Description: | Description: The remote host is missing an update to php announced via advisory FEDORA-2011-11537.
Update Information:
Security Enhancements and Fixes:
* Updated crypt_blowfish to 1.2. (CVE-2011-2483) * Fixed crash in error_log(). Reported by Mateusz Kocielski * Fixed buffer overflow on overlog salt in crypt(). * Fixed bug #54939 (File path injection vulnerability in RFC1867 File upload filename). Reported by Krzysztof Kotowicz. (CVE-2011-2202) * Fixed stack buffer overflow in socket_connect(). (CVE-2011-1938) * Fixed bug #54238 (use-after-free in substr_replace()). (CVE-2011-1148)
Upstream announce for 5.3.8: http://www.php.net/archive/2011.php#id2011-08-23-1 Upstream announce for 5.3.7: http://www.php.net/archive/2011.php#id2011-08-18-1
Full Changelog: http://www.php.net/ChangeLog-5.php#5.3.8
References:
[ 1 ] Bug #732516 - CVE-2011-3182 PHP multiple NULL pointer dereferences https://bugzilla.redhat.com/show_bug.cgi?id=732516 [ 2 ] Bug #715025 - CVE-2011-2483 crypt_blowfish: 8-bit character mishandling allows different password pairs to produce the same hash https://bugzilla.redhat.com/show_bug.cgi?id=715025 [ 3 ] Bug #713194 - CVE-2011-2202 php: file path injection vulnerability in RFC1867 file upload filename https://bugzilla.redhat.com/show_bug.cgi?id=713194 [ 4 ] Bug #709067 - CVE-2011-1938 php: stack-based buffer overflow in socket_connect() https://bugzilla.redhat.com/show_bug.cgi?id=709067 [ 5 ] Bug #688958 - CVE-2011-1148 php: use-after-free vulnerability in substr_replace() https://bugzilla.redhat.com/show_bug.cgi?id=688958
Solution: Apply the appropriate updates.
This update can be installed with the yum update program. Use su -c 'yum update php' at the command line. For more information, refer to Managing Software with yum, available at http://docs.fedoraproject.org/yum/.
https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2011-11537
Risk factor : High
|