U programskom paketu php-eaccelerator otkrivena je sigurnosna ranjivost koju udaljeni napadači mogu iskoristiti za izvršavanje proizvoljnog programskog koda.
Paket:
php-eaccelerator 0.x
Operacijski sustavi:
Fedora 16
Kritičnost:
7.5
Problem:
pogreška u programskoj funkciji
Iskorištavanje:
udaljeno
Posljedica:
proizvoljno izvršavanje programskog koda
Rješenje:
programska zakrpa proizvođača
CVE:
CVE-2012-0830
Izvorni ID preporuke:
FEDORA-2012-1262
Izvor:
Fedora
Problem:
U funkciji "php_register_variable_ex" u datoteci "php_variables.c".
Posljedica:
Slanjem posebno oblikovanog zahtjeva, udaljeni napadač može pokretati zlonamjerni programski kod.
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2012-1262
2012-02-04 04:42:22
--------------------------------------------------------------------------------
Name : php-eaccelerator
Product : Fedora 16
Version : 0.9.6.1
Release : 9.fc16.2
URL : http://eaccelerator.net/
Summary : PHP accelerator, optimizer, encoder and dynamic content cacher
Description :
eAccelerator is a further development of the MMCache PHP Accelerator & Encoder.
It increases performance of PHP scripts by caching them in compiled state, so
that the overhead of compiling is almost completely eliminated.
--------------------------------------------------------------------------------
Update Information:
This update has the latest release of PHP, 5.3.10, which fixes a security
issue.
A previous security fix introduced in PHP 5.3.9 allowed a remote user to crash
the PHP interpreter, or possibly execute arbitrary code. (CVE-2012-0830)
--------------------------------------------------------------------------------
ChangeLog:
* Sat Feb 4 2012 Remi Collet <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1:0.9.6.1-9.2
- rebuild against PHP 5.3.10
* Wed Jan 11 2012 Remi Collet <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1:0.9.6.1-9.1
- rebuild against PHP 5.3.9
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #786686 - CVE-2012-0830 php: remote code exec flaw introduced in the
CVE-2011-4885 hashdos fix
https://bugzilla.redhat.com/show_bug.cgi?id=786686
--------------------------------------------------------------------------------
This update can be installed with the "yum" update program. Use
su -c 'yum update php-eaccelerator' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Posljednje sigurnosne preporuke