rhsa-2007_0888
Vulnerability from csaf_redhat
Published
2007-10-23 15:54
Modified
2024-11-22 01:29
Summary
Red Hat Security Advisory: php security update
Notes
Topic
Updated PHP packages that fix several security issues are now available for
Red Hat Enterprise Linux 2.1
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
Details
PHP is an embedded-HTML scripting language that is commonly used with the
Apache HTTP Server.
Various integer overflows were found in the PHP gd extension. A script that
could be forced to resize images from an untrusted source could possibly
allow a remote attacker to execute arbitrary code as the apache user.
(CVE-2007-3996)
An integer overflow was found in the PHP chunk_split function. If a remote
attacker was able to pass arbitrary data to the third argument of the
chunk_split function, they could possibly execute arbitrary code as the
apache user. Note that it is unusual for a PHP script to use the
chunk_script function with a user-supplied third argument. (CVE-2007-2872)
A previous security update introduced a bug into PHP session cookie
handling. This could allow an attacker to stop a victim from viewing a
vulnerable web site if the victim has first visited a malicious web page
under the control of the attacker, and that page can set a cookie for the
vulnerable web site. (CVE-2007-4670)
A bug was found in PHP session cookie handling. This could allow an
attacker to create a cross-site cookie insertion attack if a victim follows
an untrusted carefully-crafted URL. (CVE-2007-3799)
A flaw was found in the PHP 'ftp' extension. If a PHP script used this
extension to provide access to a private FTP server, and passed untrusted
script input directly to any function provided by this extension, a remote
attacker would be able to send arbitrary FTP commands to the server.
(CVE-2007-2509)
Users of PHP should upgrade to these updated packages which contain
backported patches to correct these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated PHP packages that fix several security issues are now available for\nRed Hat Enterprise Linux 2.1\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "PHP is an embedded-HTML scripting language that is commonly used with the\nApache HTTP Server. \n\nVarious integer overflows were found in the PHP gd extension. A script that\ncould be forced to resize images from an untrusted source could possibly\nallow a remote attacker to execute arbitrary code as the apache user. \n(CVE-2007-3996)\n\nAn integer overflow was found in the PHP chunk_split function. If a remote\nattacker was able to pass arbitrary data to the third argument of the\nchunk_split function, they could possibly execute arbitrary code as the\napache user. Note that it is unusual for a PHP script to use the\nchunk_script function with a user-supplied third argument. (CVE-2007-2872)\n\nA previous security update introduced a bug into PHP session cookie\nhandling. This could allow an attacker to stop a victim from viewing a\nvulnerable web site if the victim has first visited a malicious web page\nunder the control of the attacker, and that page can set a cookie for the\nvulnerable web site. (CVE-2007-4670)\n\nA bug was found in PHP session cookie handling. This could allow an\nattacker to create a cross-site cookie insertion attack if a victim follows\nan untrusted carefully-crafted URL. (CVE-2007-3799)\n\nA flaw was found in the PHP \u0027ftp\u0027 extension. If a PHP script used this\nextension to provide access to a private FTP server, and passed untrusted\nscript input directly to any function provided by this extension, a remote\nattacker would be able to send arbitrary FTP commands to the server.\n(CVE-2007-2509)\n\nUsers of PHP should upgrade to these updated packages which contain\nbackported patches to correct these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2007:0888", "url": "https://access.redhat.com/errata/RHSA-2007:0888" }, { "category": "external", "summary": "http://www.redhat.com/security/updates/classification/#moderate", "url": "http://www.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "239014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=239014" }, { "category": "external", "summary": "242032", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=242032" }, { "category": "external", "summary": "250726", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=250726" }, { "category": "external", "summary": "278031", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=278031" }, { "category": "external", "summary": "278041", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=278041" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2007/rhsa-2007_0888.json" } ], "title": "Red Hat Security Advisory: php security update", "tracking": { "current_release_date": "2024-11-22T01:29:14+00:00", "generator": { "date": "2024-11-22T01:29:14+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2007:0888", "initial_release_date": "2007-10-23T15:54:00+00:00", "revision_history": [ { "date": "2007-10-23T15:54:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2007-10-23T11:54:05+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T01:29:14+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product": { "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::as" } } }, { "category": "product_name", "name": "Red Hat Linux Advanced Workstation 2.1", "product": { "name": "Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::aw" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 2.1", "product": { "name": "Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 2.1", "product": { "name": "Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "php-0:4.1.2-2.19.ia64", "product": { "name": "php-0:4.1.2-2.19.ia64", "product_id": "php-0:4.1.2-2.19.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/php@4.1.2-2.19?arch=ia64" } } }, { "category": "product_version", "name": "php-odbc-0:4.1.2-2.19.ia64", "product": { "name": "php-odbc-0:4.1.2-2.19.ia64", "product_id": "php-odbc-0:4.1.2-2.19.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-odbc@4.1.2-2.19?arch=ia64" } } }, { "category": "product_version", "name": "php-mysql-0:4.1.2-2.19.ia64", "product": { "name": "php-mysql-0:4.1.2-2.19.ia64", "product_id": "php-mysql-0:4.1.2-2.19.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-mysql@4.1.2-2.19?arch=ia64" } } }, { "category": "product_version", "name": "php-imap-0:4.1.2-2.19.ia64", "product": { "name": "php-imap-0:4.1.2-2.19.ia64", "product_id": "php-imap-0:4.1.2-2.19.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-imap@4.1.2-2.19?arch=ia64" } } }, { "category": "product_version", "name": "php-pgsql-0:4.1.2-2.19.ia64", "product": { "name": "php-pgsql-0:4.1.2-2.19.ia64", "product_id": "php-pgsql-0:4.1.2-2.19.