rhsa-2006_0549
Vulnerability from csaf_redhat
Published
2006-07-27 20:05
Modified
2024-11-05 16:37
Summary
Red Hat Security Advisory: php security update for Stronghold

Notes

Topic
An updated version of PHP that addresses several security issues is now available for Stronghold 4.0 for Enterprise Linux. This update has been rated as having moderate security impact by the Red Hat Security Response Team.
Details
PHP is an HTML-embedded scripting language. Several security issues were found in the PHP package in Stronghold 4.0: The wordwrap() PHP function did not properly check for integer overflow in the way the "break" parameter was handled. An attacker who could control a string passed to the "break" parameter could cause a heap overflow. (CVE-2006-1990) The phpinfo() PHP function did not properly sanitize long strings. This could allow an attacker to perform cross-site scripting attacks against sites that had publicly-available PHP scripts that called phpinfo(). (CVE-2006-0996) The error handling output was found to improperly escape HTML output in certain cases. This could allow an attacker to perform cross-site scripting attacks against sites where both display_errors and html_errors were enabled. (CVE-2006-0208) A flaw in the way PHP registered global variables during a file upload request was discovered. A remote attacker could submit a carefully crafted multipart/form-data POST request that could overwrite the $GLOBALS array, which could alter expected script behavior and possibly lead to the execution of arbitrary PHP commands. Note that this vulnerability only affects installations which have register_globals enabled in the PHP configuration file, which is neither a default nor recommended option. (CVE-2005-3390) A flaw in the PHP parse_str() function was discovered. If a PHP script passed only one argument to the parse_str() function, and the script was forced to abort execution during operation (for example, due to the memory_limit setting), the register_globals may be enabled even if it was disabled in the PHP configuration file. This vulnerability only affects installations that have PHP scripts using the parse_str function in this way. (CVE-2005-3389) A Cross-Site Scripting flaw in the phpinfo() function was discovered. If a victim was tricked into following a malicious URL to a site with a page displaying the phpinfo() output, it was possible to inject javascript or HTML content into the displayed page or steal data such as cookies. This vulnerability only affects installations that allow users to view the output of the phpinfo() function. As the phpinfo() function outputs a large amount of information about the current state of PHP, it should only be used during debugging or if protected by authentication. (CVE-2005-3388) A buffer overflow flaw was discovered in uw-imap, the University of Washington's IMAP Server. php-imap is compiled against the static c-client libraries from imap and therefore needed to be recompiled against the fixed version. (CVE-2005-2933) A flaw was found in the zend_hash_del() PHP function. For PHP scripts that rely on the use of the unset() function, a remote attacker could force variable initialization to be bypassed. This would be a security issue particularly for installations that enable the "register_globals" setting. "register_globals" is disabled by default in Red Hat Enterprise Linux. (CVE-2006-3017) A directory traversal vulnerability was found in PHP. Local users could bypass open_basedir restrictions allowing remote attackers to create files in arbitrary directories via the tempnam() function. (CVE-2006-1494) Users of Stronghold are advised to upgrade to this update, which contains backported patches to correct these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.



{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An updated version of PHP that addresses several security issues is now\navailable for Stronghold 4.0 for Enterprise Linux.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "PHP is an HTML-embedded scripting language.  Several security issues were\nfound in the PHP package in Stronghold 4.0:\n\nThe wordwrap() PHP function did not properly check for integer overflow in\nthe way the \"break\" parameter was handled. An attacker who could control a\nstring passed to the \"break\" parameter could cause a heap overflow.\n(CVE-2006-1990)\n\nThe phpinfo() PHP function did not properly sanitize long strings. This\ncould allow an attacker to perform cross-site scripting attacks against\nsites that had publicly-available PHP scripts that called phpinfo().\n(CVE-2006-0996)\n\nThe error handling output was found to improperly escape HTML output in\ncertain cases. This could allow an attacker to perform cross-site\nscripting attacks against sites where both display_errors and html_errors\nwere enabled. (CVE-2006-0208) \n\nA flaw in the way PHP registered global variables during a file upload\nrequest was discovered. A remote attacker could submit a carefully crafted\nmultipart/form-data POST request that could overwrite the $GLOBALS array,\nwhich could alter expected script behavior and possibly lead to the\nexecution of arbitrary PHP commands. Note that this vulnerability only\naffects installations which have register_globals enabled in the PHP\nconfiguration file, which is neither a default nor recommended option.\n(CVE-2005-3390)\n\nA flaw in the PHP parse_str() function was discovered. If a PHP script\npassed only one argument to the parse_str() function, and the script was\nforced to abort execution during operation (for example, due to the\nmemory_limit setting), the register_globals may be enabled even if it was\ndisabled in the PHP configuration file. This vulnerability only affects\ninstallations that have PHP scripts using the parse_str function in this\nway. (CVE-2005-3389) \n\nA Cross-Site Scripting flaw in the phpinfo() function was discovered. If a\nvictim was tricked into following a malicious URL to a site with a page\ndisplaying the phpinfo() output, it was possible to inject javascript or\nHTML content into the displayed page or steal data such as cookies. This\nvulnerability only affects installations that allow users to view the\noutput of the phpinfo() function. As the phpinfo() function outputs a large\namount of information about the current state of PHP, it should only be\nused during debugging or if protected by authentication. (CVE-2005-3388) \n\nA buffer overflow flaw was discovered in uw-imap, the University of\nWashington\u0027s IMAP Server. php-imap is compiled against the static c-client\nlibraries from imap and therefore needed to be recompiled against the fixed\nversion. (CVE-2005-2933) \n\nA flaw was found in the zend_hash_del() PHP function. For PHP scripts that\nrely on the use of the unset() function, a remote attacker could force\nvariable initialization to be bypassed. This would be a security issue\nparticularly for installations that enable the \"register_globals\" setting.\n\"register_globals\" is disabled by default in Red Hat Enterprise Linux.\n(CVE-2006-3017)\n\nA directory traversal vulnerability was found in PHP. Local users could\nbypass open_basedir restrictions allowing remote attackers to create files\nin arbitrary directories via the tempnam() function. (CVE-2006-1494)\n\nUsers of Stronghold are advised to upgrade to this update, which\ncontains backported patches to correct these issues.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2006:0549",
