MDKSA-2005:109 - Updated php-pear packages fix remotely exploitable vulnerability
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Update Advisory
_______________________________________________________________________
Package name: php-pear
Advisory ID: MDKSA-2005:109
Date: June 30th, 2005
Affected versions: 10.0, 10.1, 10.2, Corporate 3.0
______________________________________________________________________
Problem Description:
A vulnerability was discovered by GulfTech Security in the PHP XML RPC
project. This vulnerability is considered critical and can lead to
remote code execution. The vulnerability also exists in the PEAR
XMLRPC implementation.
Mandriva ships with the PEAR XMLRPC implementation and it has been
patched to correct this problem. It is advised that users examine the
PHP applications they have installed on their servers for any
applications that may come bundled with their own copies of the PEAR
system and either patch RPC.php or use the system PEAR (found in
/usr/share/pear).
Updates have been released for some popular PHP applications such
as WordPress and Serendipity and users are urged to take all
precautions to protect their systems from attack and/or defacement by
upgrading their applications from the authors of the respective
applications.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1921
http://www.hardened-php.net/advisory-022005.php
______________________________________________________________________
Updated Packages:
Mandrakelinux 10.0:
38955856a2689f10db9f9f5ca734392c
10.0/RPMS/php-pear-4.3.4-3.1.100mdk.noarch.rpm
18695b853e1aba539da2c68a6d574a4b 10.0/SRPMS/php-pear-4.3.4-3.1.100mdk.src.rpm
Mandrakelinux 10.0/AMD64:
9de5b21dc478563f5277f9157b98c49f
amd64/10.0/RPMS/php-pear-4.3.4-3.1.100mdk.noarch.rpm
18695b853e1aba539da2c68a6d574a4b
amd64/10.0/SRPMS/php-pear-4.3.4-3.1.100mdk.src.rpm
Mandrakelinux 10.1:
d48b2e73f6f1ec0366498014a484f328
10.1/RPMS/php-pear-4.3.8-1.1.101mdk.noarch.rpm
20c91279fa70d68d9e51587980cd262d 10.1/SRPMS/php-pear-4.3.8-1.1.101mdk.src.rpm
Mandrakelinux 10.1/X86_64:
dba6b07d89653e4596220cf93a3fed73
x86_64/10.1/RPMS/php-pear-4.3.8-1.1.101mdk.noarch.rpm
20c91279fa70d68d9e51587980cd262d
x86_64/10.1/SRPMS/php-pear-4.3.8-1.1.101mdk.src.rpm
Mandrakelinux 10.2:
4734a42ea347a8f3ad42f2ebbde56f22
10.2/RPMS/php-pear-4.3.10-3.1.102mdk.noarch.rpm
b564c4dce014d6c3968ef0544effe318 10.2/SRPMS/php-pear-4.3.10-3.1.102mdk.src.rpm
Mandrakelinux 10.2/X86_64:
c3349adf16855ee536cbd01077f087e5
x86_64/10.2/RPMS/php-pear-4.3.10-3.1.102mdk.noarch.rpm
b564c4dce014d6c3968ef0544effe318
x86_64/10.2/SRPMS/php-pear-4.3.10-3.1.102mdk.src.rpm
Corporate 3.0:
ac0ffe7efc09f7718461fa81a9ac5864
corporate/3.0/RPMS/php-pear-4.3.4-3.1.C30mdk.noarch.rpm
1cf934b41b88c63614f4e4d623da479b
corporate/3.0/SRPMS/php-pear-4.3.4-3.1.C30mdk.src.rpm
Corporate 3.0/X86_64:
3b4eea612865d6aeb242299c390f2fe9
x86_64/corporate/3.0/RPMS/php-pear-4.3.4-3.1.C30mdk.noarch.rpm
1cf934b41b88c63614f4e4d623da479b
x86_64/corporate/3.0/SRPMS/php-pear-4.3.4-3.1.C30mdk.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)
iD8DBQFCxHT6mqjQ0CJFipgRAjMWAJ9R5EepEYCn6OkjFULzvN4WTNRBIQCfTYsk
/TAtWwT1PeHQGuH/upbw51g=
=y8Ju
-----END PGP SIGNATURE-----