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-pgsql@4.1.2-2.19?arch=ia64" } } }, { "category": "product_version", "name": "php-devel-0:4.1.2-2.19.ia64", "product": { "name": "php-devel-0:4.1.2-2.19.ia64", "product_id": "php-devel-0:4.1.2-2.19.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-devel@4.1.2-2.19?arch=ia64" } } }, { "category": "product_version", "name": "php-ldap-0:4.1.2-2.19.ia64", "product": { "name": "php-ldap-0:4.1.2-2.19.ia64", "product_id": "php-ldap-0:4.1.2-2.19.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-ldap@4.1.2-2.19?arch=ia64" } } }, { "category": "product_version", "name": "php-manual-0:4.1.2-2.19.ia64", "product": { "name": "php-manual-0:4.1.2-2.19.ia64", "product_id": "php-manual-0:4.1.2-2.19.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-manual@4.1.2-2.19?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "php-0:4.1.2-2.19.src", "product": { "name": "php-0:4.1.2-2.19.src", "product_id": "php-0:4.1.2-2.19.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/php@4.1.2-2.19?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "php-0:4.1.2-2.19.i386", "product": { "name": "php-0:4.1.2-2.19.i386", "product_id": "php-0:4.1.2-2.19.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/php@4.1.2-2.19?arch=i386" } } }, { "category": "product_version", "name": "php-odbc-0:4.1.2-2.19.i386", "product": { "name": "php-odbc-0:4.1.2-2.19.i386", "product_id": "php-odbc-0:4.1.2-2.19.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-odbc@4.1.2-2.19?arch=i386" } } }, { "category": "product_version", "name": "php-mysql-0:4.1.2-2.19.i386", "product": { "name": "php-mysql-0:4.1.2-2.19.i386", "product_id": "php-mysql-0:4.1.2-2.19.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-mysql@4.1.2-2.19?arch=i386" } } }, { "category": "product_version", "name": "php-imap-0:4.1.2-2.19.i386", "product": { "name": "php-imap-0:4.1.2-2.19.i386", "product_id": "php-imap-0:4.1.2-2.19.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-imap@4.1.2-2.19?arch=i386" } } }, { "category": "product_version", "name": "php-pgsql-0:4.1.2-2.19.i386", "product": { "name": "php-pgsql-0:4.1.2-2.19.i386", "product_id": "php-pgsql-0:4.1.2-2.19.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-pgsql@4.1.2-2.19?arch=i386" } } }, { "category": "product_version", "name": "php-devel-0:4.1.2-2.19.i386", "product": { "name": "php-devel-0:4.1.2-2.19.i386", "product_id": "php-devel-0:4.1.2-2.19.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-devel@4.1.2-2.19?arch=i386" } } }, { "category": "product_version", "name": "php-ldap-0:4.1.2-2.19.i386", "product": { "name": "php-ldap-0:4.1.2-2.19.i386", "product_id": "php-ldap-0:4.1.2-2.19.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-ldap@4.1.2-2.19?arch=i386" } } }, { "category": "product_version", "name": "php-manual-0:4.1.2-2.19.i386", "product": { "name": "php-manual-0:4.1.2-2.19.i386", "product_id": "php-manual-0:4.1.2-2.19.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-manual@4.1.2-2.19?arch=i386" } } } ], "category": "architecture", "name": "i386" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "php-0:4.1.2-2.19.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:php-0:4.1.2-2.19.i386" }, "product_reference": "php-0:4.1.2-2.19.i386", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.1.2-2.19.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:php-0:4.1.2-2.19.ia64" }, "product_reference": "php-0:4.1.2-2.19.ia64", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.1.2-2.19.src as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:php-0:4.1.2-2.19.src" }, "product_reference": "php-0:4.1.2-2.19.src", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-devel-0:4.1.2-2.19.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:php-devel-0:4.1.2-2.19.i386" }, "product_reference": "php-devel-0:4.1.2-2.19.i386", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-devel-0:4.1.2-2.19.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:php-devel-0:4.1.2-2.19.ia64" }, "product_reference": "php-devel-0:4.1.2-2.19.ia64", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-imap-0:4.1.2-2.19.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:php-imap-0:4.1.2-2.19.i386" }, "product_reference": "php-imap-0:4.1.2-2.19.i386", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-imap-0:4.1.2-2.19.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:php-imap-0:4.1.2-2.19.ia64" }, "product_reference": "php-imap-0:4.1.2-2.19.ia64", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-ldap-0:4.1.2-2.19.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:php-ldap-0:4.1.2-2.19.i386" }, "product_reference": "php-ldap-0:4.1.2-2.19.i386", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-ldap-0:4.1.2-2.19.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:php-ldap-0:4.1.2-2.19.ia64" }, "product_reference": "php-ldap-0:4.1.2-2.19.ia64", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-manual-0:4.1.2-2.19.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:php-manual-0:4.1.2-2.19.i386" }, "product_reference": "php-manual-0:4.1.2-2.19.i386", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-manual-0:4.1.2-2.19.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:php-manual-0:4.1.2-2.19.ia64" }, "product_reference": "php-manual-0:4.1.2-2.19.ia64", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-mysql-0:4.1.2-2.19.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:php-mysql-0:4.1.2-2.19.i386" }, "product_reference": "php-mysql-0:4.1.2-2.19.i386", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-mysql-0:4.1.2-2.19.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:php-mysql-0:4.1.2-2.19.ia64" }, "product_reference": "php-mysql-0:4.1.2-2.19.ia64", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-odbc-0:4.1.2-2.19.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:php-odbc-0:4.1.2-2.19.i386" }, "product_reference": "php-odbc-0:4.1.2-2.19.i386", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-odbc-0:4.1.2-2.19.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:php-odbc-0:4.1.2-2.19.ia64" }, "product_reference": "php-odbc-0:4.1.2-2.19.ia64", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-pgsql-0:4.1.2-2.19.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:php-pgsql-0:4.1.2-2.19.i386" }, "product_reference": "php-pgsql-0:4.1.2-2.19.i386", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-pgsql-0:4.1.2-2.19.