        "url": "https://access.redhat.com/errata/RHSA-2006:0549"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "http://stronghold.redhat.com/",
        "url": "http://stronghold.redhat.com/"
      },
      {
        "category": "external",
        "summary": "190520",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=190520"
      },
      {
        "category": "external",
        "summary": "190525",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=190525"
      },
      {
        "category": "external",
        "summary": "190527",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=190527"
      },
      {
        "category": "external",
        "summary": "195880",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=195880"
      },
      {
        "category": "external",
        "summary": "196258",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=196258"
      },
      {
        "category": "external",
        "summary": "197500",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=197500"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2006/rhsa-2006_0549.json"
      }
    ],
    "title": "Red Hat Security Advisory: php security update for Stronghold",
    "tracking": {
      "current_release_date": "2024-11-05T16:37:53+00:00",
      "generator": {
        "date": "2024-11-05T16:37:53+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.1.1"
        }
      },
      "id": "RHSA-2006:0549",
      "initial_release_date": "2006-07-27T20:05:00+00:00",
      "revision_history": [
        {
          "date": "2006-07-27T20:05:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2006-07-27T00:00:00+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-05T16:37:53+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Stronghold 4.0 for Red Hat Enterprise Linux AS (version 2.1)",
                "product": {
                  "name": "Stronghold 4.0 for Red Hat Enterprise Linux AS (version 2.1)",
                  "product_id": "Stronghold 4.0 for Red Hat Enterprise Linux AS (version 2.1)",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_stronghold:4.0"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Stronghold 4.0 for Red Hat Enterprise Linux"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2005-2933",
      "discovery_date": "2005-10-05T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1617767"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Buffer overflow in the mail_valid_net_parse_work function in mail.c for Washington\u0027s IMAP Server (UW-IMAP) before imap-2004g allows remote attackers to execute arbitrary code via a mailbox name containing a single double-quote (\") character without a closing quote, which causes bytes after the double-quote to be copied into a buffer indefinitely.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "security flaw",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "Stronghold 4.0 for Red Hat Enterprise Linux AS (version 2.1)"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2005-2933"
        },
        {
          "category": "external",
          "summary": "RHBZ#1617767",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617767"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2933",
          "url": "https://www.cve.org/CVERecord?id=CVE-2005-2933"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2933",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2933"
        }
      ],
      "release_date": "2005-10-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2006-07-27T20:05:00+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade.  Only those\nRPMs which are currently installed will be updated.  Those RPMs which are\nnot installed but included in the list will not be updated.  Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network.  Many\npeople find this an easier way to apply updates.  To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
          "product_ids": [
            "Stronghold 4.0 for Red Hat Enterprise Linux AS (version 2.1)"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2006:0549"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "security flaw"
    },
    {
      "cve": "CVE-2005-3388",
      "discovery_date": "2005-10-31T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1617821"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Cross-site scripting (XSS) vulnerability in the phpinfo function in PHP 4.x up to 4.4.0 and 5.x up to 5.0.5 allows remote attackers to inject arbitrary web script or HTML via a crafted URL with a \"stacked array assignment.\"",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "security flaw",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "Stronghold 4.0 for Red Hat Enterprise Linux AS (version 2.1)"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2005-3388"
        },
        {
          "category": "external",
          "summary": "RHBZ#1617821",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617821"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2005-3388",
          "url": "https://www.cve.org/CVERecord?id=CVE-2005-3388"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-3388",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3388"
        }
      ],
      "release_date": "2005-10-31T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2006-07-27T20:05:00+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade.  Only those\nRPMs which are currently installed will be updated.  Those RPMs which are\nnot installed but included in the list will not be updated.  Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network.  Many\npeople find this an easier way to apply updates.  To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
          "product_ids": [
            "Stronghold 4.0 for Red Hat Enterprise Linux AS (version 2.1)"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2006:0549"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "security flaw"
    },
