RHSA-2007:0355 - Security Advisory
Important: php security update
Security Advisory: Important
Updated PHP packages that fix several security issues are now available for
Red Hat Application Stack.
This update has been rated as having important security impact by the Red
Hat Security Response Team.
PHP is an HTML-embedded scripting language commonly used with the Apache
HTTP Web server.
A heap buffer overflow flaw was found in the PHP 'xmlrpc' extension. A
PHP script which implements an XML-RPC server using this extension
could allow a remote attacker to execute arbitrary code as the 'apache'
user. Note that this flaw does not affect PHP applications using the
pure-PHP XML_RPC class provided in /usr/share/pear. (CVE-2007-1864)
A flaw was found in the PHP 'ftp' extension. If a PHP script used this
extension to provide access to a private FTP server, and passed untrusted
script input directly to any function provided by this extension, a remote
attacker would be able to send arbitrary FTP commands to the server.
A buffer overflow flaw was found in the PHP 'soap' extension, regarding the
handling of an HTTP redirect response when using the SOAP client provided
by this extension with an untrusted SOAP server. No mechanism to trigger
this flaw remotely is known. (CVE-2007-2510)
Users of PHP should upgrade to these updated packages which contain
backported patches to correct these issues.
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
- Red Hat Application Stack 1 1 x86_64
- Red Hat Application Stack 1 1 i386
- BZ - 239020 - CVE-2007-1864 various PHP security issues (CVE-2007-2509 CVE-2007-2510)
Red Hat Application Stack 1 1