Debian DSA-1444-2 : php5 - several vulnerabilities

High Nessus Plugin ID 29838

Synopsis

The remote Debian host is missing a security-related update.

Description

It was discovered that the patch for CVE-2007-4659 could lead to regressions in some scenarios. The fix has been reverted for now, a revised update will be provided in a future PHP DSA.

For reference the original advisory below :

Several remote vulnerabilities have been discovered in PHP, a server-side, HTML-embedded scripting language. The Common Vulnerabilities and Exposures project identifies the following problems :

- CVE-2007-3799 It was discovered that the session_start() function allowed the insertion of attributes into the session cookie.

- CVE-2007-3998 Mattias Bengtsson and Philip Olausson discovered that a programming error in the implementation of the wordwrap() function allowed denial of service through an infinite loop.

- CVE-2007-4658 Stanislav Malyshev discovered that a format string vulnerability in the money_format() function could allow the execution of arbitrary code.

- CVE-2007-4659 Stefan Esser discovered that execution control flow inside the zend_alter_ini_entry() function is handled incorrectly in case of a memory limit violation.

- CVE-2007-4660 Gerhard Wagner discovered an integer overflow inside the chunk_split() function.

- CVE-2007-5898 Rasmus Lerdorf discovered that incorrect parsing of multibyte sequences may lead to disclosure of memory contents.

- CVE-2007-5899 It was discovered that the output_add_rewrite_var() function could leak session ID information, resulting in information disclosure.

This update also fixes two bugs from the PHP 5.2.4 release which don't have security impact according to the Debian PHP security policy (CVE-2007-4657 and CVE-2007-4662 ), but which are fixed nonetheless.

Solution

Upgrade the php5 packages.

The old stable distribution (sarge) doesn't contain php5.

For the stable distribution (etch), these problems have been fixed in version 5.2.0-8+etch10.

See Also

https://security-tracker.debian.org/tracker/CVE-2007-4659

https://security-tracker.debian.org/tracker/CVE-2007-3799

https://security-tracker.debian.org/tracker/CVE-2007-3998

https://security-tracker.debian.org/tracker/CVE-2007-4658

https://security-tracker.debian.org/tracker/CVE-2007-4659

https://security-tracker.debian.org/tracker/CVE-2007-4660

https://security-tracker.debian.org/tracker/CVE-2007-5898

https://security-tracker.debian.org/tracker/CVE-2007-5899

https://security-tracker.debian.org/tracker/CVE-2007-4657

https://security-tracker.debian.org/tracker/CVE-2007-4662

https://security-tracker.debian.org/tracker/CVE-2007-5898

https://security-tracker.debian.org/tracker/CVE-2007-5899

https://www.debian.org/security/2008/dsa-1444

Plugin Details

Severity: High

ID: 29838

File Name: debian_DSA-1444.nasl

Version: 1.22

Type: local

Agent: unix

Published: 2008/01/04

Updated: 2018/11/10

Dependencies: 12634

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 7.5

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:php5, cpe:/o:debian:debian_linux:4.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2008/01/23

Reference Information

CVE: CVE-2007-3799, CVE-2007-3998, CVE-2007-4657, CVE-2007-4658, CVE-2007-4659, CVE-2007-4660, CVE-2007-4662, CVE-2007-5898, CVE-2007-5899

BID: 24268, 25498, 26403

DSA: 1444

CWE: 20, 119, 189, 200, 399