Paket PHP5 nadograđen je sigurnosnom zakrpom koja uklanja dvije ranjivosti. Originalna preporuka izdana je pod oznakom SUSE-SU-2012:1156-1. Spomenute nepravilnosti omogućuju pokretanje proizvoljnog HTML i skriptnog koda.
Paket:
PHP 5.0.x
Operacijski sustavi:
SUSE Linux Enterprise Server (SLES) 11
Kritičnost:
3.7
Problem:
neodgovarajuća provjera ulaznih podataka, XSS
Iskorištavanje:
udaljeno
Posljedica:
umetanje HTML i skriptnog koda
Rješenje:
programska zakrpa proizvođača
CVE:
CVE-2011-1398, CVE-2011-4388
Izvorni ID preporuke:
SUSE-SU-2012:1156-2
Izvor:
SUSE
Problem:
Ranjivost se javlja zbog nepravilnosti "sapi_header_op" funkcije koja neispravno obrađuje ulazne nizove i omogućuje zaobilaženje HTTP zaštite. Revizija je izdana jer prethodne zakrpe nisu rješavale sigurnosni problem.
Posljedica:
Zlonamjerni korisnik bi mogao iskoristiti propuste za izvođenje XSS napada.
SUSE Security Update: Security update for PHP5
______________________________________________________________________________
Announcement ID: SUSE-SU-2012:1156-2
Rating: important
References: #775852 #778003
Cross-References: CVE-2011-1398 CVE-2011-4388
Affected Products:
SUSE Linux Enterprise Software Development Kit 11 SP2
SUSE Linux Enterprise Server 11 SP2 for VMware
SUSE Linux Enterprise Server 11 SP2
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
This update fixes CVE-2011-1398 and CVE-2011-4388 (header
injection via CR).
This update also changes the default configuration to use
FilesMatch with 'SetHandler' rather than 'AddHandler' to
protect weakly written web applications from content
confusion. Since this is a hardening measure, no CVE was
assigned.
Security Issue references:
* CVE-2011-1398
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1398
>
* CVE-2011-4388
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4388
>
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 11 SP2:
zypper in -t patch sdksp2-apache2-mod_php5-6777
- SUSE Linux Enterprise Server 11 SP2 for VMware:
zypper in -t patch slessp2-apache2-mod_php5-6777
- SUSE Linux Enterprise Server 11 SP2:
zypper in -t patch slessp2-apache2-mod_php5-6777
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ia64 ppc64
s390x x86_64):
php5-devel-5.2.14-0.7.30.46.1
php5-imap-5.2.14-0.7.30.46.1
php5-ncurses-5.2.14-0.7.30.46.1
php5-posix-5.2.14-0.7.30.46.1
php5-readline-5.2.14-0.7.30.46.1
php5-sockets-5.2.14-0.7.30.46.1
php5-sqlite-5.2.14-0.7.30.46.1
php5-tidy-5.2.14-0.7.30.46.1
- SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 x86_64):
apache2-mod_php5-5.2.14-0.7.30.46.1
php5-5.2.14-0.7.30.46.1
php5-bcmath-5.2.14-0.7.30.46.1
php5-bz2-5.2.14-0.7.30.46.1
php5-calendar-5.2.14-0.7.30.46.1
php5-ctype-5.2.14-0.7.30.46.1
php5-curl-5.2.14-0.7.30.46.1
php5-dba-5.2.14-0.7.30.46.1
php5-dbase-5.2.14-0.7.30.46.1
php5-dom-5.2.14-0.7.30.46.1
php5-exif-5.2.14-0.7.30.46.1
php5-fastcgi-5.2.14-0.7.30.46.1
php5-ftp-5.2.14-0.7.30.46.1
php5-gd-5.2.14-0.7.30.46.1
php5-gettext-5.2.14-0.7.30.46.1
php5-gmp-5.2.14-0.7.30.46.1
php5-hash-5.2.14-0.7.30.46.1
php5-iconv-5.2.14-0.7.30.46.1
php5-json-5.2.14-0.7.30.46.1
php5-ldap-5.2.14-0.7.30.46.1
php5-mbstring-5.2.14-0.7.30.46.1
php5-mcrypt-5.2.14-0.7.30.46.1
php5-mysql-5.2.14-0.7.30.46.1
php5-odbc-5.2.14-0.7.30.46.1
php5-openssl-5.2.14-0.7.30.46.1
php5-pcntl-5.2.14-0.7.30.46.1
php5-pdo-5.2.14-0.7.30.46.1
php5-pear-5.2.14-0.7.30.46.1
php5-pgsql-5.2.14-0.7.30.46.1
php5-pspell-5.2.14-0.7.30.46.1
php5-shmop-5.2.14-0.7.30.46.1
php5-snmp-5.2.14-0.7.30.46.1
php5-soap-5.2.14-0.7.30.46.1
php5-suhosin-5.2.14-0.7.30.46.1
php5-sysvmsg-5.2.14-0.7.30.46.1
php5-sysvsem-5.2.14-0.7.30.46.1