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:php-pgsql-0:4.1.2-2.19.ia64" }, "product_reference": "php-pgsql-0:4.1.2-2.19.ia64", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.1.2-2.19.i386 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:php-0:4.1.2-2.19.i386" }, "product_reference": "php-0:4.1.2-2.19.i386", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.1.2-2.19.ia64 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:php-0:4.1.2-2.19.ia64" }, "product_reference": "php-0:4.1.2-2.19.ia64", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.1.2-2.19.src as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:php-0:4.1.2-2.19.src" }, "product_reference": "php-0:4.1.2-2.19.src", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "php-devel-0:4.1.2-2.19.i386 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:php-devel-0:4.1.2-2.19.i386" }, "product_reference": "php-devel-0:4.1.2-2.19.i386", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "php-devel-0:4.1.2-2.19.ia64 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:php-devel-0:4.1.2-2.19.ia64" }, "product_reference": "php-devel-0:4.1.2-2.19.ia64", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "php-imap-0:4.1.2-2.19.i386 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:php-imap-0:4.1.2-2.19.i386" }, "product_reference": "php-imap-0:4.1.2-2.19.i386", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "php-imap-0:4.1.2-2.19.ia64 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:php-imap-0:4.1.2-2.19.ia64" }, "product_reference": "php-imap-0:4.1.2-2.19.ia64", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "php-ldap-0:4.1.2-2.19.i386 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:php-ldap-0:4.1.2-2.19.i386" }, "product_reference": "php-ldap-0:4.1.2-2.19.i386", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "php-ldap-0:4.1.2-2.19.ia64 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:php-ldap-0:4.1.2-2.19.ia64" }, "product_reference": "php-ldap-0:4.1.2-2.19.ia64", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "php-manual-0:4.1.2-2.19.i386 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:php-manual-0:4.1.2-2.19.i386" }, "product_reference": "php-manual-0:4.1.2-2.19.i386", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "php-manual-0:4.1.2-2.19.ia64 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:php-manual-0:4.1.2-2.19.ia64" }, "product_reference": "php-manual-0:4.1.2-2.19.ia64", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "php-mysql-0:4.1.2-2.19.i386 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:php-mysql-0:4.1.2-2.19.i386" }, "product_reference": "php-mysql-0:4.1.2-2.19.i386", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "php-mysql-0:4.1.2-2.19.ia64 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:php-mysql-0:4.1.2-2.19.ia64" }, "product_reference": "php-mysql-0:4.1.2-2.19.ia64", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "php-odbc-0:4.1.2-2.19.i386 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:php-odbc-0:4.1.2-2.19.i386" }, "product_reference": "php-odbc-0:4.1.2-2.19.i386", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "php-odbc-0:4.1.2-2.19.ia64 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:php-odbc-0:4.1.2-2.19.ia64" }, "product_reference": "php-odbc-0:4.1.2-2.19.ia64", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "php-pgsql-0:4.1.2-2.19.i386 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:php-pgsql-0:4.1.2-2.19.i386" }, "product_reference": "php-pgsql-0:4.1.2-2.19.i386", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "php-pgsql-0:4.1.2-2.19.ia64 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:php-pgsql-0:4.1.2-2.19.ia64" }, "product_reference": "php-pgsql-0:4.1.2-2.19.ia64", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.1.2-2.19.i386 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:php-0:4.1.2-2.19.i386" }, "product_reference": "php-0:4.1.2-2.19.i386", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.1.2-2.19.ia64 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:php-0:4.1.2-2.19.ia64" }, "product_reference": "php-0:4.1.2-2.19.ia64", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.1.2-2.19.src as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:php-0:4.1.2-2.19.src" }, "product_reference": "php-0:4.1.2-2.19.src", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-devel-0:4.1.2-2.19.i386 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:php-devel-0:4.1.2-2.19.i386" }, "product_reference": "php-devel-0:4.1.2-2.19.i386", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-devel-0:4.1.2-2.19.ia64 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:php-devel-0:4.1.2-2.19.ia64" }, "product_reference": "php-devel-0:4.1.2-2.19.ia64", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-imap-0:4.1.2-2.19.i386 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:php-imap-0:4.1.2-2.19.i386" }, "product_reference": "php-imap-0:4.1.2-2.19.i386", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-imap-0:4.1.2-2.19.ia64 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:php-imap-0:4.1.2-2.19.ia64" }, "product_reference": "php-imap-0:4.1.2-2.19.ia64", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-ldap-0:4.1.2-2.19.i386 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:php-ldap-0:4.1.2-2.19.i386" }, "product_reference": "php-ldap-0:4.1.2-2.19.i386", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-ldap-0:4.1.2-2.19.ia64 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:php-ldap-0:4.1.2-2.19.ia64" }, "product_reference": "php-ldap-0:4.1.2-2.19.ia64", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-manual-0:4.1.2-2.19.i386 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:php-manual-0:4.1.2-2.19.i386" }, "product_reference": "php-manual-0:4.1.2-2.19.i386", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-manual-0:4.1.2-2.19.ia64 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:php-manual-0:4.1.2-2.19.ia64" }, "product_reference": "php-manual-0:4.1.2-2.19.ia64", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-mysql-0:4.1.2-2.19.i386 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:php-mysql-0:4.1.2-2.19.i386" }, "product_reference": "php-mysql-0:4.1.2-2.19.i386", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-mysql-0:4.1.2-2.19.ia64 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:php-mysql-0:4.1.2-2.19.ia64" }, "product_reference": "php-mysql-0:4.1.2-2.19.ia64", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-odbc-0:4.1.2-2.19.i386 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:php-odbc-0:4.1.2-2.19.i386" }, "product_reference": "php-odbc-0:4.1.2-2.19.i386", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-odbc-0:4.1.2-2.19.ia64 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:php-odbc-0:4.1.2-2.19.ia64" }, "product_reference": "php-odbc-0:4.1.2-2.19.ia64", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-pgsql-0:4.1.2-2.19.i386 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:php-pgsql-0:4.1.2-2.19.i386" }, "product_reference": "php-pgsql-0:4.1.2-2.19.i386", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-pgsql-0:4.1.2-2.19.ia64 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:php-pgsql-0:4.1.2-2.19.ia64" }, "product_reference": "php-pgsql-0:4.1.2-2.19.ia64", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.1.2-2.19.i386 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:php-0:4.1.2-2.19.i386" }, "product_reference": "php-0:4.1.2-2.19.i386", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.1.2-2.19.ia64 