:4.3.2-11.1.ent.s390", "3WS:php-mysql-0:4.3.2-11.1.ent.s390x", "3WS:php-mysql-0:4.3.2-11.1.ent.x86_64", "3WS:php-odbc-0:4.3.2-11.1.ent.i386", "3WS:php-odbc-0:4.3.2-11.1.ent.ia64", "3WS:php-odbc-0:4.3.2-11.1.ent.ppc", "3WS:php-odbc-0:4.3.2-11.1.ent.s390", "3WS:php-odbc-0:4.3.2-11.1.ent.s390x", "3WS:php-odbc-0:4.3.2-11.1.ent.x86_64", "3WS:php-pgsql-0:4.3.2-11.1.ent.i386", "3WS:php-pgsql-0:4.3.2-11.1.ent.ia64", "3WS:php-pgsql-0:4.3.2-11.1.ent.ppc", "3WS:php-pgsql-0:4.3.2-11.1.ent.s390", "3WS:php-pgsql-0:4.3.2-11.1.ent.s390x", "3WS:php-pgsql-0:4.3.2-11.1.ent.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:392" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-0595", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617234" } ], "notes": [ { "category": "description", "text": "The strip_tags function in PHP 4.x up to 4.3.7, and 5.x up to 5.0.0RC3, does not filter null (\\0) characters within tag names when restricting input to allowed tags, which allows dangerous tags to be processed by web browsers such as Internet Explorer and Safari, which ignore null characters and facilitate the exploitation of cross-site scripting (XSS) vulnerabilities.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:php-0:4.3.2-11.1.ent.i386", "3AS:php-0:4.3.2-11.1.ent.ia64", "3AS:php-0:4.3.2-11.1.ent.ppc", "3AS:php-0:4.3.2-11.1.ent.s390", "3AS:php-0:4.3.2-11.1.ent.s390x", "3AS:php-0:4.3.2-11.1.ent.src", "3AS:php-0:4.3.2-11.1.ent.x86_64", "3AS:php-debuginfo-0:4.3.2-11.1.ent.i386", "3AS:php-debuginfo-0:4.3.2-11.1.ent.ia64", "3AS:php-debuginfo-0:4.3.2-11.1.ent.ppc", "3AS:php-debuginfo-0:4.3.2-11.1.ent.s390", "3AS:php-debuginfo-0:4.3.2-11.1.ent.s390x", "3AS:php-debuginfo-0:4.3.2-11.1.ent.x86_64", "3AS:php-devel-0:4.3.2-11.1.ent.i386", "3AS:php-devel-0:4.3.2-11.1.ent.ia64", "3AS:php-devel-0:4.3.2-11.1.ent.ppc", "3AS:php-devel-0:4.3.2-11.1.ent.s390", "3AS:php-devel-0:4.3.2-11.1.ent.s390x", "3AS:php-devel-0:4.3.2-11.1.ent.x86_64", "3AS:php-imap-0:4.3.2-11.1.ent.i386", "3AS:php-imap-0:4.3.2-11.1.ent.ia64", "3AS:php-imap-0:4.3.2-11.1.ent.ppc", "3AS:php-imap-0:4.3.2-11.1.ent.s390", "3AS:php-imap-0:4.3.2-11.1.ent.s390x", "3AS:php-imap-0:4.3.2-11.1.ent.x86_64", "3AS:php-ldap-0:4.3.2-11.1.ent.i386", "3AS:php-ldap-0:4.3.2-11.1.ent.ia64", "3AS:php-ldap-0:4.3.2-11.1.ent.ppc", "3AS:php-ldap-0:4.3.2-11.1.ent.s390", "3AS:php-ldap-0:4.3.2-11.1.ent.s390x", "3AS:php-ldap-0:4.3.2-11.1.ent.x86_64", "3AS:php-mysql-0:4.3.2-11.1.ent.i386", "3AS:php-mysql-0:4.3.2-11.1.ent.ia64", "3AS:php-mysql-0:4.3.2-11.1.ent.ppc", "3AS:php-mysql-0:4.3.2-11.1.ent.s390", "3AS:php-mysql-0:4.3.2-11.1.ent.s390x", "3AS:php-mysql-0:4.3.2-11.1.ent.x86_64", "3AS:php-odbc-0:4.3.2-11.1.ent.i386", "3AS:php-odbc-0:4.3.2-11.1.ent.ia64", "3AS:php-odbc-0:4.3.2-11.1.ent.ppc", "3AS:php-odbc-0:4.3.2-11.1.ent.s390", "3AS:php-odbc-0:4.3.2-11.1.ent.s390x", "3AS:php-odbc-0:4.3.2-11.1.ent.x86_64", "3AS:php-pgsql-0:4.3.2-11.1.ent.i386", "3AS:php-pgsql-0:4.3.2-11.1.ent.ia64", "3AS:php-pgsql-0:4.3.2-11.1.ent.ppc", "3AS:php-pgsql-0:4.3.2-11.1.ent.s390", "3AS:php-pgsql-0:4.3.2-11.1.ent.s390x", "3AS:php-pgsql-0:4.3.2-11.1.ent.x86_64", "3Desktop:php-0:4.3.2-11.1.ent.i386", "3Desktop:php-0:4.3.2-11.1.ent.ia64", "3Desktop:php-0:4.3.2-11.1.ent.ppc", "3Desktop:php-0:4.3.2-11.1.ent.s390", "3Desktop:php-0:4.3.2-11.1.ent.s390x", "3Desktop:php-0:4.3.2-11.1.ent.src", "3Desktop:php-0:4.3.2-11.1.ent.x86_64", "3Desktop:php-debuginfo-0:4.3.2-11.1.ent.i386", "3Desktop:php-debuginfo-0:4.3.2-11.1.ent.ia64", "3Desktop:php-debuginfo-0:4.3.2-11.1.ent.ppc", "3Desktop:php-debuginfo-0:4.3.2-11.1.ent.s390", "3Desktop:php-debuginfo-0:4.3.2-11.1.ent.s390x", "3Desktop:php-debuginfo-0:4.3.2-11.1.ent.x86_64", "3Desktop:php-devel-0:4.3.2-11.1.ent.i386", "3Desktop:php-devel-0:4.3.2-11.1.ent.ia64", "3Desktop:php-devel-0:4.3.2-11.1.ent.ppc", "3Desktop:php-devel-0:4.3.2-11.1.ent.s390", "3Desktop:php-devel-0:4.3.2-11.1.ent.s390x", "3Desktop:php-devel-0:4.3.2-11.1.ent.x86_64", "3Desktop:php-imap-0:4.3.2-11.1.ent.i386", "3Desktop:php-imap-0:4.3.2-11.1.ent.ia64", "3Desktop:php-imap-0:4.3.2-11.1.ent.ppc", "3Desktop:php-imap-0:4.3.2-11.1.ent.s390", "3Desktop:php-imap-0:4.3.2-11.1.ent.s390x", "3Desktop:php-imap-0:4.3.2-11.1.ent.x86_64", "3Desktop:php-ldap-0:4.3.2-11.1.ent.i386", "3Desktop:php-ldap-0:4.3.2-11.1.ent.ia64", "3Desktop:php-ldap-0:4.3.2-11.1.ent.ppc", "3Desktop:php-ldap-0:4.3.2-11.1.ent.s390", "3Desktop:php-ldap-0:4.3.2-11.1.ent.s390x", "3Desktop:php-ldap-0:4.3.2