---------------------------------------------------------------------- Secunia Network Software Inspector 2.0 (NSI) - Public Beta The Public Beta has ended. Thanks to all that participated. Learn more: http://secunia.com/network_software_inspector_2/ ---------------------------------------------------------------------- TITLE: PHP Multiple Vulnerabilities SECUNIA ADVISORY ID: SA30048 VERIFY ADVISORY: http://secunia.com/advisories/30048/ CRITICAL: Moderately critical IMPACT: Unknown, Security Bypass, DoS, System access WHERE: >From remote REVISION: 1.1 originally posted 2008-05-02 SOFTWARE: PHP 5.2.x http://secunia.com/product/13446/ DESCRIPTION: Some vulnerabilities have been reported in PHP, where some have unknown impacts and others can be exploited by malicious users to bypass certain security restrictions, and potentially by malicious people to cause a DoS (Denial of Service) or to compromise a vulnerable system. 1) An unspecified error in the FastCGI SAPI can be exploited to cause a stack-based buffer overflow. 2) An error in the processing of multibyte characters within the "escapeshellcmd()" and "escapeshellarg()" functions can be exploited to escape the inserted backslash or quote characters via certain multibyte characters. Successful exploitation allows to bypass the "safe_mode_exec_dir" and "disable_functions" directives, and potentially to inject arbitrary shell commands via user controlled input, but requires that the shell uses a locale with a variable width character (e.g. GBK, EUC-KR, SJIS). 3) A vulnerability is caused due to an error during path translation in cgi_main.c. This can potentially be exploited to execute arbitrary code, but depends on how a targeted application is using PHP. 4) An error in cURL can be exploited to bypass the "safe_mode" directive. 5) A boundary error in PCRE can potentially be exploited by malicious people to cause a DoS or compromise a vulnerable system. For more information: SA28923 NOTE: A weakness in the "GENERATE_SEED()" macro has also been reported. The vulnerabilities are reported in versions prior to 5.2.6. SOLUTION: Update to version 5.2.6. http://www.php.net/downloads.php PROVIDED AND/OR DISCOVERED BY: 1) The vendor credits Andrei Nigmatulin. 2) Stefan Esser. 3) The vendor credits Ryan Permeh. 4) The vendor credits Maksymilian Arciemowicz. CHANGELOG: 2008-05-07: Updated "Description" and "Original Advisory" section with additional information. Added CVE references and link to US-CERT. ORIGINAL ADVISORY: PHP: http://www.php.net/ChangeLog-5.php Stefan Esser: http://www.sektioneins.de/advisories/SE-2008-03.txt http://www.sektioneins.de/advisories/SE-2008-02.txt OTHER REFERENCES: SA28923: http://secunia.com/advisories/28923/ US-CERT VU#147027: http://www.kb.cert.org/vuls/id/147027 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------