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:php-0:4.1.2-2.19.ia64" }, "product_reference": "php-0:4.1.2-2.19.ia64", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-0:4.1.2-2.19.src as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:php-0:4.1.2-2.19.src" }, "product_reference": "php-0:4.1.2-2.19.src", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-devel-0:4.1.2-2.19.i386 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:php-devel-0:4.1.2-2.19.i386" }, "product_reference": "php-devel-0:4.1.2-2.19.i386", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-devel-0:4.1.2-2.19.ia64 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:php-devel-0:4.1.2-2.19.ia64" }, "product_reference": "php-devel-0:4.1.2-2.19.ia64", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-imap-0:4.1.2-2.19.i386 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:php-imap-0:4.1.2-2.19.i386" }, "product_reference": "php-imap-0:4.1.2-2.19.i386", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-imap-0:4.1.2-2.19.ia64 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:php-imap-0:4.1.2-2.19.ia64" }, "product_reference": "php-imap-0:4.1.2-2.19.ia64", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-ldap-0:4.1.2-2.19.i386 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:php-ldap-0:4.1.2-2.19.i386" }, "product_reference": "php-ldap-0:4.1.2-2.19.i386", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-ldap-0:4.1.2-2.19.ia64 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:php-ldap-0:4.1.2-2.19.ia64" }, "product_reference": "php-ldap-0:4.1.2-2.19.ia64", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-manual-0:4.1.2-2.19.i386 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:php-manual-0:4.1.2-2.19.i386" }, "product_reference": "php-manual-0:4.1.2-2.19.i386", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-manual-0:4.1.2-2.19.ia64 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:php-manual-0:4.1.2-2.19.ia64" }, "product_reference": "php-manual-0:4.1.2-2.19.ia64", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-mysql-0:4.1.2-2.19.i386 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:php-mysql-0:4.1.2-2.19.i386" }, "product_reference": "php-mysql-0:4.1.2-2.19.i386", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-mysql-0:4.1.2-2.19.ia64 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:php-mysql-0:4.1.2-2.19.ia64" }, "product_reference": "php-mysql-0:4.1.2-2.19.ia64", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-odbc-0:4.1.2-2.19.i386 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:php-odbc-0:4.1.2-2.19.i386" }, "product_reference": "php-odbc-0:4.1.2-2.19.i386", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-odbc-0:4.1.2-2.19.ia64 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:php-odbc-0:4.1.2-2.19.ia64" }, "product_reference": "php-odbc-0:4.1.2-2.19.ia64", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-pgsql-0:4.1.2-2.19.i386 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:php-pgsql-0:4.1.2-2.19.i386" }, "product_reference": "php-pgsql-0:4.1.2-2.19.i386", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "php-pgsql-0:4.1.2-2.19.ia64 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:php-pgsql-0:4.1.2-2.19.ia64" }, "product_reference": "php-pgsql-0:4.1.2-2.19.ia64", "relates_to_product_reference": "2.1WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2007-2509", "discovery_date": "2007-05-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "239014" } ], "notes": [ { "category": "description", "text": "CRLF injection vulnerability in the ftp_putcmd function in PHP before 4.4.7, and 5.x before 5.2.2 allows remote attackers to inject arbitrary FTP commands via CRLF sequences in the parameters to earlier FTP commands.", "title": "Vulnerability description" }, { "category": "summary", "text": "php CRLF injection", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "2.1AS:php-0:4.1.2-2.19.i386", "2.1AS:php-0:4.1.2-2.19.ia64", "2.1AS:php-0:4.1.2-2.19.src", "2.1AS:php-devel-0:4.1.2-2.19.i386", "2.1AS:php-devel-0:4.1.2-2.19.ia64", "2.1AS:php-imap-0:4.1.2-2.19.i386", "2.1AS:php-imap-0:4.1.2-2.19.ia64", "2.1AS:php-ldap-0:4.1.2-2.19.i386", "2.1AS:php-ldap-0:4.1.2-2.19.ia64", "2.1AS:php-manual-0:4.1.2-2.19.i386", "2.1AS:php-manual-0:4.1.2-2.19.ia64", "2.1AS:php-mysql-0:4.1.2-2.19.i386", "2.1AS:php-mysql-0:4.1.2-2.19.ia64", "2.1AS:php-odbc-0:4.1.2-2.19.i386", "2.1AS:php-odbc-0:4.1.2-2.19.ia64", "2.1AS:php-pgsql-0:4.1.2-2.19.i386", "2.1AS:php-pgsql-0:4.1.2-2.19.ia64", "2.1AW:php-0:4.1.2-2.19.i386", "2.1AW:php-0:4.1.2-2.19.ia64", "2.1AW:php-0:4.1.2-2.19.src", "2.1AW:php-devel-0:4.1.2-2.19.i386", "2.1AW:php-devel-0:4.1.2-2.19.ia64", "2.1AW:php-imap-0:4.1.2-2.19.i386", "2.1AW:php-imap-0:4.1.2-2.19.ia64", "2.1AW:php-ldap-0:4.1.2-2.19.i386", "2.1AW:php-ldap-0:4.1.2-2.19.ia64", "2.1AW:php-manual-0:4.1.2-2.19.i386", "2.1AW:php-manual-0:4.1.2-2.19.ia64", "2.1AW:php-mysql-0:4.1.2-2.19.i386", "2.1AW:php-mysql-0:4.1.2-2.19.ia64", "2.1AW:php-odbc-0:4.1.2-2.19.i386", "2.1AW:php-odbc-0:4.1.2-2.19.ia64", "2.1AW:php-pgsql-0:4.1.2-2.19.i386", "2.1AW:php-pgsql-0:4.1.2-2.19.ia64", "2.1ES:php-0:4.1.2-2.19.i386", "2.1ES:php-0:4.1.2-2.19.ia64", "2.1ES:php-0:4.1.2-2.19.src", "2.1ES:php-devel-0:4.1.2-2.19.i386", "2.1ES:php-devel-0:4.1.2-2.19.ia64", "2.1ES:php-imap-0:4.1.2-2.19.i386", "2.1ES:php-imap-0:4.1.2-2.19.ia64", "2.1ES:php-ldap-0:4.1.2-2.19.i386", "2.1ES:php-ldap-0:4.1.2-2.19.ia64", "2.1ES:php-manual-0:4.1.2-2.19.i386", "2.1ES:php-manual-0:4.1.2-2.19.ia64", "2.1ES:php-mysql-0:4.1.2-2.19.i386", "2.1ES:php-mysql-0:4.1.2-2.19.ia64", "2.1ES:php-odbc-0:4.1.2-2.19.i386", "2.1ES:php-odbc-0:4.1.2-2.19.ia64", "2.1ES:php-pgsql-0:4.1.2-2.19.i386", "2.1ES:php-pgsql-0:4.1.2-2.19.ia64", "2.1WS:php-0:4.1.2-2.19.i386", "2.1WS:php-0:4.1.2-2.19.ia64", "2.1WS:php-0:4.1.2-2.19.src", "2.1WS:php-devel-0:4.1.2-2.19.i386", "2.1WS:php-devel-0:4.1.2-2.19.ia64", "2.1WS:php-imap-0:4.1.2-2.19.i386", "2.1WS:php-imap-0:4.1.2-2.19.ia64", "2.1WS:php-ldap-0:4.1.2-2.19.i386", "2.1WS:php-ldap-0:4.1.2-2.19.ia64", "2.1WS:php-manual-0:4.1.2-2.19.i386", "2.1WS:php-manual-0:4.1.2-2.19.ia64", "2.1WS:php-mysql-0:4.1.2-2.19.i386", "2.1WS:php-mysql-0:4.1.2-2.19.ia64", "2.1WS:php-odbc-0:4.1.2-2.19.i386", "2.1WS:php-odbc-0:4.1.2-2.19.ia64", "2.1WS:php-pgsql-0:4.1.2-2.19.i386", "2.1WS:php-pgsql-0:4.1.2-2.19.ia64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-2509" }, { "category": "external", "summary": "RHBZ#239014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=239014" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-2509", "url": "https://www.cve.org/CVERecord?id=CVE-2007-2509" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-2509", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2509" } ], "release_date": "2007-05-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