-11.1.ent.x86_64", "3Desktop:php-mysql-0:4.3.2-11.1.ent.i386", "3Desktop:php-mysql-0:4.3.2-11.1.ent.ia64", "3Desktop:php-mysql-0:4.3.2-11.1.ent.ppc", "3Desktop:php-mysql-0:4.3.2-11.1.ent.s390", "3Desktop:php-mysql-0:4.3.2-11.1.ent.s390x", "3Desktop:php-mysql-0:4.3.2-11.1.ent.x86_64", "3Desktop:php-odbc-0:4.3.2-11.1.ent.i386", "3Desktop:php-odbc-0:4.3.2-11.1.ent.ia64", "3Desktop:php-odbc-0:4.3.2-11.1.ent.ppc", "3Desktop:php-odbc-0:4.3.2-11.1.ent.s390", "3Desktop:php-odbc-0:4.3.2-11.1.ent.s390x", "3Desktop:php-odbc-0:4.3.2-11.1.ent.x86_64", "3Desktop:php-pgsql-0:4.3.2-11.1.ent.i386", "3Desktop:php-pgsql-0:4.3.2-11.1.ent.ia64", "3Desktop:php-pgsql-0:4.3.2-11.1.ent.ppc", "3Desktop:php-pgsql-0:4.3.2-11.1.ent.s390", "3Desktop:php-pgsql-0:4.3.2-11.1.ent.s390x", "3Desktop:php-pgsql-0:4.3.2-11.1.ent.x86_64", "3ES:php-0:4.3.2-11.1.ent.i386", "3ES:php-0:4.3.2-11.1.ent.ia64", "3ES:php-0:4.3.2-11.1.ent.ppc", "3ES:php-0:4.3.2-11.1.ent.s390", "3ES:php-0:4.3.2-11.1.ent.s390x", "3ES:php-0:4.3.2-11.1.ent.src", "3ES:php-0:4.3.2-11.1.ent.x86_64", "3ES:php-debuginfo-0:4.3.2-11.1.ent.i386", "3ES:php-debuginfo-0:4.3.2-11.1.ent.ia64", "3ES:php-debuginfo-0:4.3.2-11.1.ent.ppc", "3ES:php-debuginfo-0:4.3.2-11.1.ent.s390", "3ES:php-debuginfo-0:4.3.2-11.1.ent.s390x", "3ES:php-debuginfo-0:4.3.2-11.1.ent.x86_64", "3ES:php-devel-0:4.3.2-11.1.ent.i386", "3ES:php-devel-0:4.3.2-11.1.ent.ia64", "3ES:php-devel-0:4.3.2-11.1.ent.ppc", "3ES:php-devel-0:4.3.2-11.1.ent.s390", "3ES:php-devel-0:4.3.2-11.1.ent.s390x", "3ES:php-devel-0:4.3.2-11.1.ent.x86_64", "3ES:php-imap-0:4.3.2-11.1.ent.i386", "3ES:php-imap-0:4.3.2-11.1.ent.ia64", "3ES:php-imap-0:4.3.2-11.1.ent.ppc", "3ES:php-imap-0:4.3.2-11.1.ent.s390", "3ES:php-imap-0:4.3.2-11.1.ent.s390x", "3ES:php-imap-0:4.3.2-11.1.ent.x86_64", "3ES:php-ldap-0:4.3.2-11.1.ent.i386", "3ES:php-ldap-0:4.3.2-11.1.ent.ia64", "3ES:php-ldap-0:4.3.2-11.1.ent.ppc", "3ES:php-ldap-0:4.3.2-11.1.ent.s390", "3ES:php-ldap-0:4.3.2-11.1.ent.s390x", "3ES:php-ldap-0:4.3.2-11.1.ent.x86_64", "3ES:php-mysql-0:4.3.2-11.1.ent.i386", "3ES:php-mysql-0:4.3.2-11.1.ent.ia64", "3ES:php-mysql-0:4.3.2-11.1.ent.ppc", "3ES:php-mysql-0:4.3.2-11.1.ent.s390", "3ES:php-mysql-0:4.3.2-11.1.ent.s390x", "3ES:php-mysql-0:4.3.2-11.1.ent.x86_64", "3ES:php-odbc-0:4.3.2-11.1.ent.i386", "3ES:php-odbc-0:4.3.2-11.1.ent.ia64", "3ES:php-odbc-0:4.3.2-11.1.ent.ppc", "3ES:php-odbc-0:4.3.2-11.1.ent.s390", "3ES:php-odbc-0:4.3.2-11.1.ent.s390x", "3ES:php-odbc-0:4.3.2-11.1.ent.x86_64", "3ES:php-pgsql-0:4.3.2-11.1.ent.i386", "3ES:php-pgsql-0:4.3.2-11.1.ent.ia64", "3ES:php-pgsql-0:4.3.2-11.1.ent.ppc", "3ES:php-pgsql-0:4.3.2-11.1.ent.s390", "3ES:php-pgsql-0:4.3.2-11.1.ent.s390x", "3ES:php-pgsql-0:4.3.2-11.1.ent.x86_64", "3WS:php-0:4.3.2-11.1.ent.i386", "3WS:php-0:4.3.2-11.1.ent.ia64", "3WS:php-0:4.3.2-11.1.ent.ppc", "3WS:php-0:4.3.2-11.1.ent.s390", "3WS:php-0:4.3.2-11.1.ent.s390x", "3WS:php-0:4.3.2-11.1.ent.src", "3WS:php-0:4.3.2-11.1.ent.x86_64", "3WS:php-debuginfo-0:4.3.2-11.1.ent.i386", "3WS:php-debuginfo-0:4.3.2-11.1.ent.ia64", "3WS:php-debuginfo-0:4.3.2-11.1.ent.ppc", "3WS:php-debuginfo-0:4.3.2-11.1.ent.s390", "3WS:php-debuginfo-0:4.3.2-11.1.ent.s390x", "3WS:php-debuginfo-0:4.3.2-11.1.ent.x86_64", "3WS:php-devel-0:4.3.2-11.1.ent.i386", "3WS:php-devel-0:4.3.2-11.1.ent.ia64", "3WS:php-devel-0:4.3.2-11.1.ent.ppc", "3WS:php-devel-0:4.3.2-11.1.ent.s390", "3WS:php-devel-0:4.3.2-11.1.ent.s390x", "3WS:php-devel-0:4.3.2-11.1.ent.x86_64", "3WS:php-imap-0:4.3.2-11.1.ent.i386", "3WS:php-imap-0:4.3.2-11.1.ent.ia64", "3WS:php-imap-0:4.3.2-11.1.ent.ppc", "3WS:php-imap-0:4.3.2-11.1.ent.s390", "3WS:php-imap-0:4.3.2-11.1.ent.s390x", "3WS:php-imap-0:4.3.2-11.1.ent.x86_64", "3WS:php-ldap-0:4.3.2-11.1.ent.i386", "3WS:php-ldap-0:4.3.2-11.1.ent.ia64", "3WS:php-ldap-0:4.3.2-11.1.ent.ppc", "3WS:php-ldap-0:4.3.2-11.1.ent.s390", "3WS:php-ldap-0:4.3.2-11.1.ent.s390x", "3WS:php-ldap-0:4.3.2-11.1.ent.x86_64", "3WS:php-mysql-0:4.3.2-11.1.ent.i386", "3WS:php-mysql-0:4.3.2-11.1.ent.ia64", "3WS:php-mysql-0:4.3.2-11.1.ent.ppc", "3WS:php-mysql-0:4.3.2-11.1.ent.s390", "3WS:php-mysql-0:4.3.2-11.1.ent.s390x", "3WS:php-mysql-0:4.3.2-11.1.ent.x86_64", "3WS:php-odbc-0:4.3.2-11.1.ent.i386", "3WS:php-odbc-0:4.3.2-11.1.ent.ia64", "3WS:php-odbc-0:4.3.2-11.1.ent.ppc", "3WS:php-odbc-0:4.3.2-11.1.ent.s390", "3WS:php-odbc-0:4.3.2-11.1.ent.s390x", "3WS:php-odbc-0:4.3.2-11.1.ent.x86_64", "3WS:php-pgsql-0:4.3.2-11.1.ent.i386", "3WS:php-pgsql-0:4.3.2-11.1.ent.ia64", "3WS:php-pgsql-0:4.3.2-11.1.ent.ppc", "3WS:php-pgsql-0:4.3.2-11.1.ent.s390", "3WS:php-pgsql-0:4.3.2-11.1.ent.s390x", "3WS:php-pgsql-0:4.3.2-11.1.ent.