php5-sysvshm-5.2.14-0.7.30.46.1
php5-tokenizer-5.2.14-0.7.30.46.1
php5-wddx-5.2.14-0.7.30.46.1
php5-xmlreader-5.2.14-0.7.30.46.1
php5-xmlrpc-5.2.14-0.7.30.46.1
php5-xmlwriter-5.2.14-0.7.30.46.1
php5-xsl-5.2.14-0.7.30.46.1
php5-zip-5.2.14-0.7.30.46.1
php5-zlib-5.2.14-0.7.30.46.1
- SUSE Linux Enterprise Server 11 SP2 for VMware (i586 x86_64):
apache2-mod_php5-5.2.14-0.7.30.46.1
php5-5.2.14-0.7.30.46.1
php5-bcmath-5.2.14-0.7.30.46.1
php5-bz2-5.2.14-0.7.30.46.1
php5-calendar-5.2.14-0.7.30.46.1
php5-ctype-5.2.14-0.7.30.46.1
php5-curl-5.2.14-0.7.30.46.1
php5-dba-5.2.14-0.7.30.46.1
php5-dbase-5.2.14-0.7.30.46.1
php5-dom-5.2.14-0.7.30.46.1
php5-exif-5.2.14-0.7.30.46.1
php5-fastcgi-5.2.14-0.7.30.46.1
php5-ftp-5.2.14-0.7.30.46.1
php5-gd-5.2.14-0.7.30.46.1
php5-gettext-5.2.14-0.7.30.46.1
php5-gmp-5.2.14-0.7.30.46.1
php5-hash-5.2.14-0.7.30.46.1
php5-iconv-5.2.14-0.7.30.46.1
php5-json-5.2.14-0.7.30.46.1
php5-ldap-5.2.14-0.7.30.46.1
php5-mbstring-5.2.14-0.7.30.46.1
php5-mcrypt-5.2.14-0.7.30.46.1
php5-mysql-5.2.14-0.7.30.46.1
php5-odbc-5.2.14-0.7.30.46.1
php5-openssl-5.2.14-0.7.30.46.1
php5-pcntl-5.2.14-0.7.30.46.1
php5-pdo-5.2.14-0.7.30.46.1
php5-pear-5.2.14-0.7.30.46.1
php5-pgsql-5.2.14-0.7.30.46.1
php5-pspell-5.2.14-0.7.30.46.1
php5-shmop-5.2.14-0.7.30.46.1
php5-snmp-5.2.14-0.7.30.46.1
php5-soap-5.2.14-0.7.30.46.1
php5-suhosin-5.2.14-0.7.30.46.1
php5-sysvmsg-5.2.14-0.7.30.46.1
php5-sysvsem-5.2.14-0.7.30.46.1
php5-sysvshm-5.2.14-0.7.30.46.1
php5-tokenizer-5.2.14-0.7.30.46.1
php5-wddx-5.2.14-0.7.30.46.1
php5-xmlreader-5.2.14-0.7.30.46.1
php5-xmlrpc-5.2.14-0.7.30.46.1
php5-xmlwriter-5.2.14-0.7.30.46.1
php5-xsl-5.2.14-0.7.30.46.1
php5-zip-5.2.14-0.7.30.46.1
php5-zlib-5.2.14-0.7.30.46.1
- SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64):
apache2-mod_php5-5.2.14-0.7.30.46.1
php5-5.2.14-0.7.30.46.1
php5-bcmath-5.2.14-0.7.30.46.1
php5-bz2-5.2.14-0.7.30.46.1
php5-calendar-5.2.14-0.7.30.46.1
php5-ctype-5.2.14-0.7.30.46.1
php5-curl-5.2.14-0.7.30.46.1
php5-dba-5.2.14-0.7.30.46.1
php5-dbase-5.2.14-0.7.30.46.1
php5-dom-5.2.14-0.7.30.46.1
php5-exif-5.2.14-0.7.30.46.1
php5-fastcgi-5.2.14-0.7.30.46.1
php5-ftp-5.2.14-0.7.30.46.1
php5-gd-5.2.14-0.7.30.46.1
php5-gettext-5.2.14-0.7.30.46.1
php5-gmp-5.2.14-0.7.30.46.1
php5-hash-5.2.14-0.7.30.46.1
php5-iconv-5.2.14-0.7.30.46.1
php5-json-5.2.14-0.7.30.46.1
php5-ldap-5.2.14-0.7.30.46.1
php5-mbstring-5.2.14-0.7.30.46.1
php5-mcrypt-5.2.14-0.7.30.46.1
php5-mysql-5.2.14-0.7.30.46.1
php5-odbc-5.2.14-0.7.30.46.1
php5-openssl-5.2.14-0.7.30.46.1
php5-pcntl-5.2.14-0.7.30.46.1
php5-pdo-5.2.14-0.7.30.46.1
php5-pear-5.2.14-0.7.30.46.1
php5-pgsql-5.2.14-0.7.30.46.1
php5-pspell-5.2.14-0.7.30.46.1
php5-shmop-5.2.14-0.7.30.46.1
php5-snmp-5.2.14-0.7.30.46.1
php5-soap-5.2.14-0.7.30.46.1
php5-suhosin-5.2.14-0.7.30.46.1
php5-sysvmsg-5.2.14-0.7.30.46.1
php5-sysvsem-5.2.14-0.7.30.46.1
php5-sysvshm-5.2.14-0.7.30.46.1
php5-tokenizer-5.2.14-0.7.30.46.1
php5-wddx-5.2.14-0.7.30.46.1
php5-xmlreader-5.2.14-0.7.30.46.1
php5-xmlrpc-5.2.14-0.7.30.46.1
php5-xmlwriter-5.2.14-0.7.30.46.1
php5-xsl-5.2.14-0.7.30.46.1
php5-zip-5.2.14-0.7.30.46.1
php5-zlib-5.2.14-0.7.30.46.1
References:
http://support.novell.com/security/cve/CVE-2011-1398.html
http://support.novell.com/security/cve/CVE-2011-4388.html
https://bugzilla.novell.com/775852
https://bugzilla.novell.com/778003
http://download.novell.com/patch/finder/?keywords=0759510e67ebbcbf558fe4298c9251a6
--
To unsubscribe, e-mail: Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
For additional commands, e-mail: Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
Posljednje sigurnosne preporuke