    {
      "cve": "CVE-2005-3389",
      "discovery_date": "2005-10-31T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1617822"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The parse_str function in PHP 4.x up to 4.4.0 and 5.x up to 5.0.5, when called with only one parameter, allows remote attackers to enable the register_globals directive via inputs that cause a request to be terminated due to the memory_limit setting, which causes PHP to set an internal flag that enables register_globals and allows attackers to exploit vulnerabilities in PHP applications that would otherwise be protected.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "security flaw",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "Stronghold 4.0 for Red Hat Enterprise Linux AS (version 2.1)"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2005-3389"
        },
        {
          "category": "external",
          "summary": "RHBZ#1617822",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617822"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2005-3389",
          "url": "https://www.cve.org/CVERecord?id=CVE-2005-3389"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-3389",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3389"
        }
      ],
      "release_date": "2005-10-31T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2006-07-27T20:05:00+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade.  Only those\nRPMs which are currently installed will be updated.  Those RPMs which are\nnot installed but included in the list will not be updated.  Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network.  Many\npeople find this an easier way to apply updates.  To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
          "product_ids": [
            "Stronghold 4.0 for Red Hat Enterprise Linux AS (version 2.1)"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2006:0549"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "security flaw"
    },
    {
      "cve": "CVE-2005-3390",
      "discovery_date": "2005-10-31T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1617823"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The RFC1867 file upload feature in PHP 4.x up to 4.4.0 and 5.x up to 5.0.5, when register_globals is enabled, allows remote attackers to modify the GLOBALS array and bypass security protections of PHP applications via a multipart/form-data POST request with a \"GLOBALS\" fileupload field.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "security flaw",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "Stronghold 4.0 for Red Hat Enterprise Linux AS (version 2.1)"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2005-3390"
        },
        {
          "category": "external",
          "summary": "RHBZ#1617823",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617823"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2005-3390",
          "url": "https://www.cve.org/CVERecord?id=CVE-2005-3390"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-3390",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3390"
        }
      ],
      "release_date": "2005-10-31T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2006-07-27T20:05:00+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade.  Only those\nRPMs which are currently installed will be updated.  Those RPMs which are\nnot installed but included in the list will not be updated.  Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network.  Many\npeople find this an easier way to apply updates.  To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
          "product_ids": [
            "Stronghold 4.0 for Red Hat Enterprise Linux AS (version 2.1)"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2006:0549"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "security flaw"
    },
    {
      "cve": "CVE-2006-0208",
      "discovery_date": "2006-01-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1617878"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Multiple cross-site scripting (XSS) vulnerabilities in PHP 4.4.1 and 5.1.1, when display_errors and html_errors are on, allow remote attackers to inject arbitrary web script or HTML via inputs to PHP applications that are not filtered when they are included in the resulting error message.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "security flaw",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "Stronghold 4.0 for Red Hat Enterprise Linux AS (version 2.1)"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2006-0208"
        },
        {
          "category": "external",
          "summary": "RHBZ#1617878",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617878"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2006-0208",
          "url": "https://www.cve.org/CVERecord?id=CVE-2006-0208"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-0208",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-0208"
        }
      ],
      "release_date": "2006-01-12T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2006-07-27T20:05:00+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade.  Only those\nRPMs which are currently installed will be updated.  Those RPMs which are\nnot installed but included in the list will not be updated.  Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network.  Many\npeople find this an easier way to apply updates.  To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
          "product_ids": [
            "Stronghold 4.0 for Red Hat Enterprise Linux AS (version 2.1)"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2006:0549"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "security flaw"
    },
    {
      "cve": "CVE-2006-0996",
      "discovery_date": "2006-03-30T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1618022"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Cross-site scripting (XSS) vulnerability in phpinfo (info.c) in PHP 5.1.2 and 4.4.2 allows remote attackers to inject arbitrary web script or HTML via long array variables, including (1) a large number of dimensions or (2) long values, which prevents HTML tags from being removed.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "security flaw",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "Stronghold 4.0 for Red Hat Enterprise Linux AS (version 2.1)"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2006-0996"
        },
        {
          "category": "external",
          "summary": "RHBZ#1618022",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618022"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2006-0996",