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0595" }, { "category": "external", "summary": "RHBZ#1617234", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617234" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0595", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0595" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0595", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0595" } ], "release_date": "2004-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-07-19T20:42:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:php-0:4.3.2-11.1.ent.i386", "3AS:php-0:4.3.2-11.1.ent.ia64", "3AS:php-0:4.3.2-11.1.ent.ppc", "3AS:php-0:4.3.2-11.1.ent.s390", "3AS:php-0:4.3.2-11.1.ent.s390x", "3AS:php-0:4.3.2-11.1.ent.src", "3AS:php-0:4.3.2-11.1.ent.x86_64", "3AS:php-debuginfo-0:4.3.2-11.1.ent.i386", "3AS:php-debuginfo-0:4.3.2-11.1.ent.ia64", "3AS:php-debuginfo-0:4.3.2-11.1.ent.ppc", "3AS:php-debuginfo-0:4.3.2-11.1.ent.s390", "3AS:php-debuginfo-0:4.3.2-11.1.ent.s390x", "3AS:php-debuginfo-0:4.3.2-11.1.ent.x86_64", "3AS:php-devel-0:4.3.2-11.1.ent.i386", "3AS:php-devel-0:4.3.2-11.1.ent.ia64", "3AS:php-devel-0:4.3.2-11.1.ent.ppc", "3AS:php-devel-0:4.3.2-11.1.ent.s390", "3AS:php-devel-0:4.3.2-11.1.ent.s390x", "3AS:php-devel-0:4.3.2-11.1.ent.x86_64", "3AS:php-imap-0:4.3.2-11.1.ent.i386", "3AS:php-imap-0:4.3.2-11.1.ent.ia64", "3AS:php-imap-0:4.3.2-11.1.ent.ppc", "3AS:php-imap-0:4.3.2-11.1.ent.s390", "3AS:php-imap-0:4.3.2-11.1.ent.s390x", "3AS:php-imap-0:4.3.2-11.1.ent.x86_64", "3AS:php-ldap-0:4.3.2-11.1.ent.i386", "3AS:php-ldap-0:4.3.2-11.1.ent.ia64", "3AS:php-ldap-0:4.3.2-11.1.ent.ppc", "3AS:php-ldap-0:4.3.2-11.1.ent.s390", "3AS:php-ldap-0:4.3.2-11.1.ent.s390x", "3AS:php-ldap-0:4.3.2-11.1.ent.x86_64", "3AS:php-mysql-0:4.3.2-11.1.ent.i386", "3AS:php-mysql-0:4.3.2-11.1.ent.ia64", "3AS:php-mysql-0:4.3.2-11.1.ent.ppc", "3AS:php-mysql-0:4.3.2-11.1.ent.s390", "3AS:php-mysql-0:4.3.2-11.1.ent.s390x", "3AS:php-mysql-0:4.3.2-11.1.ent.x86_64", "3AS:php-odbc-0:4.3.2-11.1.ent.i386", "3AS:php-odbc-0:4.3.2-11.1.ent.ia64", "3AS:php-odbc-0:4.3.2-11.1.ent.ppc", "3AS:php-odbc-0:4.3.2-11.1.ent.s390", "3AS:php-odbc-0:4.3.2-11.1.ent.s390x", "3AS:php-odbc-0:4.3.2-11.1.ent.x86_64", "3AS:php-pgsql-0:4.3.2-11.1.ent.i386", "3AS:php-pgsql-0:4.3.2-11.1.ent.ia64", "3AS:php-pgsql-0:4.3.2-11.1.ent.ppc", "3AS:php-pgsql-0:4.3.2-11.1.ent.s390", "3AS:php-pgsql-0:4.3.2-11.1.ent.s390x", "3AS:php-pgsql-0:4.3.2-11.1.ent.x86_64", "3Desktop:php-0:4.3.2-11.1.ent.i386", "3Desktop:php-0:4.3.2-11.1.ent.ia64", "3Desktop:php-0:4.3.2-11.1.ent.ppc", "3Desktop:php-0:4.3.2-11.1.ent.s390", "3Desktop:php-0:4.3.2-11.1.ent.s390x", "3Desktop:php-0:4.3.2-11.1.ent.src", "3Desktop:php-0:4.3.2-11.1.ent.x86_64", "3Desktop:php-debuginfo-0:4.3.2-11.1.ent.i386", "3Desktop:php-debuginfo-0:4.3.2-11.1.ent.ia64", "3Desktop:php-debuginfo-0:4.3.2-11.1.ent.ppc", "3Desktop:php-debuginfo-0:4.3.2-11.1.ent.s390", "3Desktop:php-debuginfo-0:4.3.2-11.1.ent.s390x", "3Desktop:php-debuginfo-0:4.3.2-11.1.ent.x86_64", "3Desktop:php-devel-0:4.3.2-11.1.ent.i386", "3Desktop:php-devel-0:4.3.2-11.1.ent.ia64", "3Desktop:php-devel-0:4.3.2-11.1.ent.ppc", "3Desktop:php-devel-0:4.3.2-11.1.ent.s390", "3Desktop:php-devel-0:4.3.2-11.1.ent.s390x", "3Desktop:php-devel-0:4.3.2-11.1.ent.x86_64", "3Desktop:php-imap-0:4.3.2-11.1.ent.i386", "3Desktop:php-imap-0:4.3.2-11.1.ent.ia64", "3Desktop:php-imap-0:4.3.2-11.1.ent.ppc", "3Desktop:php-imap-0:4.3.2-11.1.ent.s390", "3Desktop:php-imap-0:4.3.2-11.1.ent.s390x", "3Desktop:php-imap-0:4.3.2-11.1.ent.x86_64", "3Desktop:php-ldap-0:4.3.2-11.1.ent.i386", "3Desktop:php-ldap-0:4.3.2-11.1.ent.ia64", "3Desktop:php-ldap-0:4.3.2-11.1.ent.ppc", "3Desktop:php-ldap-0:4.3.2-11.1.ent.s390", "3Desktop:php-ldap-0:4.3.2-11.1.ent.s390x", "3Desktop:php-ldap-0:4.3.2-11.1.ent.x86_64", "3Desktop:php-mysql-0:4.3.2-11.1.ent.i386", "3Desktop:php-mysql-0:4.3.2-11.1.ent.ia64", "3Desktop:php-mysql-0:4.3.2-11.1.ent.ppc", "3Desktop:php-mysql-0:4.3.2-11.1.ent.s390", "3Desktop:php-mysql-0:4.3.2-11.1.ent.s390x", "3Desktop:php-mysql-0:4.3.2-11.1.ent.x86_64", "3Desktop:php-odbc-0:4.3.2-11.1.ent.i386", "3Desktop:php-odbc-0:4.3.2-11.1.ent.ia64", "3Desktop:php-odbc-0:4.3.2-11.1.ent.ppc", "3Desktop:php-odbc-0:4.3.2-11.1.ent.s390", "3Desktop:php-odbc-0:4.3.2-11.1.ent.s390x", "3Desktop:php-odbc-0:4.3.2-11.1.ent.x86_64", "3Desktop:php-pgsql-0:4.3.2-11.1.ent.i386", "3Desktop:php-pgsql-0:4.3.2-11.1.ent.ia64", "3Desktop:php-pgsql-0:4.3.2-11.1.ent.ppc", "3Desktop:php-pgsql-0:4.3.2-11.1.ent.s390", "3Desktop:php-pgsql-0:4.3.2-11.1.ent.s390x", "3Desktop:php-pgsql-0:4.3.2-11.1.ent.x86_64", "3ES:php-0:4.3.2-11.1.ent.i386", "3ES:php-0:4.3.2-11.1.ent.ia64", "3ES:php-0:4.3.2-11.1.ent.ppc", "3ES:php-0:4.3.2-11.1.ent.s390", "3ES:php-0:4.3.2-11.1.ent.s390x", "3ES:php-0:4.3.2-11.1.ent.src", "3ES:php-0:4.3.2-11.1.ent.x86_64", "3ES:php-debuginfo-0:4.3.2-11.1.ent.i386", "3ES:php-debuginfo-0:4.3.2-11.1.ent.ia64", "3ES:php-debuginfo-0:4.3.2-11.1.ent.ppc", "3ES:php-debuginfo-0:4.3.2-11.1.ent.s390", "3ES:php-debuginfo-0:4.3.2-11.1.ent.s390x", "3ES:php-debuginfo-0:4.3.2-11.1.ent.x86_64", "3ES:php-devel-0:4.3.2-11.1.ent.i386", "3ES:php-devel-0:4.3.2-11.1.ent.ia64", "3ES:php-devel-0:4.3.2-11.1.ent.ppc", "3ES:php-devel-0:4.3.2-11.1.ent.s390", "3ES:php-devel-0:4.3.2-11.1.ent.s390x", "3ES:php-devel-0:4.3.2-11.1.ent.x86_64", "3ES:php-imap-0:4.3.2-11.1.ent.i386", "3ES:php-imap-0:4.3.2-11.1.ent.ia64", "3ES:php-imap-0:4.3.2-11.1.ent.ppc", "3ES:php-imap-0:4.3.2-11.1.ent.s390", "3ES:php-imap-0:4.3.2-11.1.ent.s390x", "3ES:php-imap-0:4.3.2-11.1.ent.x86_64", "3ES:php-ldap-0:4.3.2-11.1.ent.i386", "3ES:php-ldap-0:4.3.2-11.1.ent.ia64", "3ES:php-ldap-0:4.3.2-11.1.ent.ppc", "3ES:php-ldap-0:4.3.2-11.1.ent.s390", "3ES:php-ldap-0:4.3.2-11.1.ent.s390x", "3ES:php-ldap-0:4.3.2-11.1.ent.x86_64", "3ES:php-mysql-0:4.3.2-11.1.ent.i386", "3ES:php-mysql-0:4.3.2-11.1.ent.ia64", "3ES:php-mysql-0:4.3.2-11.1.ent.ppc", "3ES:php-mysql-0:4.3.2-11.1.ent.s390", "3ES:php-mysql-0:4.3.2-11.1.ent.s390x", "3ES:php-mysql-0:4.3.2-11.1.ent.x86_64", "3ES:php-odbc-0:4.3.2-11.1.ent.i386", "3ES:php-odbc-0:4.3.2-11.1.ent.ia64", "3ES:php-odbc-0:4.3.2-11.1.ent.ppc", "3ES:php-odbc-0:4.3.2-11.1.ent.s390", "3ES:php-odbc-0:4.3.2-11.1.ent.s390x", "3ES:php-odbc-0:4.3.2-11.1.ent.x86_64", "3ES:php-pgsql-0:4.3.2-11.1.ent.i386", "3ES:php-pgsql-0:4.3.2-11.1.ent.ia64", "3ES:php-pgsql-0:4.3.2-11.1.ent.ppc", "3ES:php-pgsql-0:4.3.2-11.1.ent.s390", "3ES:php-pgsql-0:4.3.2-11.1.ent.s390x", "3ES:php-pgsql-0:4.3.2-11.1.ent.x86_64", "3WS:php-0:4.3.2-11.1.ent.i386", "3WS:php-0:4.3.2-11.1.ent.ia64", "3WS:php-0:4.3.2-11.1.ent.ppc", "3WS:php-0:4.3.2-11.1.ent.s390", "3WS:php-0:4.3.2-11.1.ent.s390x", "3WS:php-0:4.3.2-11.1.ent.src", "3WS:php-0:4.3.2-11.1.ent.x86_64", "3WS:php-debuginfo-0:4.3.2-11.1.ent.i386", "3WS:php-debuginfo-0:4.3.2-11.1.ent.ia64", "3WS:php-debuginfo-0:4.3.2-11.1.ent.ppc", "3WS:php-debuginfo-0:4.3.2-11.1.ent.s390", "3WS:php-debuginfo-0:4.3.2-11.1.ent.s390x", "3WS:php-debuginfo-0:4.3.2-11.1.ent.x86_64", "3WS:php-devel-0:4.3.2-11.1.ent.i386", "3WS:php-devel-0:4.3.2-11.1.ent.ia64", "3WS:php-devel-0:4.3.2-11.1.ent.ppc", "3WS:php-devel-0:4.3.2-11.1.ent.s390", "3WS:php-devel-0:4.3.2-11.1.ent.s390x", "3WS:php-devel-0:4.3.2-11.1.ent.x86_64", "3WS:php-imap-0:4.3.2-11.1.ent.i386", "3WS:php-imap-0:4.3.2-11.1.ent.ia64", "3WS:php-imap-0:4.3.2-11.1.ent.ppc", "3WS:php-imap-0:4.3.2-11.1.ent.s390", "3WS:php-imap-0:4.3.2-11.1.ent.s390x", "3WS:php-imap-0:4.3.2-11.1.ent.x86_64", "3WS:php-ldap-0:4.3.2-11.1.ent.i386", "3WS:php-ldap-0:4.3.2-11.1.ent.ia64", "3WS:php-ldap-0:4.3.2-11.1.ent.ppc", "3WS:php-ldap-0:4.3.2-11.1.ent.s390", "3WS:php-ldap-0:4.3.2-11.1.ent.s390x", "3WS:php-ldap-0:4.3.2-11.1.ent.x86_64", "3WS:php-mysql-0:4.3.2-11.1.ent.i386", "3WS:php-mysql-0:4.3.2-11.1.ent.ia64", "3WS:php-mysql-0:4.3.2-11.1.ent.ppc", "3WS:php-mysql-0:4.3.2-11.1.ent.s390", "3WS:php-mysql-0:4.3.2-11.1.ent.s390x", "3WS:php-mysql-0:4.3.2-11.1.ent.x86_64", "3WS:php-odbc-0:4.3.2-11.1.ent.i386", "3WS:php-odbc-0:4.3.2-11.1.ent.ia64", "3WS:php-odbc-0:4.3.2-11.1.ent.ppc", "3WS:php-odbc-0:4.3.2-11.1.ent.s390", "3WS:php-odbc-0:4.3.2-11.1.ent.s390x", "3WS:php-odbc-0:4.3.2-11.1.ent.x86_64", "3WS:php-pgsql-0:4.3.2-11.1.ent.i386", "3WS:php-pgsql-0:4.3.2-11.1.ent.ia64", "3WS:php-pgsql-0:4.3.2-11.1.ent.ppc", "3WS:php-pgsql-0:4.3.2-11.1.ent.s390", "3WS:php-pgsql-0:4.3.2-11.1.ent.s390x", "3WS:php-pgsql-0:4.3.2-11.1.ent.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:392" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" } ] }
rhsa-2004_395
Vulnerability from csaf_redhat
Published
2004-07-19 15:24
Modified
2024-11-05 16:24
Summary
Red Hat Security Advisory: php security update
Notes
Topic
Updated php packages that fix various security issues are now available.