-10-23T15:54:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "2.1AS:php-0:4.1.2-2.19.i386", "2.1AS:php-0:4.1.2-2.19.ia64", "2.1AS:php-0:4.1.2-2.19.src", "2.1AS:php-devel-0:4.1.2-2.19.i386", "2.1AS:php-devel-0:4.1.2-2.19.ia64", "2.1AS:php-imap-0:4.1.2-2.19.i386", "2.1AS:php-imap-0:4.1.2-2.19.ia64", "2.1AS:php-ldap-0:4.1.2-2.19.i386", "2.1AS:php-ldap-0:4.1.2-2.19.ia64", "2.1AS:php-manual-0:4.1.2-2.19.i386", "2.1AS:php-manual-0:4.1.2-2.19.ia64", "2.1AS:php-mysql-0:4.1.2-2.19.i386", "2.1AS:php-mysql-0:4.1.2-2.19.ia64", "2.1AS:php-odbc-0:4.1.2-2.19.i386", "2.1AS:php-odbc-0:4.1.2-2.19.ia64", "2.1AS:php-pgsql-0:4.1.2-2.19.i386", "2.1AS:php-pgsql-0:4.1.2-2.19.ia64", "2.1AW:php-0:4.1.2-2.19.i386", "2.1AW:php-0:4.1.2-2.19.ia64", "2.1AW:php-0:4.1.2-2.19.src", "2.1AW:php-devel-0:4.1.2-2.19.i386", "2.1AW:php-devel-0:4.1.2-2.19.ia64", "2.1AW:php-imap-0:4.1.2-2.19.i386", "2.1AW:php-imap-0:4.1.2-2.19.ia64", "2.1AW:php-ldap-0:4.1.2-2.19.i386", "2.1AW:php-ldap-0:4.1.2-2.19.ia64", "2.1AW:php-manual-0:4.1.2-2.19.i386", "2.1AW:php-manual-0:4.1.2-2.19.ia64", "2.1AW:php-mysql-0:4.1.2-2.19.i386", "2.1AW:php-mysql-0:4.1.2-2.19.ia64", "2.1AW:php-odbc-0:4.1.2-2.19.i386", "2.1AW:php-odbc-0:4.1.2-2.19.ia64", "2.1AW:php-pgsql-0:4.1.2-2.19.i386", "2.1AW:php-pgsql-0:4.1.2-2.19.ia64", "2.1ES:php-0:4.1.2-2.19.i386", "2.1ES:php-0:4.1.2-2.19.ia64", "2.1ES:php-0:4.1.2-2.19.src", "2.1ES:php-devel-0:4.1.2-2.19.i386", "2.1ES:php-devel-0:4.1.2-2.19.ia64", "2.1ES:php-imap-0:4.1.2-2.19.i386", "2.1ES:php-imap-0:4.1.2-2.19.ia64", "2.1ES:php-ldap-0:4.1.2-2.19.i386", "2.1ES:php-ldap-0:4.1.2-2.19.ia64", "2.1ES:php-manual-0:4.1.2-2.19.i386", "2.1ES:php-manual-0:4.1.2-2.19.ia64", "2.1ES:php-mysql-0:4.1.2-2.19.i386", "2.1ES:php-mysql-0:4.1.2-2.19.ia64", "2.1ES:php-odbc-0:4.1.2-2.19.i386", "2.1ES:php-odbc-0:4.1.2-2.19.ia64", "2.1ES:php-pgsql-0:4.1.2-2.19.i386", "2.1ES:php-pgsql-0:4.1.2-2.19.ia64", "2.1WS:php-0:4.1.2-2.19.i386", "2.1WS:php-0:4.1.2-2.19.ia64", "2.1WS:php-0:4.1.2-2.19.src", "2.1WS:php-devel-0:4.1.2-2.19.i386", "2.1WS:php-devel-0:4.1.2-2.19.ia64", "2.1WS:php-imap-0:4.1.2-2.19.i386", "2.1WS:php-imap-0:4.1.2-2.19.ia64", "2.1WS:php-ldap-0:4.1.2-2.19.i386", "2.1WS:php-ldap-0:4.1.2-2.19.ia64", "2.1WS:php-manual-0:4.1.2-2.19.i386", "2.1WS:php-manual-0:4.1.2-2.19.ia64", "2.1WS:php-mysql-0:4.1.2-2.19.i386", "2.1WS:php-mysql-0:4.1.2-2.19.ia64", "2.1WS:php-odbc-0:4.1.2-2.19.i386", "2.1WS:php-odbc-0:4.1.2-2.19.ia64", "2.1WS:php-pgsql-0:4.1.2-2.19.i386", "2.1WS:php-pgsql-0:4.1.2-2.19.ia64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:0888" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "php CRLF injection" }, { "cve": "CVE-2007-2872", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2007-06-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "242032" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in the chunk_split function in PHP 5 before 5.2.3 and PHP 4 before 4.4.8 allow remote attackers to cause a denial of service (crash) or execute arbitrary code via the (1) chunks, (2) srclen, and (3) chunklen arguments.", "title": "Vulnerability description" }, { "category": "summary", "text": "php chunk_split integer overflow", "title": "Vulnerability summary" }, { "category": "other", "text": "The Red Hat Product Security has rated this issue as having moderate security impact, a future update may address this flaw.", "title": "Statement" } ], "product_status": { "fixed": [ "2.1AS:php-0:4.1.2-2.19.i386", "2.1AS:php-0:4.1.2-2.19.ia64", "2.1AS:php-0:4.1.2-2.19.src", "2.1AS:php-devel-0:4.1.2-2.19.i386", "2.1AS:php-devel-0:4.1.2-2.19.ia64", "2.1AS:php-imap-0:4.1.2-2.19.i386", "2.1AS:php-imap-0:4.1.2-2.19.ia64", "2.1AS:php-ldap-0:4.1.2-2.19.i386", "2.1AS:php-ldap-0:4.1.2-2.19.ia64", "2.1AS:php-manual-0:4.1.2-2.19.i386", "2.1AS:php-manual-0:4.1.2-2.19.ia64", "2.1AS:php-mysql-0:4.1.2-2.19.i386", "2.1AS:php-mysql-0:4.1.2-2.19.ia64", "2.1AS:php-odbc-0:4.1.2-2.19.i386", "2.1AS:php-odbc-0:4.1.2-2.19.ia64", "2.1AS:php-pgsql-0:4.1.2-2.19.i386", "2.1AS:php-pgsql-0:4.1.2-2.19.ia64", "2.1AW:php-0:4.1.2-2.19.i386", "2.1AW:php-0:4.1.2-2.19.ia64", "2.1AW:php-0:4.1.2-2.19.src", "2.1AW:php-devel-0:4.1.2-2.19.i386", "2.1AW:php-devel-0:4.1.2-2.19.ia64", "2.1AW:php-imap-0:4.1.2-2.19.i386", "2.1AW:php-imap-0:4.1.2-2.19.ia64", "2.1AW:php-ldap-0:4.1.2-2.19.i386", "2.1AW:php-ldap-0:4.1.2-2.19.ia64", "2.1AW:php-manual-0:4.1.2-2.19.i386", "2.1AW:php-manual-0:4.1.2-2.19.ia64", "2.1AW:php-mysql-0:4.1.2-2.19.i386", "2.1AW:php-mysql-0:4.1.2-2.19.ia64", "2.1AW:php-odbc-0:4.1.2-2.19.i386", "2.1AW:php-odbc-0:4.1.2-2.19.ia64", "2.1AW:php-pgsql-0:4.1.2-2.19.i386", "2.1AW:php-pgsql-0:4.1.2-2.19.ia64", "2.1ES:php-0:4.1.2-2.19.i386", "2.1ES:php-0:4.1.2-2.19.ia64", "2.1ES:php-0:4.1.2-2.19.src", "2.1ES:php-devel-0:4.1.2-2.19.i386", "2.1ES:php-devel-0:4.1.2-2.19.ia64", "2.1ES:php-imap-0:4.1.2-2.19.i386", "2.1ES:php-imap-0:4.1.2-2.19.ia64", "2.1ES:php-ldap-0:4.1.2-2.19.i386", "2.1ES:php-ldap-0:4.1.2-2.19.ia64", "2.1ES:php-manual-0:4.1.2-2.19.i386", "2.1ES:php-manual-0:4.1.2-2.19.ia64", "2.1ES:php-mysql-0:4.1.2-2.19.i386", "2.1ES:php-mysql-0:4.1.2-2.19.ia64", "2.1ES:php-odbc-0:4.1.2-2.19.i386", "2.1ES:php-odbc-0:4.1.2-2.19.ia64", "2.1ES:php-pgsql-0:4.1.2-2.19.i386", "2.1ES:php-pgsql-0:4.1.2-2.19.ia64", "2.1WS:php-0:4.1.2-2.19.i386", "2.1WS:php-0:4.1.2-2.19.ia64", "2.1WS:php-0:4.1.2-2.19.src", "2.1WS:php-devel-0:4.1.2-2.19.i386", "2.1WS:php-devel-0:4.1.2-2.19.ia64", "2.1WS:php-imap-0:4.1.2-2.19.i386", "2.1WS:php-imap-0:4.1.2-2.19.ia64", "2.1WS:php-ldap-0:4.1.2-2.19.i386", "2.1WS:php-ldap-0:4.1.2-2.19.ia64", "2.1WS:php-manual-0:4.1.2-2.19.i386", "2.1WS:php-manual-0:4.1.2-2.19.ia64", "2.1WS:php-mysql-0:4.1.2-2.19.i386", "2.1WS:php-mysql-0:4.1.2-2.19.ia64", "2.1WS:php-odbc-0:4.1.2-2.19.i386", "2.1WS:php-odbc-0:4.1.2-2.19.ia64", "2.1WS:php-pgsql-0:4.1.2-2.19.i386", "2.1WS:php-pgsql-0:4.1.2-2.19.ia64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-2872" }, { "category": "external", "summary": "RHBZ#242032", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=242032" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-2872", "url": "https://www.cve.org/CVERecord?id=CVE-2007-2872" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-2872", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2872" } ], "release_date": "2007-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-10-23T15:54:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "2.1AS:php-0:4.1.2-2.19.i386", "2.1AS:php-0:4.1.2-2.19.ia64", "2.1AS:php-0:4.1.2-2.19.src", "2.1AS:php-devel-0:4.1.2-2.19.i386", "2.1AS:php-devel-0:4.1.2-2.19.ia64", "2.1AS:php-imap-0:4.1.2-2.19.i386", "2.1AS:php-imap-0:4.1.2-2.19.ia64", "2.1AS:php-ldap-0:4.1.2-2.19.i386", "2.1AS:php-ldap-0:4.1.2-2.19.ia64", "2.1AS:php-manual-0:4.1.2-2.19.i386", "2.1AS:php-manual-0:4.1.2-2.19.ia64", "2.1AS:php-mysql-0:4.1.2-2.19.i386", "2.1AS:php-mysql-0:4.1.2-2.19.ia64", "2.1AS:php-odbc-0:4.1.2-2.19.i386", "2.1AS:php-odbc-0:4.1.2-2.19.ia64", "2.1AS:php-pgsql-0:4.1.2-2.19.i386", "2.1AS:php-pgsql-0:4.1.2-2.19.ia64", "2.1AW:php-0:4.1.2-2.19.i386", "2.1AW:php-0:4.1.2-2.19.ia64", "2.1AW:php-0:4.1.2-2.19.src", "2.1AW:php-devel-0:4.1.2-2.19.i386", "2.1AW:php-devel-0:4.1.2-2.19.ia64", "2.1AW:php-imap-0:4.1.2-2.19.i386", "2.1AW:php-imap-0:4.1.2-2.19.ia64", "2.1AW:php-ldap-0:4.1.2-2.19.i386", "2.1AW:php-ldap-0:4.1.2-2.19.ia64", "2.1AW:php-manual-0:4.1.2-2.19.i386", "2.1AW:php-manual-0:4.1.2-2.19.ia64", "2.1AW:php-mysql-0:4.1.2-2.19.i386", "2.1AW:php-mysql-0:4.1.2-2.19.ia64", "2.1AW:php-odbc-0:4.1.2-2.19.i386", "2.1AW:php-odbc-0:4.1.2-2.19.ia64", "2.1AW:php-pgsql-0:4.1.2-2.19.i386", "2.1AW:php-pgsql-0:4.1.2-2.19.ia64", "2.1ES:php-0:4.1.2-2.19.i386", "2.1ES:php-0:4.1.2-2.19.ia64", "2.1ES:php-0:4.1.2-2.19.src", "2.1ES:php-devel-0:4.1.2-2.19.i386", "2.1ES:php-devel-0:4.1.2-2.19.ia64", "2.1ES:php-imap-0:4.1.2-2.19.i386", "2.1ES:php-imap-0:4.1.2-2.19.ia64", "2.1ES:php-ldap-0:4.1.2-2.19.i386", "2.1ES:php-ldap-0:4.1.2-2.19.ia64", "2.1ES:php-manual-0:4.1.2-2.19.i386", "2.1ES:php-manual-0:4.1.2-2.19.ia64", "2.1ES:php-mysql-0:4.1.2-2.19.i386", "2.1ES:php-mysql-0:4.1.2-2.19.ia64", "2.1ES:php-odbc-0:4.1.2-2.19.i386", "2.1ES:php-odbc-0:4.1.2-2.19.ia64", "2.1ES:php-pgsql-0:4.1.2-2.19.i386", "2.1ES:php-pgsql-0:4.1.2-2.19.ia64", "2.1WS:php-0:4.1.2-2.19.i386", "2.1WS:php-0:4.1.2-2.19.ia64", "2.1WS:php-0:4.1.2-2.19.src", "2.1WS:php-devel-0:4.1.2-2.19.i386", "2.1WS:php-devel-0:4.1.2-2.19.ia64", "2.1WS:php-imap-0:4.1.2-2.19.i386", "2.1WS:php-imap-0:4.1.2-2.19.ia64", "2.1WS:php-ldap-0:4.1.2-2.19.i386", "2.1WS:php-ldap-0:4.1.2-2.19.ia64", "2.1WS:php-manual-0:4.1.2-2.19.i386", "2.1WS:php-manual-0:4.1.2-2.19.ia64", "2.1WS:php-mysql-0:4.1.2-2.19.i386", "2.1WS:php-mysql-0:4.1.2-2.19.ia64", "2.1WS:php-odbc-0:4.1.2-2.19.i386", "2.1WS:php-odbc-0:4.1.2-2.19.ia64", "2.1WS:php-pgsql-0:4.1.2-2.19.i386", "2.1WS:php-pgsql-0:4.1.2-2.19.ia64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:0888" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "php chunk_split integer overflow" }, { "cve": "CVE-2007-3799", "discovery_date": "2007-06-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "250726" } ], "notes": [ { "category": "description", "text": "The session_start function in ext/session in PHP 4.x up to 4.4.7 and 5.x up to 5.2.3 allows remote attackers to insert arbitrary attributes into the session cookie via special characters in a cookie that is obtained from (1) PATH_INFO, (2) the session_id function, and (3) the session_start function, which are not encoded or filtered when the new session cookie is generated, a related issue to CVE-2006-0207.", "title": "Vulnerability description" }, { "category": "summary", "text": "php cross-site cookie insertion", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2007-3799\n\nThe Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw.", "title": "Statement" } ], "product_status": { "fixed": [ "2.1AS:php-0:4.1.2-2.19.i386", "2.1AS:php-0:4.1.2-2.19.ia64", "2.1AS:php-0:4.1.2-2.19.src", "2.1AS:php-devel-0:4.1.2-2.19.i386", "2.1AS:php-devel-0:4.1.2-2.19.ia64", "2.1AS:php-imap-0:4.1.2-2.19.i386", "2.1AS:php-imap-0:4.1.2-2.19.ia64", "2.1AS:php-ldap-0:4.1.2-2.19.i386", "2.1AS:php-ldap-0:4.1.2-2.19.ia64", "2.1AS:php-manual-0:4.1.2-2.19.i386", "2.1AS:php-manual-0:4.1.2-2.19.ia64", "2.1AS:php-mysql-0:4.1.2-2.19.i386", "2.1AS:php-mysql-0:4.1.2-2.19.ia64", "2.1AS:php-odbc-0:4.1.2-2.19.i386", "2.1AS:php-odbc-0:4.1.2-2.19.ia64", "2.1AS:php-pgsql-0:4.1.2-2.19.i386", "2.1AS:php-pgsql-0:4.1.2-2.19.ia64", "2.1AW:php-0:4.1.2-2.19.i386", "2.1AW:php-0:4.1.2-2.19.ia64", "2.1AW:php-0:4.1.2-2.19.src", "2.1AW:php-devel-0:4.1.2-2.19.i386", "2.1AW:php-devel-0:4.1.2-2.19.ia64", "2.1AW:php-imap-0:4.1.2-2.19.i386", "2.1AW:php-imap-0:4.1.2-2.19.ia64", "2.1AW:php-ldap-0:4.1.2-2.19.i386", "2.1AW:php-ldap-0:4.1.2-2.19.ia64", "2.1AW:php-manual-0:4.1.2-2.19.i386", "2.1AW:php-manual-0:4.1.2-2.19.ia64", "2.1AW:php-mysql-0:4.1.2-2.19.i386", "2.1AW:php-mysql-0:4.1.2-2.19.ia64", "2.1AW:php-odbc-0:4.1.2-2.19.i386", "2.1AW:php-odbc-0:4.1.2-2.19.ia64", "2.1AW:php-pgsql-0:4.1.2-2.19.i386", "2.1AW:php-pgsql-0:4.1.2-2.19.ia64", "2.1ES:php-0:4.1.2-2.19.i386", "2.1ES:php-0:4.1.2-2.19.ia64", "2.1ES:php-0:4.1.2-2.19.src", "2.1ES:php-devel-0:4.1.2-2.19.i386", "2.1ES:php-devel-0:4.1.2-2.19.ia64", "2.1ES:php-imap-0:4.1.2-2.19.i386", "2.1ES:php-imap-0:4.1.2-2.19.ia64", "2.1ES:php-ldap-0:4.1.2-2.19.i386", "2.1ES:php-ldap-0:4.1.2-2.19.ia64", "2.1ES:php-manual-0:4.1.2-2.19.i386", "2.1ES:php-manual-0:4.1.2-2.19.ia64", "2.1ES:php-mysql-0:4.1.2-2.19.i386", "2.1ES:php-mysql-0:4.1.2-2.19.ia64", "2.1ES:php-odbc-0:4.1.2-2.19.i386", "2.1ES:php-odbc-0:4.1.2-2.19.ia64", "2.1ES:php-pgsql-0:4.1.2-2.19.i386", "2.1ES:php-pgsql-0:4.1.2-2.19.ia64", "2.1WS:php-0:4.1.2-2.19.i386", "2.1WS:php-0:4.1.2-2.19.ia64", "2.1WS:php-0:4.1.2-2.19.src", "2.1WS:php-devel-0:4.1.2-2.19.i386", "2.1WS:php-devel-0:4.1.2-2.19.ia64", "2.1WS:php-imap-0:4.1.2-2.19.i386", "2.1WS:php-imap-0:4.1.2-2.19.ia64", "2.1WS:php-ldap-0:4.1.2-2.19.i386", "2.1WS:php-ldap-0:4.1.2-2.19.ia64", "2.1WS:php-manual-0:4.1.2-2.19.i386", "2.1WS:php-manual-0:4.1.2-2.19.ia64", "2.1WS:php-mysql-0:4.1.2-2.19.i386", "2.1WS:php-mysql-0:4.1.2-2.19.ia64", "2.1WS:php-odbc-0:4.1.2-2.19.i386", "2.1WS:php-odbc-0:4.1.2-2.19.ia64", "2.1WS:php-pgsql-0:4.1.2-2.19.i386", "2.1WS:php-pgsql-0:4.1.2-2.19.ia64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-3799" }, { "category": "external", "summary": "RHBZ#250726", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=250726" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-3799", "url": "https://www.cve.org/CVERecord?id=CVE-2007-3799" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3799", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3799" } ], "release_date": "2007-06-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-10-23T15:54:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "2.1AS:php-0:4.1.2-2.19.i386", "2.1AS:php-0:4.1.2-2.19.ia64", "2.1AS:php-0:4.1.2-2.19.src", "2.1AS:php-devel-0:4.1.2-2.19.i386", "2.1AS:php-devel-0:4.1.2-2.19.ia64", "2.1AS:php-imap-0:4.1.2-2.19.i386", "2.1AS:php-imap-0:4.1.2-2.19.ia64", "2.1AS:php-ldap-0:4.1.2-2.19.i386", "2.1AS:php-ldap-0:4.1.2-2.19.ia64", "2.1AS:php-manual-0:4.1.2-2.19.i386", "2.1AS:php-manual-0:4.1.2-2.19.ia64", "2.1AS:php-mysql-0:4.1.2-2.19.i386", "2.1AS:php-mysql-0:4.1.2-2.19.ia64", "2.1AS:php-odbc-0:4.1.2-2.19.i386", "2.1AS:php-odbc-0:4.1.2-2.19.ia64", "2.1AS:php-pgsql-0:4.1.2-2.19.i386", "2.1AS:php-pgsql-0:4.1.2-2.19.ia64", "2.1AW:php-0:4.1.2-2.19.i386", "2.1AW:php-0:4.1.2-2.19.ia64", "2.1AW:php-0:4.1.2-2.19.src", "2.1AW:php-devel-0:4.1.2-2.19.i386", "2.1AW:php-devel-0:4.1.2-2.19.ia64", "2.1AW:php-imap-0:4.1.2-2.19.i386", "2.1AW:php-imap-0:4.1.2-2.19.ia64", "2.1AW:php-ldap-0:4.1.2-2.19.i386", "2.1AW:php-ldap-0:4.1.2-2.19.ia64", "2.1AW:php-manual-0:4.1.2-2.19.i386", "2.1AW:php-manual-0:4.1.2-2.19.ia64", "2.1AW:php-mysql-0