-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ______________________________________________________________________________ Caldera International, Inc. Security Advisory Subject: Linux: REVISED: PHP multipart/form-data vulnerabilities Advisory number: CSSA-2002-023.1 Issue date: 2002 August 07 Cross reference: ______________________________________________________________________________ 1. Problem Description Several flaws have been found in the way PHP handles multipart/form-data POST requests. Each of the flaws could allow an attacker to execute arbitrary code on the victim's system. The packages for this updated advisory (CSSA-2002-023.1) resolve a possible problem with installation, with the installation script failing, and subsequent examination of the RPM database would show it to be corrupted. The updated packages also allow co-existence with the Volution Messaging Server. 2. Vulnerable Supported Versions System Package ---------------------------------------------------------------------- OpenLinux 3.1.1 Server prior to php-4.0.6-4.i386.rpm prior to php-doc-4.0.6-4.i386.rpm OpenLinux 3.1.1 Workstation prior to php-4.0.6-4.i386.rpm prior to php-doc-4.0.6-4.i386.rpm OpenLinux 3.1 Server prior to php-4.0.6-4.i386.rpm prior to php-doc-4.0.6-4.i386.rpm OpenLinux 3.1 Workstation prior to php-4.0.6-4.i386.rpm prior to php-doc-4.0.6-4.i386.rpm 3. Solution The proper solution is to install the latest packages. Many customers find it easier to use the Caldera System Updater, called cupdate (or kcupdate under the KDE environment), to update these packages rather than downloading and installing them by hand. 4. OpenLinux 3.1.1 Server 4.1 Package Location ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1.1/Server/CSSA-2002-023.1/RPMS 4.2 Packages b6c4a60b2aa1dfbfd5eea2d73bac009c php-4.0.6-4.i386.rpm b7810fd8edaf0a9875fe3ddd7c45e2bb php-doc-4.0.6-4.i386.rpm 4.3 Installation rpm -Fvh php-4.0.6-4.i386.rpm rpm -Fvh php-doc-4.0.6-4.i386.rpm 4.4 Source Package Location ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1.1/Server/CSSA-2002-023.1/SRPMS 4.5 Source Packages 35a4f2e4b3b63442383aa6f645170c44 php-4.0.6-4.src.rpm 5. OpenLinux 3.1.1 Workstation 5.1 Package Location ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1.1/Workstation/CSSA-2002-023.1/RPMS 5.2 Packages 038b647978b1f607c9c2fd1a18a2e034 php-4.0.6-4.i386.rpm 8347cc0b299a293a0cacea5b77591db0 php-doc-4.0.6-4.i386.rpm 5.3 Installation rpm -Fvh php-4.0.6-4.i386.rpm rpm -Fvh php-doc-4.0.6-4.i386.rpm 5.4 Source Package Location ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1.1/Workstation/CSSA-2002-023.1/SRPMS 5.5 Source Packages a546510c8d693fea21bf2bb5b2969e47 php-4.0.6-4.src.rpm 6. OpenLinux 3.1 Server 6.1 Package Location ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1/Server/CSSA-2002-023.1/RPMS 6.2 Packages 37681ffd433b3939400b94fcfe9e8217 php-4.0.6-4.i386.rpm 13123f111eb63760ac4c45765cb810ba php-doc-4.0.6-4.i386.rpm 6.3 Installation rpm -Fvh php-4.0.6-4.i386.rpm rpm -Fvh php-doc-4.0.6-4.i386.rpm 6.4 Source Package Location ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1/Server/CSSA-2002-023.1/SRPMS 6.5 Source Packages df4e0d0d4a6b0f636320cda0112dffd3 php-4.0.6-4.src.rpm 7. OpenLinux 3.1 Workstation 7.1 Package Location ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1/Workstation/CSSA-2002-023.1/RPMS 7.2 Packages e7175b73a2758efb1cfe36806f6ae812 php-4.0.6-4.i386.rpm d9dd669f89a7897341c3e9599daaae97 php-doc-4.0.6-4.i386.rpm 7.3 Installation rpm -Fvh php-4.0.6-4.i386.rpm rpm -Fvh php-doc-4.0.6-4.i386.rpm 7.4 Source Package Location ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1/Workstation/CSSA-2002-023.1/SRPMS 7.5 Source Packages aedf02dcc3a98acfb2b9e66443db6896 php-4.0.6-4.src.rpm 8. References Specific references for this advisory: http://www.kb.cert.org/vuls/id/297363 http://bugs.php.net/bug.php?id=15736 http://security.e-matters.de/advisories/012002.html Caldera security resources: http://www.caldera.com/support/security/index.html This security fix closes Caldera incidents sr861013, fz520246, fz521639, erg711976, erg711968, erg712096. 9. Disclaimer Caldera International, Inc. is not responsible for the misuse of any of the information we provide on this website and/or through our security advisories. Our advisories are a service to our customers intended to promote secure installation and use of Caldera products. 10. Acknowledgements Stefan Esser (s.esser@e-matters.de) reported these vulnerabilities. ______________________________________________________________________________ -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (GNU/Linux) Comment: For info see http://www.gnupg.org iEYEARECAAYFAj1RjD0ACgkQbluZssSXDTGL5wCfb7E+GVlncPR8Ui0ikucHlP1r X4kAoPlLbj5J5n2igYz+FVvTmeTp+9W1 =FQE0 -----END PGP SIGNATURE-----