Details
PHP is an HTML-embedded scripting language commonly used with the Apache
HTTP server.
Stefan Esser discovered a flaw when memory_limit configuration setting is
enabled in versions of PHP 4 before 4.3.8. If a remote attacker could
force the PHP interpreter to allocate more memory than the memory_limit
setting before script execution begins, then the attacker may be
able to supply the contents of a PHP hash table remotely. This hash table
could then be used to execute arbitrary code as the 'apache' user. The
Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned
the name CAN-2004-0594 to this issue.
This issue may be exploitable if using the default PHP configuration with
the "register_globals" setting of "On". The Apache memory exhaustion bug,
fixed in a previous update to Red Hat Enterprise Linux 3, may also allow
this PHP issue to be exploited; this Apache bug does not affect Red Hat
Enterprise Linux 2.1.
Stefan Esser discovered a flaw in the strip_tags function in versions of
PHP before 4.3.8. The strip_tags function is commonly used by PHP scripts
to prevent Cross-Site-Scripting attacks by removing HTML tags from
user-supplied form data. By embedding NUL bytes into form data, HTML tags
can in some cases be passed intact through the strip_tags function, which
may allow a Cross-Site-Scripting attack. The Common Vulnerabilities and
Exposures project (cve.mitre.org) has assigned the name CAN-2004-0595 to
this issue.
All users of PHP are advised to upgrade to these updated packages, which
contain backported patches that address these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated php packages that fix various security issues are now available.", "title": "Topic" }, { "category": "general", "text": "PHP is an HTML-embedded scripting language commonly used with the Apache\nHTTP server.\n\nStefan Esser discovered a flaw when memory_limit configuration setting is\nenabled in versions of PHP 4 before 4.3.8. If a remote attacker could\nforce the PHP interpreter to allocate more memory than the memory_limit\nsetting before script execution begins, then the attacker may be\nable to supply the contents of a PHP hash table remotely. This hash table\ncould then be used to execute arbitrary code as the \u0027apache\u0027 user. The\nCommon Vulnerabilities and Exposures project (cve.mitre.org) has assigned\nthe name CAN-2004-0594 to this issue.\n\nThis issue may be exploitable if using the default PHP configuration with\nthe \"register_globals\" setting of \"On\". The Apache memory exhaustion bug,\nfixed in a previous update to Red Hat Enterprise Linux 3, may also allow\nthis PHP issue to be exploited; this Apache bug does not affect Red Hat\nEnterprise Linux 2.1.\n\nStefan Esser discovered a flaw in the strip_tags function in versions of\nPHP before 4.3.8. The strip_tags function is commonly used by PHP scripts\nto prevent Cross-Site-Scripting attacks by removing HTML tags from\nuser-supplied form data. By embedding NUL bytes into form data, HTML tags\ncan in some cases be passed intact through the strip_tags function, which\nmay allow a Cross-Site-Scripting attack. The Common Vulnerabilities and\nExposures project (cve.mitre.org) has assigned the name CAN-2004-0595 to\nthis issue.\n\nAll users of PHP are advised to upgrade to these updated packages, which\ncontain backported patches that address these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2004:395", "url": "https://access.redhat.com/errata/RHSA-2004:395" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "127642", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=127642" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2004/rhsa-2004_395.json" } ], "title": "Red Hat Security Advisory: php security update", "tracking": { "current_release_date": "2024-11-05T16:24:05+00:00", "generator": { "date": "2024-11-05T16:24:05+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2004:395", "initial_release_date": "2004-07-19T15:24:00+00:00", "revision_history": [ { "date": "2004-07-19T15:24:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2004-07-19T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T16:24:05+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product": { "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::as" } } }, { "category": "product_name", "name": "Red Hat Linux Advanced Workstation 2.1", "product": { "name": "Red Hat Linux Advanced Workstation 2.1", "product_id": "Red Hat Linux Advanced Workstation 2.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::aw" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 2.1", "product": { "name": "Red Hat Enterprise Linux ES version 2.1", "product_id": "Red Hat Enterprise Linux ES version 2.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 2.1", "product": { "name": "Red Hat Enterprise Linux WS version 2.1", "product_id": "Red Hat Enterprise Linux WS version 2.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2004-0594", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617233" } ], "notes": [ { "category": "description", "text": "The memory_limit functionality in PHP 4.x up to 4.3.7, and 5.x up to 5.0.0RC3, under certain conditions such as when register_globals is enabled, allows remote attackers to execute arbitrary code by triggering a memory_limit abort during execution of the zend_hash_init function and overwriting a HashTable destructor pointer before the initialization of key data structures is complete.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0594" }, { "category": "external", "summary": "RHBZ#1617233", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617233" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0594", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0594" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0594", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0594" } ], "release_date": "2004-07-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-07-19T15:24:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:395" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-0595", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617234" } ], "notes": [ { "category": "description", "text": "The strip_tags function in PHP 4.x up to 4.3.7, and 5.x up to 5.0.0RC3, does not filter null (\\0) characters within tag names when restricting input to allowed tags, which allows dangerous tags to be processed by web browsers such as Internet Explorer and Safari, which ignore null characters and facilitate the exploitation of cross-site scripting (XSS) vulnerabilities.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0595" }, { "category": "external", "summary": "RHBZ#1617234", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617234" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0595", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0595" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0595", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0595" } ], "release_date": "2004-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-07-19T15:24:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:395" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" } ] }
rhsa-2004_405
Vulnerability from csaf_redhat
Published
2004-07-23 09:26
Modified
2024-11-05 16:23
Summary
Red Hat Security Advisory: apache, mod_ssl, php security update for Stronghold
Notes
Topic
Updated versions of cross-platform Stronghold that fix security issues in
mod_ssl, PHP, and the Apache HTTP Server are now available.
Details
Stronghold 4 contains a number of open source technologies, including
PHP, mod_ssl and the Apache HTTP Server.
Stefan Esser discovered a flaw when the memory_limit configuration setting
was enabled in PHP 4 versions prior to 4.3.8. If a remote attacker could
force the PHP interpreter to allocate more memory than the memory_limit
setting before script execution begins, then the attacker may be able to
supply the contents of a PHP hash table remotely. This hash table could
then be used to execute arbitrary code as the 'apache' user. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name
CAN-2004-0594 to this issue.
It may be possible to exploit this issue if using a non-default PHP
configuration with the "register_defaults" setting is changed to "On". Red
Hat does not believe that this flaw is exploitable in the default
configuration of Stronghold 4.