:4.1.2-2.19.i386", "2.1AW:php-mysql-0:4.1.2-2.19.ia64", "2.1AW:php-odbc-0:4.1.2-2.19.i386", "2.1AW:php-odbc-0:4.1.2-2.19.ia64", "2.1AW:php-pgsql-0:4.1.2-2.19.i386", "2.1AW:php-pgsql-0:4.1.2-2.19.ia64", "2.1ES:php-0:4.1.2-2.19.i386", "2.1ES:php-0:4.1.2-2.19.ia64", "2.1ES:php-0:4.1.2-2.19.src", "2.1ES:php-devel-0:4.1.2-2.19.i386", "2.1ES:php-devel-0:4.1.2-2.19.ia64", "2.1ES:php-imap-0:4.1.2-2.19.i386", "2.1ES:php-imap-0:4.1.2-2.19.ia64", "2.1ES:php-ldap-0:4.1.2-2.19.i386", "2.1ES:php-ldap-0:4.1.2-2.19.ia64", "2.1ES:php-manual-0:4.1.2-2.19.i386", "2.1ES:php-manual-0:4.1.2-2.19.ia64", "2.1ES:php-mysql-0:4.1.2-2.19.i386", "2.1ES:php-mysql-0:4.1.2-2.19.ia64", "2.1ES:php-odbc-0:4.1.2-2.19.i386", "2.1ES:php-odbc-0:4.1.2-2.19.ia64", "2.1ES:php-pgsql-0:4.1.2-2.19.i386", "2.1ES:php-pgsql-0:4.1.2-2.19.ia64", "2.1WS:php-0:4.1.2-2.19.i386", "2.1WS:php-0:4.1.2-2.19.ia64", "2.1WS:php-0:4.1.2-2.19.src", "2.1WS:php-devel-0:4.1.2-2.19.i386", "2.1WS:php-devel-0:4.1.2-2.19.ia64", "2.1WS:php-imap-0:4.1.2-2.19.i386", "2.1WS:php-imap-0:4.1.2-2.19.ia64", "2.1WS:php-ldap-0:4.1.2-2.19.i386", "2.1WS:php-ldap-0:4.1.2-2.19.ia64", "2.1WS:php-manual-0:4.1.2-2.19.i386", "2.1WS:php-manual-0:4.1.2-2.19.ia64", "2.1WS:php-mysql-0:4.1.2-2.19.i386", "2.1WS:php-mysql-0:4.1.2-2.19.ia64", "2.1WS:php-odbc-0:4.1.2-2.19.i386", "2.1WS:php-odbc-0:4.1.2-2.19.ia64", "2.1WS:php-pgsql-0:4.1.2-2.19.i386", "2.1WS:php-pgsql-0:4.1.2-2.19.ia64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:0888" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "php cross-site cookie insertion" }, { "cve": "CVE-2007-3996", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2007-08-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "278031" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in libgd in PHP before 5.2.4 allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a large (1) srcW or (2) srcH value to the (a) gdImageCopyResized function, or a large (3) sy (height) or (4) sx (width) value to the (b) gdImageCreate or the (c) gdImageCreateTrueColor function.", "title": "Vulnerability description" }, { "category": "summary", "text": "php multiple integer overflows in gd", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "2.1AS:php-0:4.1.2-2.19.i386", "2.1AS:php-0:4.1.2-2.19.ia64", "2.1AS:php-0:4.1.2-2.19.src", "2.1AS:php-devel-0:4.1.2-2.19.i386", "2.1AS:php-devel-0:4.1.2-2.19.ia64", "2.1AS:php-imap-0:4.1.2-2.19.i386", "2.1AS:php-imap-0:4.1.2-2.19.ia64", "2.1AS:php-ldap-0:4.1.2-2.19.i386", "2.1AS:php-ldap-0:4.1.2-2.19.ia64", "2.1AS:php-manual-0:4.1.2-2.19.i386", "2.1AS:php-manual-0:4.1.2-2.19.ia64", "2.1AS:php-mysql-0:4.1.2-2.19.i386", "2.1AS:php-mysql-0:4.1.2-2.19.ia64", "2.1AS:php-odbc-0:4.1.2-2.19.i386", "2.1AS:php-odbc-0:4.1.2-2.19.ia64", "2.1AS:php-pgsql-0:4.1.2-2.19.i386", "2.1AS:php-pgsql-0:4.1.2-2.19.ia64", "2.1AW:php-0:4.1.2-2.19.i386", "2.1AW:php-0:4.1.2-2.19.ia64", "2.1AW:php-0:4.1.2-2.19.src", "2.1AW:php-devel-0:4.1.2-2.19.i386", "2.1AW:php-devel-0:4.1.2-2.19.ia64", "2.1AW:php-imap-0:4.1.2-2.19.i386", "2.1AW:php-imap-0:4.1.2-2.19.ia64", "2.1AW:php-ldap-0:4.1.2-2.19.i386", "2.1AW:php-ldap-0:4.1.2-2.19.ia64", "2.1AW:php-manual-0:4.1.2-2.19.i386", "2.1AW:php-manual-0:4.1.2-2.19.ia64", "2.1AW:php-mysql-0:4.1.2-2.19.i386", "2.1AW:php-mysql-0:4.1.2-2.19.ia64", "2.1AW:php-odbc-0:4.1.2-2.19.i386", "2.1AW:php-odbc-0:4.1.2-2.19.ia64", "2.1AW:php-pgsql-0:4.1.2-2.19.i386", "2.1AW:php-pgsql-0:4.1.2-2.19.ia64", "2.1ES:php-0:4.1.2-2.19.i386", "2.1ES:php-0:4.1.2-2.19.ia64", "2.1ES:php-0:4.1.2-2.19.src", "2.1ES:php-devel-0:4.1.2-2.19.i386", "2.1ES:php-devel-0:4.1.2-2.19.ia64", "2.1ES:php-imap-0:4.1.2-2.19.i386", "2.1ES:php-imap-0:4.1.2-2.19.ia64", "2.1ES:php-ldap-0:4.1.2-2.19.i386", "2.1ES:php-ldap-0:4.1.2-2.19.ia64", "2.1ES:php-manual-0:4.1.2-2.19.i386", "2.1ES:php-manual-0:4.1.2-2.19.ia64", "2.1ES:php-mysql-0:4.1.2-2.19.i386", "2.1ES:php-mysql-0:4.1.2-2.19.ia64", "2.1ES:php-odbc-0:4.1.2-2.19.i386", "2.1ES:php-odbc-0:4.1.2-2.19.ia64", "2.1ES:php-pgsql-0:4.1.2-2.19.i386", "2.1ES:php-pgsql-0:4.1.2-2.19.ia64", "2.1WS:php-0:4.1.2-2.19.i386", "2.1WS:php-0:4.1.2-2.19.ia64", "2.1WS:php-0:4.1.2-2.19.src", "2.1WS:php-devel-0:4.1.2-2.19.i386", "2.1WS:php-devel-0:4.1.2-2.19.ia64", "2.1WS:php-imap-0:4.1.2-2.19.i386", "2.1WS:php-imap-0:4.1.2-2.19.ia64", "2.1WS:php-ldap-0:4.1.2-2.19.i386", "2.1WS:php-ldap-0:4.1.2-2.19.ia64", "2.1WS:php-manual-0:4.1.2-2.19.i386", "2.1WS:php-manual-0:4.1.2-2.19.ia64", "2.1WS:php-mysql-0:4.1.2-2.19.i386", "2.1WS:php-mysql-0:4.1.2-2.19.ia64", "2.1WS:php-odbc-0:4.1.2-2.19.i386", "2.1WS:php-odbc-0:4.1.2-2.19.ia64", "2.1WS:php-pgsql-0:4.1.2-2.19.i386", "2.1WS:php-pgsql-0:4.1.2-2.19.ia64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-3996" }, { "category": "external", "summary": "RHBZ#278031", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=278031" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-3996", "url": "https://www.cve.org/CVERecord?id=CVE-2007-3996" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3996", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3996" } ], "release_date": "2007-08-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-10-23T15:54:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "2.1AS:php-0:4.1.2-2.19.i386", "2.1AS:php-0:4.1.2-2.19.ia64", "2.1AS:php-0:4.1.2-2.19.src", "2.1AS:php-devel-0:4.1.2-2.19.i386", "2.1AS:php-devel-0:4.1.2-2.19.ia64", "2.1AS:php-imap-0:4.1.2-2.19.i386", "2.1AS:php-imap-0:4.1.2-2.19.ia64", "2.1AS:php-ldap-0:4.1.2-2.19.i386", "2.1AS:php-ldap-0:4.1.2-2.19.ia64", "2.1AS:php-manual-0:4.1.2-2.19.i386", "2.1AS:php-manual-0:4.1.2-2.19.ia64", "2.1AS:php-mysql-0:4.1.2-2.19.i386", "2.1AS:php-mysql-0:4.1.2-2.19.ia64", "2.1AS:php-odbc-0:4.1.2-2.19.i386", "2.1AS:php-odbc-0:4.1.2-2.19.ia64", "2.1AS:php-pgsql-0:4.1.2-2.19.i386", "2.1AS:php-pgsql-0:4.1.2-2.19.ia64", "2.1AW:php-0:4.1.2-2.19.i386", "2.1AW:php-0:4.1.2-2.19.ia64", "2.1AW:php-0:4.1.2-2.19.src", "2.1AW:php-devel-0:4.1.2-2.19.i386", "2.1AW:php-devel-0:4.1.2-2.19.ia64", "2.1AW:php-imap-0:4.1.2-2.19.i386", "2.1AW:php-imap-0:4.1.2-2.19.ia64", "2.1AW:php-ldap-0:4.1.2-2.19.i386", "2.1AW:php-ldap-0:4.1.2-2.19.ia64", "2.1AW:php-manual-0:4.1.2-2.19.i386", "2.1AW:php-manual-0:4.1.2-2.19.ia64", "2.1AW:php-mysql-0:4.1.2-2.19.i386", "2.1AW:php-mysql-0:4.1.2-2.19.ia64", "2.1AW:php-odbc-0:4.1.2-2.19.i386", "2.1AW:php-odbc-0:4.1.2-2.19.ia64", "2.1AW:php-pgsql-0:4.1.2-2.19.i386", "2.1AW:php-pgsql-0:4.1.2-2.19.ia64", "2.1ES:php-0:4.1.2-2.19.i386", "2.1ES:php-0:4.1.2-2.19.ia64", "2.1ES:php-0:4.1.2-2.19.src", "2.1ES:php-devel-0:4.1.2-2.19.i386", "2.1ES:php-devel-0:4.1.2-2.19.ia64", "2.1ES:php-imap-0:4.1.2-2.19.i386", "2.1ES:php-imap-0:4.1.2-2.19.ia64", "2.1ES:php-ldap-0:4.1.2-2.19.i386", "2.1ES:php-ldap-0:4.1.2-2.19.ia64", "2.1ES:php-manual-0:4.1.2-2.19.i386", "2.1ES:php-manual-0:4.1.2-2.19.ia64", "2.1ES:php-mysql-0:4.1.2-2.19.i386", "2.1ES:php-mysql-0:4.1.2-2.19.ia64", "2.1ES:php-odbc-0:4.1.2-2.19.i386", "2.1ES:php-odbc-0:4.1.2-2.19.ia64", "2.1ES:php-pgsql-0:4.1.2-2.19.i386", "2.1ES:php-pgsql-0:4.1.2-2.19.ia64", "2.1WS:php-0:4.1.2-2.19.i386", "2.1WS:php-0:4.1.2-2.19.ia64", "2.1WS:php-0:4.1.2-2.19.src", "2.1WS:php-devel-0:4.1.2-2.19.i386", "2.1WS:php-devel-0:4.1.2-2.19.ia64", "2.1WS:php-imap-0:4.1.2-2.19.i386", "2.1WS:php-imap-0:4.1.2-2.19.ia64", "2.1WS:php-ldap-0:4.1.2-2.19.i386", "2.1WS:php-ldap-0:4.1.2-2.19.ia64", "2.1WS:php-manual-0:4.1.2-2.19.i386", "2.1WS:php-manual-0:4.1.2-2.19.ia64", "2.1WS:php-mysql-0:4.1.2-2.19.i386", "2.1WS:php-mysql-0:4.1.2-2.19.ia64", "2.1WS:php-odbc-0:4.1.2-2.19.i386", "2.1WS:php-odbc-0:4.1.2-2.19.ia64", "2.1WS:php-pgsql-0:4.1.2-2.19.i386", "2.1WS:php-pgsql-0:4.1.2-2.19.ia64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:0888" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "php multiple integer overflows in gd" }, { "cve": "CVE-2007-4670", "discovery_date": "2007-08-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "278041" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in PHP before 5.2.4 has unknown impact and attack vectors, related to an \"Improved fix for MOPB-03-2007,\" probably a variant of CVE-2007-1285.", "title": "Vulnerability description" }, { "category": "summary", "text": "php malformed cookie handling", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "2.1AS:php-0:4.1.2-2.19.i386", "2.1AS:php-0:4.1.2-2.19.ia64", "2.1AS:php-0:4.1.2-2.19.src", "2.1AS:php-devel-0:4.1.2-2.19.i386", "2.1AS:php-devel-0:4.1.2-2.19.ia64", "2.1AS:php-imap-0:4.1.2-2.19.i386", "2.1AS:php-imap-0:4.1.2-2.19.ia64", "2.1AS:php-ldap-0:4.1.2-2.19.i386", "2.1AS:php-ldap-0:4.1.2-2.19.ia64", "2.1AS:php-manual-0:4.1.2-2.19.i386", "2.1AS:php-manual-0:4.1.2-2.19.ia64", "2.1AS:php-mysql-0:4.1.2-2.19.i386", "2.1AS:php-mysql-0:4.1.2-2.19.ia64", "2.1AS:php-odbc-0:4.1.2-2.19.i386", "2.1AS:php-odbc-0:4.1.2-2.19.ia64", "2.1AS:php-pgsql-0:4.1.2-2.19.i386", "2.1AS:php-pgsql-0:4.1.2-2.19.ia64", "2.1AW:php-0:4.1.2-2.19.i386", "2.1AW:php-0:4.1.2-2.19.ia64", "2.1AW:php-0:4.1.2-2.19.src", "2.1AW:php-devel-0:4.1.2-2.19.i386", "2.1AW:php-devel-0:4.1.2-2.19.ia64", "2.1AW:php-imap-0:4.1.2-2.19.i386", "2.1AW:php-imap-0:4.1.2-2.19.ia64", "2.1AW:php-ldap-0:4.1.2-2.19.i386", "2.1AW:php-ldap-0:4.1.2-2.19.ia64", "2.1AW:php-manual-0:4.1.2-2.19.i386", "2.1AW:php-manual-0:4.1.2-2.19.ia64", "2.1AW:php-mysql-0:4.1.2-2.19.i386", "2.1AW:php-mysql-0:4.1.2-2.19.ia64", "2.1AW:php-odbc-0:4.1.2-2.19.i386", "2.1AW:php-odbc-0:4.1.2-2.19.ia64", "2.1AW:php-pgsql-0:4.1.2-2.19.i386", "2.1AW:php-pgsql-0:4.1.2-2.19.ia64", "2.1ES:php-0:4.1.2-2.19.i386", "2.1ES:php-0:4.1.2-2.19.ia64", "2.1ES:php-0:4.1.2-2.19.src", "2.1ES:php-devel-0:4.1.2-2.19.i386", "2.1ES:php-devel-0:4.1.2-2.19.ia64", "2.1ES:php-imap-0:4.1.2-2.19.i386", "2.1ES:php-imap-0:4.1.2-2.19.ia64", "2.1ES:php-ldap-0:4.1.2-2.19.i386", "2.1ES:php-ldap-0:4.1.2-2.19.ia64", "2.1ES:php-manual-0:4.1.2-2.19.i386", "2.1ES:php-manual-0:4.1.2-2.19.ia64", "2.1ES:php-mysql-0:4.1.2-2.19.i386", "2.1ES:php-mysql-0:4.1.2-2.19.ia64", "2.1ES:php-odbc-0:4.1.2-2.19.i386", "2.1ES:php-odbc-0:4.1.2-2.19.ia64", "2.1ES:php-pgsql-0:4.1.2-2.19.i386", "2.1ES:php-pgsql-0:4.1.2-2.19.ia64", "2.1WS:php-0:4.1.2-2.19.i386", "2.1WS:php-0:4.1.2-2.19.ia64", "2.1WS:php-0:4.1.2-2.19.src", "2.1WS:php-devel-0:4.1.2-2.19.i386", "2.1WS:php-devel-0:4.1.2-2.19.ia64", "2.1WS:php-imap-0:4.1.2-2.19.i386", "2.1WS:php-imap-0:4.1.2-2.19.ia64", "2.1WS:php-ldap-0:4.1.2-2.19.i386", "2.1WS:php-ldap-0:4.1.2-2.19.ia64", "2.1WS:php-manual-0:4.1.2-2.19.i386", "2.1WS:php-manual-0:4.1.2-2.19.ia64", "2.1WS:php-mysql-0:4.1.2-2.19.i386", "2.1WS:php-mysql-0:4.1.2-2.19.ia64", "2.1WS:php-odbc-0:4.1.2-2.19.i386", "2.1WS:php-odbc-0:4.1.2-2.19.ia64", "2.1WS:php-pgsql-0:4.1.2-2.19.i386", "2.1WS:php-pgsql-0:4.1.2-2.19.ia64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-4670" }, { "category": "external", "summary": "RHBZ#278041", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=278041" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-4670", "url": "https://www.cve.org/CVERecord?id=CVE-2007-4670" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-4670", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-4670" } ], "release_date": "2007-08-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-10-23T15:54:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "2.1AS:php-0:4.1.2-2.19.i386", "2.1AS:php-0:4.1.2-2.19.ia64", "2.1AS:php-0:4.1.2-2.19.src", "2.1AS:php-devel-0:4.1.2-2.19.i386", "2.1AS:php-devel-0:4.1.2-2.19.ia64", "2.1AS:php-imap-0:4.1.2-2.19.i386", "2.1AS:php-imap-0:4.1.2-2.19.ia64", "2.1AS:php-ldap-0:4.1.2-2.19.i386", "2.1AS:php-ldap-0:4.1.2-2.19.ia64", "2.1AS:php-manual-0:4.1.2-2.19.i386", "2.1AS:php-manual-0:4.1.2-2.19.ia64", "2.1AS:php-mysql-0:4.1.2-2.19.i386", "2.1AS:php-mysql-0:4.1.2-2.19.ia64", "2.1AS:php-odbc-0:4.1.2-2.19.i386", "2.1AS:php-odbc-0:4.1.2-2.19.ia64", "2.1AS:php-pgsql-0:4.1.2-2.19.i386", "2.1AS:php-pgsql-0:4.1.2-2.19.ia64", "2.1AW:php-0:4.1.2-2.19.i386", "2.1AW:php-0:4.1.2-2.19.ia64", "2.1AW:php-0:4.1.2-2.19.src", "2.1AW:php-devel-0:4.1.2-2.19.i386", "2.1AW:php-devel-0:4.1.2-2.19.ia64", "2.1AW:php-imap-0:4.1.2-2.19.i386", "2.1AW:php-imap-0:4.1.2-2.19.ia64", "2.1AW:php-ldap-0:4.1.2-2.19.i386", "2.1AW:php-ldap-0:4.1.2-2.19.ia64", "2.1AW:php-manual-0:4.1.2-2.19.i386", "2.1AW:php-manual-0:4.1.2-2.19.ia64", "2.1AW:php-mysql-0:4.1.2-2.19.i386", "2.1AW:php-mysql-0:4.1.2-2.19.ia64", "2.1AW:php-odbc-0:4.1.2-2.19.i386", "2.1AW:php-odbc-0:4.1.2-2.19.ia64", "2.1AW:php-pgsql-0:4.1.2-2.19.i386", "2.1AW:php-pgsql-0:4.1.2-2.19.ia64", "2.1ES:php-0:4.1.2-2.19.i386", "2.1ES:php-0:4.1.2-2.19.ia64", "2.1ES:php-0:4.1.2-2.19.src", "2.1ES:php-devel-0:4.1.2-2.19.i386", "2.1ES:php-devel-0:4.1.2-2.19.ia64", "2.1ES:php-imap-0:4.1.2-2.19.i386", "2.1ES:php-imap-0:4.1.2-2.19.ia64", "2.1ES:php-ldap-0:4.1.2-2.19.i386", "2.1ES:php-ldap-0:4.1.2-2.19.ia64", "2.1ES:php-manual-0:4.1.2-2.19.i386", "2.1ES:php-manual-0:4.1.2-2.19.ia64", "2.1ES:php-mysql-0:4.1.2-2.19.i386", "2.1ES:php-mysql-0:4.1.2-2.19.ia64", "2.1ES:php-odbc-0:4.1.2-2.19.i386", "2.1ES:php-odbc-0:4.1.2-2.19.ia64", "2.1ES:php-pgsql-0:4.1.2-2.19.i386", "2.1ES:php-pgsql-0:4.1.2-2.19.ia64", "2.1WS:php-0:4.1.2-2.19.i386", "2.1WS:php-0:4.1.2-2.19.ia64", "2.1WS:php-0:4.1.2-2.19.src", "2.1WS:php-devel-0:4.1.2-2.19.i386", "2.1WS:php-devel-0:4.1.2-2.19.ia64", "2.1WS:php-imap-0:4.1.2-2.19.i386", "2.1WS:php-imap-0:4.1.2-2.19.ia64", "2.1WS:php-ldap-0:4.1.2-2.19.i386", "2.1WS:php-ldap-0:4.1.2-2.19.ia64", "2.1WS:php-manual-0:4.1.2-2.19.i386", "2.1WS:php-manual-0:4.1.2-2.19.ia64", "2.1WS:php-mysql-0:4.1.2-2.19.i386", "2.1WS:php-mysql-0:4.1.2-2.19.ia64", "2.1WS:php-odbc-0:4.1.2-2.19.i386", "2.1WS:php-odbc-0:4.1.2-2.19.ia64", "2.1WS:php-pgsql-0:4.1.2-2.19.i386", "2.1WS:php-pgsql-0:4.1.2-2.19.ia64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:0888" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "php malformed cookie handling" } ] }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.