---------------------------------------------------------------------- Bist Du interessiert an einem neuen Job in IT-Sicherheit? Secunia hat zwei freie Stellen als Junior und Senior Spezialist in IT- Sicherheit: http://secunia.com/secunia_vacancies/ ---------------------------------------------------------------------- TITLE: Mandriva update for php SECUNIA ADVISORY ID: SA16580 VERIFY ADVISORY: http://secunia.com/advisories/16580/ CRITICAL: Moderately critical IMPACT: System access WHERE: >From remote OPERATING SYSTEM: Mandrakelinux 10.1 http://secunia.com/product/4198/ Mandrakelinux 10.0 http://secunia.com/product/3918/ Mandrake Corporate Server 2.x http://secunia.com/product/1222/ DESCRIPTION: Mandriva has issued an update for php. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. For more information: SA16502 SOLUTION: Apply updated packages. Mandrakelinux 10.0 eb0e368698b2fda5305b91ab1db8454b 10.0/RPMS/libphp_common432-4.3.4-4.6.100mdk.i586.rpm 1816cfcc76d579e46733d572b9419fce 10.0/RPMS/php-cgi-4.3.4-4.6.100mdk.i586.rpm 44eccf95b5ea20a7980bc57193fd4207 10.0/RPMS/php-cli-4.3.4-4.6.100mdk.i586.rpm a69cc3baef9baa683242e30f6011f8e2 10.0/RPMS/php432-devel-4.3.4-4.6.100mdk.i586.rpm a0a2f9a9e8241a515cf2b548beae4cb7 10.0/SRPMS/php-4.3.4-4.6.100mdk.src.rpm Mandrakelinux 10.0/AMD64 fd1a6e1293506461a19e5cc80d90eecb amd64/10.0/RPMS/lib64php_common432-4.3.4-4.6.100mdk.amd64.rpm f9374c5b4339d568fe6e05bfb17b81f7 amd64/10.0/RPMS/php-cgi-4.3.4-4.6.100mdk.amd64.rpm 0f811ea9666a35feaeb3176bef2145e4 amd64/10.0/RPMS/php-cli-4.3.4-4.6.100mdk.amd64.rpm 5cc1e89e7e2d2474d4249713855ab1b1 amd64/10.0/RPMS/php432-devel-4.3.4-4.6.100mdk.amd64.rpm a0a2f9a9e8241a515cf2b548beae4cb7 amd64/10.0/SRPMS/php-4.3.4-4.6.100mdk.src.rpm Mandrakelinux 10.1 696d96819a573db2fc9ef77018a1cd5a 10.1/RPMS/libphp_common432-4.3.8-3.4.101mdk.i586.rpm cd75f36ce70b59b1e7d89ec17e939c01 10.1/RPMS/php-cgi-4.3.8-3.4.101mdk.i586.rpm 190fb5d7390f421ab639f086b0d4b830 10.1/RPMS/php-cli-4.3.8-3.4.101mdk.i586.rpm 92d72f61dba2582098b490790d1dd759 10.1/RPMS/php432-devel-4.3.8-3.4.101mdk.i586.rpm 7c1fd0570af6566a47ef240e072757e3 10.1/SRPMS/php-4.3.8-3.4.101mdk.src.rpm Mandrakelinux 10.1/X86_64 497261e30c8f34eeb074273dff2e51cd x86_64/10.1/RPMS/lib64php_common432-4.3.8-3.4.101mdk.x86_64.rpm 08f0ba426c68ae93549dc9617aec9fa7 x86_64/10.1/RPMS/php-cgi-4.3.8-3.4.101mdk.x86_64.rpm beb9dfc3eabafd3491f3996f339b89a7 x86_64/10.1/RPMS/php-cli-4.3.8-3.4.101mdk.x86_64.rpm 3b9dfd200b756098165f7df0381e4fbd x86_64/10.1/RPMS/php432-devel-4.3.8-3.4.101mdk.x86_64.rpm 7c1fd0570af6566a47ef240e072757e3 x86_64/10.1/SRPMS/php-4.3.8-3.4.101mdk.src.rpm Corporate Server 2.1 20e4fe9664591d97bd7e87bce7abf8a1 corporate/2.1/RPMS/php-4.2.3-4.5.C21mdk.i586.rpm b5c53e71a69a7d8812bb2871cef26aaf corporate/2.1/RPMS/php-common-4.2.3-4.5.C21mdk.i586.rpm 483f7f2db9ec6d49e29ba7c4488996ee corporate/2.1/RPMS/php-devel-4.2.3-4.5.C21mdk.i586.rpm 1b3cbc4961e4ef50c6304d6a8f03cd0a corporate/2.1/RPMS/php-pear-4.2.3-4.5.C21mdk.i586.rpm 0b15baacbb3243b46143fd041a8dd8f4 corporate/2.1/SRPMS/php-4.2.3-4.5.C21mdk.src.rpm Corporate Server 2.1/X86_64 734b15eebd17d63cef3e3a7f042c9fb1 x86_64/corporate/2.1/RPMS/php-4.2.3-4.5.C21mdk.x86_64.rpm d3c6941f8c98f4e868e5b9b2366e8886 x86_64/corporate/2.1/RPMS/php-common-4.2.3-4.5.C21mdk.x86_64.rpm 8eed243db07e3b87186598d050dcee8b x86_64/corporate/2.1/RPMS/php-devel-4.2.3-4.5.C21mdk.x86_64.rpm 839e1b9811714d35ce87b6d7bdd4a326 x86_64/corporate/2.1/RPMS/php-pear-4.2.3-4.5.C21mdk.x86_64.rpm 0b15baacbb3243b46143fd041a8dd8f4 x86_64/corporate/2.1/SRPMS/php-4.2.3-4.5.C21mdk.src.rpm ORIGINAL ADVISORY: http://www.mandriva.com/security/advisories?name=MDKSA-2005:152 OTHER REFERENCES: SA16502: http://secunia.com/advisories/16502/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------