Stefan Esser discovered a flaw in the strip_tags function in versions of
PHP prior to 4.3.8. The strip_tags function is commonly used by PHP scripts
to prevent cross-site scripting attacks by removing HTML tags from
user-supplied form data. By embedding NUL bytes into form data, HTML tags
can in some cases be passed intact through the strip_tags function, which
may allow a cross-site scripting attack. The Common Vulnerabilities and
Exposures project (cve.mitre.org) has assigned the name CAN-2004-0595 to
this issue.
A stack buffer overflow was discovered in mod_ssl which can be triggered if
using the FakeBasicAuth option. If mod_ssl is sent a client certificate
with a subject DN field longer than 6000 characters, a stack overflow can
occur if FakeBasicAuth has been enabled. In order to exploit this issue,
the carefully crafted malicious certificate would have to be signed by a
Certificate Authority which mod_ssl is configured to trust. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name
CAN-2004-0488 to this issue.
A format string issue was discovered in mod_ssl which can be triggered if
mod_ssl is configured to allow a client to proxy to remote SSL sites.
If mod_ssl is forced to connect to a remote SSL server using a
carefully crafted hostname, an attacker may be able to crash an Apache
child process. This issue is not known to allow arbitrary execution of
code. The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CAN-2004-0700 to this issue.
A denial of service issue was discovered which affects versions of the
Apache HTTP Server prior to 1.3.30. On some platforms, when Apache is
configured with multiple listening sockets, a short-lived connection to
one socket may temporarily block new connections to other sockets. This
issue does not affect Stronghold if running on Linux, FreeBSD or HP-UX
platforms. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CAN-2004-0174 to this issue.
Users of Stronghold 4 cross-platform are advised to update to these errata
versions, which contain backported security fixes and are not vulnerable to
these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated versions of cross-platform Stronghold that fix security issues in\nmod_ssl, PHP, and the Apache HTTP Server are now available.", "title": "Topic" }, { "category": "general", "text": "Stronghold 4 contains a number of open source technologies, including\nPHP, mod_ssl and the Apache HTTP Server.\n\nStefan Esser discovered a flaw when the memory_limit configuration setting\nwas enabled in PHP 4 versions prior to 4.3.8. If a remote attacker could\nforce the PHP interpreter to allocate more memory than the memory_limit\nsetting before script execution begins, then the attacker may be able to\nsupply the contents of a PHP hash table remotely. This hash table could\nthen be used to execute arbitrary code as the \u0027apache\u0027 user. The Common\nVulnerabilities and Exposures project (cve.mitre.org) has assigned the name\nCAN-2004-0594 to this issue.\n\nIt may be possible to exploit this issue if using a non-default PHP\nconfiguration with the \"register_defaults\" setting is changed to \"On\". Red\nHat does not believe that this flaw is exploitable in the default\nconfiguration of Stronghold 4.\n\nStefan Esser discovered a flaw in the strip_tags function in versions of\nPHP prior to 4.3.8. The strip_tags function is commonly used by PHP scripts\nto prevent cross-site scripting attacks by removing HTML tags from\nuser-supplied form data. By embedding NUL bytes into form data, HTML tags\ncan in some cases be passed intact through the strip_tags function, which\nmay allow a cross-site scripting attack. The Common Vulnerabilities and\nExposures project (cve.mitre.org) has assigned the name CAN-2004-0595 to\nthis issue.\n\nA stack buffer overflow was discovered in mod_ssl which can be triggered if\nusing the FakeBasicAuth option. If mod_ssl is sent a client certificate\nwith a subject DN field longer than 6000 characters, a stack overflow can\noccur if FakeBasicAuth has been enabled. In order to exploit this issue,\nthe carefully crafted malicious certificate would have to be signed by a\nCertificate Authority which mod_ssl is configured to trust. The Common\nVulnerabilities and Exposures project (cve.mitre.org) has assigned the name\nCAN-2004-0488 to this issue.\n\nA format string issue was discovered in mod_ssl which can be triggered if \nmod_ssl is configured to allow a client to proxy to remote SSL sites. \nIf mod_ssl is forced to connect to a remote SSL server using a\ncarefully crafted hostname, an attacker may be able to crash an Apache\nchild process. This issue is not known to allow arbitrary execution of\ncode. The Common Vulnerabilities and Exposures project (cve.mitre.org) has\nassigned the name CAN-2004-0700 to this issue.\n\nA denial of service issue was discovered which affects versions of the\nApache HTTP Server prior to 1.3.30. On some platforms, when Apache is\nconfigured with multiple listening sockets, a short-lived connection to\none socket may temporarily block new connections to other sockets. This\nissue does not affect Stronghold if running on Linux, FreeBSD or HP-UX\nplatforms. The Common Vulnerabilities and Exposures project\n(cve.mitre.org) has assigned the name CAN-2004-0174 to this issue.\n\nUsers of Stronghold 4 cross-platform are advised to update to these errata\nversions, which contain backported security fixes and are not vulnerable to\nthese issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2004:405", "url": "https://access.redhat.com/errata/RHSA-2004:405" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "127703", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=127703" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2004/rhsa-2004_405.json" } ], "title": "Red Hat Security Advisory: apache, mod_ssl, php security update for Stronghold", "tracking": { "current_release_date": "2024-11-05T16:23:38+00:00", "generator": { "date": "2024-11-05T16:23:38+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2004:405", "initial_release_date": "2004-07-23T09:26:00+00:00", "revision_history": [ { "date": "2004-07-23T09:26:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2004-07-23T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T16:23:38+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Stronghold 4", "product": { "name": "Red Hat Stronghold 4", "product_id": "Red Hat Stronghold 4", "product_identification_helper": { "cpe": "cpe:/a:redhat:stronghold:4" } } } ], "category": "product_family", "name": "Stronghold Cross Platform" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2004-0174", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617165" } ], "notes": [ { "category": "description", "text": "Apache 1.4.x before 1.3.30, and 2.0.x before 2.0.49, when using multiple listening sockets on certain platforms, allows remote attackers to cause a denial of service (blocked new connections) via a \"short-lived connection on a rarely-accessed listening socket.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" }, { "category": "other", "text": "Not vulnerable. This issue did not affect Linux.", "title": "Statement" } ], "product_status": { "fixed": [ "Red Hat Stronghold 4" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0174" }, { "category": "external", "summary": "RHBZ#1617165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617165" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0174", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0174" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0174", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0174" } ], "release_date": "2004-03-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-07-23T09:26:00+00:00", "details": "Updated Stronghold 4 packages are now available via the update agent\nservice. Run the following command from the Stronghold 4 install root to\nupgrade an existing Stronghold 4 installation to the new package versions:\n\n$ bin/agent\n\nThe Stronghold 4.0i patch release which contains these updated packages is\nalso available from the download site.\n\nAfter upgrading Stronghold, the server must be completely restarted by\nrunning the following commands from the install root:\n\n$ bin/stop-server\n$ bin/start-server\n\nFor more information on how to upgrade between releases of Stronghold 4,\nrefer to http://stronghold.redhat.com/support/upgrade-sh4", "product_ids": [ "Red Hat Stronghold 4" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:405" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2004-0488", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430867" } ], "notes": [ { "category": "description", "text": "Stack-based buffer overflow in the ssl_util_uuencode_binary function in ssl_util.c for Apache mod_ssl, when mod_ssl is configured to trust the issuing CA, may allow remote attackers to execute arbitrary code via a client certificate with a long subject DN.", "title": "Vulnerability description" }, { "category": "summary", "text": "mod_ssl ssl_util_uuencode_binary CA issue", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Stronghold 4" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0488" }, { "category": "external", "summary": "RHBZ#430867", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430867" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0488", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0488" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0488", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0488" } ], "release_date": "2004-05-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-07-23T09:26:00+00:00", "details": "Updated Stronghold 4 packages are now available via the update agent\nservice. Run the following command from the Stronghold 4 install root to\nupgrade an existing Stronghold 4 installation to the new package versions:\n\n$ bin/agent\n\nThe Stronghold 4.0i patch release which contains these updated packages is\nalso available from the download site.