          "url": "https://www.cve.org/CVERecord?id=CVE-2006-0996"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-0996",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-0996"
        }
      ],
      "release_date": "2006-03-30T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2006-07-27T20:05:00+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade.  Only those\nRPMs which are currently installed will be updated.  Those RPMs which are\nnot installed but included in the list will not be updated.  Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network.  Many\npeople find this an easier way to apply updates.  To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
          "product_ids": [
            "Stronghold 4.0 for Red Hat Enterprise Linux AS (version 2.1)"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2006:0549"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "security flaw"
    },
    {
      "cve": "CVE-2006-1494",
      "discovery_date": "2006-04-10T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1618037"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Directory traversal vulnerability in file.c in PHP 4.4.2 and 5.1.2 allows local users to bypass open_basedir restrictions allows remote attackers to create files in arbitrary directories via the tempnam function.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "security flaw",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the versions of OpenSSH as distributed with Red Hat Enterprise Linux 2.1, 3, or 4.",
          "title": "Statement"
        }
      ],
      "product_status": {
        "fixed": [
          "Stronghold 4.0 for Red Hat Enterprise Linux AS (version 2.1)"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2006-1494"
        },
        {
          "category": "external",
          "summary": "RHBZ#1618037",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618037"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2006-1494",
          "url": "https://www.cve.org/CVERecord?id=CVE-2006-1494"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-1494",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-1494"
        }
      ],
      "release_date": "2006-04-08T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2006-07-27T20:05:00+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade.  Only those\nRPMs which are currently installed will be updated.  Those RPMs which are\nnot installed but included in the list will not be updated.  Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network.  Many\npeople find this an easier way to apply updates.  To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
          "product_ids": [
            "Stronghold 4.0 for Red Hat Enterprise Linux AS (version 2.1)"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2006:0549"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "security flaw"
    },
    {
      "cve": "CVE-2006-1990",
      "discovery_date": "2006-04-24T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1618082"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Integer overflow in the wordwrap function in string.c in PHP 4.4.2 and 5.1.2 might allow context-dependent attackers to execute arbitrary code via certain long arguments that cause a small buffer to be allocated, which triggers a heap-based buffer overflow in a memcpy function call, a different vulnerability than CVE-2002-1396.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "security flaw",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "Stronghold 4.0 for Red Hat Enterprise Linux AS (version 2.1)"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2006-1990"
        },
        {
          "category": "external",
          "summary": "RHBZ#1618082",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618082"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2006-1990",
          "url": "https://www.cve.org/CVERecord?id=CVE-2006-1990"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-1990",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-1990"
        }
      ],
      "release_date": "2006-04-24T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2006-07-27T20:05:00+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade.  Only those\nRPMs which are currently installed will be updated.  Those RPMs which are\nnot installed but included in the list will not be updated.  Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network.  Many\npeople find this an easier way to apply updates.  To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
          "product_ids": [
            "Stronghold 4.0 for Red Hat Enterprise Linux AS (version 2.1)"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2006:0549"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "security flaw"
    },
    {
      "cve": "CVE-2006-3017",
      "discovery_date": "2006-05-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1618131"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "zend_hash_del_key_or_index in zend_hash.c in PHP before 4.4.3 and 5.x before 5.1.3 can cause zend_hash_del to delete the wrong element, which prevents a variable from being unset even when the PHP unset function is called, which might cause the variable\u0027s value to be used in security-relevant operations.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "security flaw",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "Stronghold 4.0 for Red Hat Enterprise Linux AS (version 2.1)"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2006-3017"
        },
        {
          "category": "external",
          "summary": "RHBZ#1618131",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618131"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3017",
          "url": "https://www.cve.org/CVERecord?id=CVE-2006-3017"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3017",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3017"
        }
      ],
      "release_date": "2006-06-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2006-07-27T20:05:00+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade.  Only those\nRPMs which are currently installed will be updated.  Those RPMs which are\nnot installed but included in the list will not be updated.  Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network.  Many\npeople find this an easier way to apply updates.  To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
          "product_ids": [
            "Stronghold 4.0 for Red Hat Enterprise Linux AS (version 2.1)"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2006:0549"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "security flaw"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...
  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.