\n\nAfter upgrading Stronghold, the server must be completely restarted by\nrunning the following commands from the install root:\n\n$ bin/stop-server\n$ bin/start-server\n\nFor more information on how to upgrade between releases of Stronghold 4,\nrefer to http://stronghold.redhat.com/support/upgrade-sh4", "product_ids": [ "Red Hat Stronghold 4" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:405" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "mod_ssl ssl_util_uuencode_binary CA issue" }, { "cve": "CVE-2004-0594", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617233" } ], "notes": [ { "category": "description", "text": "The memory_limit functionality in PHP 4.x up to 4.3.7, and 5.x up to 5.0.0RC3, under certain conditions such as when register_globals is enabled, allows remote attackers to execute arbitrary code by triggering a memory_limit abort during execution of the zend_hash_init function and overwriting a HashTable destructor pointer before the initialization of key data structures is complete.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Stronghold 4" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0594" }, { "category": "external", "summary": "RHBZ#1617233", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617233" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0594", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0594" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0594", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0594" } ], "release_date": "2004-07-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-07-23T09:26:00+00:00", "details": "Updated Stronghold 4 packages are now available via the update agent\nservice. Run the following command from the Stronghold 4 install root to\nupgrade an existing Stronghold 4 installation to the new package versions:\n\n$ bin/agent\n\nThe Stronghold 4.0i patch release which contains these updated packages is\nalso available from the download site.\n\nAfter upgrading Stronghold, the server must be completely restarted by\nrunning the following commands from the install root:\n\n$ bin/stop-server\n$ bin/start-server\n\nFor more information on how to upgrade between releases of Stronghold 4,\nrefer to http://stronghold.redhat.com/support/upgrade-sh4", "product_ids": [ "Red Hat Stronghold 4" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:405" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-0595", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617234" } ], "notes": [ { "category": "description", "text": "The strip_tags function in PHP 4.x up to 4.3.7, and 5.x up to 5.0.0RC3, does not filter null (\\0) characters within tag names when restricting input to allowed tags, which allows dangerous tags to be processed by web browsers such as Internet Explorer and Safari, which ignore null characters and facilitate the exploitation of cross-site scripting (XSS) vulnerabilities.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Stronghold 4" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0595" }, { "category": "external", "summary": "RHBZ#1617234", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617234" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0595", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0595" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0595", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0595" } ], "release_date": "2004-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-07-23T09:26:00+00:00", "details": "Updated Stronghold 4 packages are now available via the update agent\nservice. Run the following command from the Stronghold 4 install root to\nupgrade an existing Stronghold 4 installation to the new package versions:\n\n$ bin/agent\n\nThe Stronghold 4.0i patch release which contains these updated packages is\nalso available from the download site.\n\nAfter upgrading Stronghold, the server must be completely restarted by\nrunning the following commands from the install root:\n\n$ bin/stop-server\n$ bin/start-server\n\nFor more information on how to upgrade between releases of Stronghold 4,\nrefer to http://stronghold.redhat.com/support/upgrade-sh4", "product_ids": [ "Red Hat Stronghold 4" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:405" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2004-0700", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430866" } ], "notes": [ { "category": "description", "text": "Format string vulnerability in the mod_proxy hook functions function in ssl_engine_log.c in mod_ssl before 2.8.19 for Apache before 1.3.31 may allow remote attackers to execute arbitrary messages via format string specifiers in certain log messages for HTTPS that are handled by the ssl_log function.", "title": "Vulnerability description" }, { "category": "summary", "text": "mod_proxy hook format string", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Stronghold 4" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0700" }, { "category": "external", "summary": "RHBZ#430866", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430866" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0700", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0700" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0700", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0700" } ], "release_date": "2004-07-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-07-23T09:26:00+00:00", "details": "Updated Stronghold 4 packages are now available via the update agent\nservice. Run the following command from the Stronghold 4 install root to\nupgrade an existing Stronghold 4 installation to the new package versions:\n\n$ bin/agent\n\nThe Stronghold 4.0i patch release which contains these updated packages is\nalso available from the download site.\n\nAfter upgrading Stronghold, the server must be completely restarted by\nrunning the following commands from the install root:\n\n$ bin/stop-server\n$ bin/start-server\n\nFor more information on how to upgrade between releases of Stronghold 4,\nrefer to http://stronghold.redhat.com/support/upgrade-sh4", "product_ids": [ "Red Hat Stronghold 4" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:405" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "mod_proxy hook format string" } ] }
gsd-2004-0594
Vulnerability from gsd
Modified
2023-12-13 01:22
Details
The memory_limit functionality in PHP 4.x up to 4.3.7, and 5.x up to 5.0.0RC3, under certain conditions such as when register_globals is enabled, allows remote attackers to execute arbitrary code by triggering a memory_limit abort during execution of the zend_hash_init function and overwriting a HashTable destructor pointer before the initialization of key data structures is complete.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2004-0594", "description": "The memory_limit functionality in PHP 4.x up to 4.3.7, and 5.x up to 5.0.0RC3, under certain conditions such as when register_globals is enabled, allows remote attackers to execute arbitrary code by triggering a memory_limit abort during execution of the zend_hash_init function and overwriting a HashTable destructor pointer before the initialization of key data structures is complete.", "id": "GSD-2004-0594", "references": [ "https://www.suse.com/security/cve/CVE-2004-0594.html", "https://www.debian.org/security/2005/dsa-669", "https://www.debian.org/security/2004/dsa-531", "https://access.redhat.com/errata/RHSA-2005:816", "https://access.redhat.com/errata/RHSA-2004:405", "https://access.redhat.com/errata/RHSA-2004:395", "https://access.redhat.com/errata/RHSA-2004:392", "https://packetstormsecurity.com/files/cve/CVE-2004-0594" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2004-0594" ], "details": "The memory_limit functionality in PHP 4.x up to 4.3.7, and 5.x up to 5.0.0RC3, under certain conditions such as when register_globals is enabled, allows remote attackers to execute arbitrary code by triggering a memory_limit abort during execution of the zend_hash_init function and overwriting a HashTable destructor pointer before the initialization of key data structures is complete.", "id": "GSD-2004-0594", "modified": "2023-12-13T01:22:54.991625Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0594", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The memory_limit functionality in PHP 4.x up to 4.3.7, and 5.x up to 5.0.0RC3, under certain conditions such as when register_globals is enabled, allows remote attackers to execute arbitrary code by triggering a memory_limit abort during execution of the zend_hash_init function and overwriting a HashTable destructor pointer before the initialization of key data structures is complete." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "2004-0039", "refsource": "TRUSTIX", "url": "http://www.trustix.org/errata/2004/0039/" }, { "name": "20040714 Advisory 11/2004: PHP memory_limit remote vulnerability", "refsource": "FULLDISC", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-July/023908.html" }, { "name": "CLA-2004:847", "refsource": "CONECTIVA", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000847" }, { "name": "20040714 TSSA-2004-013 - php", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=108982983426031\u0026w=2" }, { "name": "DSA-669", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2005/dsa-669" }, { "name": "RHSA-2004:395", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2004-395.html" }, { "name": "RHSA-2004:405", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2004-405.html" }, { "name": "oval:org.mitre.oval:def:10896", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10896" }, { "name": "RHSA-2004:392", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2004-392.html" }, { "name": "DSA-531", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2004/dsa-531" }, { "name": "SUSE-SA:2004:021", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2004_21_php4.html" }, { "name": "MDKSA-2004:068", "refsource": "MANDRAKE", "url": "http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:068" }, { "name": "RHSA-2005:816", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2005-816.html" }, { "name": "SSRT4777", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=109181600614477\u0026w=2" }, { "name": "php-memorylimit-code-execution(16693)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16693" }, { "name": "20040722 [OpenPKG-SA-2004.034] OpenPKG Security Advisory (php)", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=109051444105182\u0026w=2" }, { "name": "10725", "refsource": "BID", "url": "http://www.securityfocus.com/bid/10725" }, { "name": "20040713 Advisory 11/2004: PHP memory_limit remote vulnerability", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=108981780109154\u0026w=2" }, { "name": "GLSA-200407-13", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-200407-13.xml" } ] } }, "nvd.nist.gov": { "cve": { "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openpkg:openpkg:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "48A4B336-2D5B-4D9B-AA87-E5266FED05BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:openpkg:openpkg:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "37042CDE-E4FE-442E-891A-CD84433D36E2", "vulnerable": true }, { "criteria": "cpe:2.3:h:avaya:converged_communications_server:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "E586558A-ABC3-42EB-8B4D-DC92A0D695E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "2CAE037F-111C-4A76-8FFE-716B74D65EF3", "vulnerable": true }, { "criteria": "cpe:2.3:o:hp:hp-ux:b.11.00:*:*:*:*:*:*:*", "matchCriteriaId": "54C09E05-4FAA-4893-BF36-9DD967525C4E", "vulnerable": true }, { "criteria": "cpe:2.3:o:hp:hp-ux:b.11.11:*:*:*:*:*:*:*", "matchCriteriaId": "972D4ABF-2E80-4902-910D-5BD0CBEC9765", "vulnerable": true }, { "criteria": "cpe:2.3:o:hp:hp-ux:b.11.22:*:*:*:*:*:*:*", "matchCriteriaId": "DE7425AE-26A6-48A4-B883-C6220FCAC32B", "vulnerable": true }, { "criteria": "cpe:2.3:o:hp:hp-ux:b.11.23:*:*:*:*:*:*:*", "matchCriteriaId": "12C73959-3E02-4847-8962-651D652800EE", "vulnerable": true }, { "criteria": "cpe:2.3:o:trustix:secure_linux:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "39605B96-BAD6-45C9-BB9A-43D6E2C51ADD", "vulnerable": true }, { "criteria": "cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "53AF1A2D-B0A2-4097-AD1D-DF3AF27171BA", "vulnerable": true }, { "criteria": "cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "A67735E5-E43E-4164-BDB2-ADC6E0288E9F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", "matchCriteriaId": "04AA8CFD-CEAD-455C-A96A-E1FE87196C86", "versionEndExcluding": "4.3.7", "versionStartIncluding": "4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:php:php:5.0.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "E727CECE-E452-489A-A42F-5A069D6AF80E", "vulnerable": true }, { "criteria": "cpe:2.3:a:php:php:5.0.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "149A1FB8-593E-412B-8E1C-3E560301D500", "vulnerable": true }, { "criteria": "cpe:2.3:a:php:php:5.0.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "5D6E8982-D7AE-4A52-8F7C-A4D59D2A2CA4", "vulnerable": true }, { "criteria": "cpe:2.3:a:php:php:5.0.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "8FC144FA-8F84-44C0-B263-B639FEAD20FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:php:php:5.0.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "295907B4-C3DE-4021-BE3B-A8826D4379E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:php:php:5.0.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "DBC98F82-6E1D-4A89-8ED4-ECD9BD954EB4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "The memory_limit functionality in PHP 4.x up to 4.3.7, and 5.x up to 5.0.0RC3, under certain conditions such as when register_globals is enabled, allows remote attackers to execute arbitrary code by triggering a memory_limit abort during execution of the zend_hash_init function and overwriting a HashTable destructor pointer before the initialization of key data structures is complete." }, { "lang": "es", "value": "La funcionalidad memory_limit de PHP 4.x a 4.3.7 y 5.x a 5.0.0RC3, bajo ciertas condiciones, como cuando register_globals est\u00e1 habilitado, permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n disparando un aborto por memory_limit de la funci\u00f3n zend_hash_init y sobrescribiendo un puntero de destructor de HashTable antes de que la incializaci\u00f3n de las estructuras de datos clave se haya completado." } ], "id": "CVE-2004-0594", "lastModified": "2024-02-15T21:17:59.723", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-07-27T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000847" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "URL Repurposed" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-July/023908.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=108981780109154\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=108982983426031\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=109051444105182\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=109181600614477\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.debian.org/security/2004/dsa-531" }, { "source": "cve@mitre.org", "tags": [ "Mailing List" ], "url": "http://www.debian.org/security/2005/dsa-669" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200407-13.xml" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:068" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.novell.com/linux/security/advisories/2004_21_php4.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-392.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-395.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-405.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-816.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/10725" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.trustix.org/errata/2004/0039/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16693" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10896" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-367" } ], "source": "nvd@nist.gov", "type": "Primary" } ] } } } }
ghsa-jm2p-9h9p-vg22
Vulnerability from github
Published
2022-04-29 02:57
Modified
2024-02-15 21:31
Details
The memory_limit functionality in PHP 4.x up to 4.3.7, and 5.x up to 5.0.0RC3, under certain conditions such as when register_globals is enabled, allows remote attackers to execute arbitrary code by triggering a memory_limit abort during execution of the zend_hash_init function and overwriting a HashTable destructor pointer before the initialization of key data structures is complete.
{ "affected": [], "aliases": [ "CVE-2004-0594" ], "database_specific": { "cwe_ids": [ "CWE-367" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2004-07-27T04:00:00Z", "severity": "MODERATE" }, "details": "The memory_limit functionality in PHP 4.x up to 4.3.7, and 5.x up to 5.0.0RC3, under certain conditions such as when register_globals is enabled, allows remote attackers to execute arbitrary code by triggering a memory_limit abort during execution of the zend_hash_init function and overwriting a HashTable destructor pointer before the initialization of key data structures is complete.", "id": "GHSA-jm2p-9h9p-vg22", "modified": "2024-02-15T21:31:23Z", "published": "2022-04-29T02:57:59Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0594" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16693" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10896" }, { "type": "WEB", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000847" }, { "type": "WEB", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-July/023908.html" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=108981780109154\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=108982983426031\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=109051444105182\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=109181600614477\u0026w=2" }, { "type": "WEB", "url": "http://www.debian.org/security/2004/dsa-531" }, { "type": "WEB", "url": "http://www.debian.org/security/2005/dsa-669" }, { "type": "WEB", "url": "http://www.gentoo.org/security/en/glsa/glsa-200407-13.xml" }, { "type": "WEB", "url": "http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:068" }, { "type": "WEB", "url": "http://www.novell.com/linux/security/advisories/2004_21_php4.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2004-392.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2004-395.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2004-405.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2005-816.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/10725" }, { "type": "WEB", "url": "http://www.trustix.org/errata/2004/0039" } ], "schema_version": "1.4.0", "severity": [] }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.