USN-1042-1: PHP vulnerabilities

Ubuntu Security Notice USN-1042-1

11th January, 2011

php5 vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 10.10
  • Ubuntu 10.04 LTS
  • Ubuntu 9.10
  • Ubuntu 8.04 LTS
  • Ubuntu 6.06 LTS

Software description

  • php5

Details

It was discovered that an integer overflow in the XML UTF-8 decoding
code could allow an attacker to bypass cross-site scripting (XSS)
protections. This issue only affected Ubuntu 6.06 LTS, Ubuntu 8.04 LTS,
and Ubuntu 9.10. (CVE-2009-5016)

It was discovered that the XML UTF-8 decoding code did not properly
handle non-shortest form UTF-8 encoding and ill-formed subsequences
in UTF-8 data, which could allow an attacker to bypass cross-site
scripting (XSS) protections. (CVE-2010-3870)

It was discovered that attackers might be able to bypass open_basedir()
restrictions by passing a specially crafted filename. (CVE-2010-3436)

Maksymilian Arciemowicz discovered that a NULL pointer derefence in the
ZIP archive handling code could allow an attacker to cause a denial
of service through a specially crafted ZIP archive. This issue only
affected Ubuntu 8.04 LTS, Ubuntu 9.10, Ubuntu 10.04 LTS, and Ubuntu
10.10. (CVE-2010-3709)

It was discovered that a stack consumption vulnerability in the
filter_var() PHP function when in FILTER_VALIDATE_EMAIL mode, could
allow a remote attacker to cause a denial of service. This issue
only affected Ubuntu 8.04 LTS, Ubuntu 9.10, Ubuntu 10.04 LTS, and
Ubuntu 10.10. (CVE-2010-3710)

It was discovered that the mb_strcut function in the Libmbfl
library within PHP could allow an attacker to read arbitrary memory
within the application process. This issue only affected Ubuntu
10.10. (CVE-2010-4156)

Maksymilian Arciemowicz discovered that an integer overflow in the
NumberFormatter::getSymbol function could allow an attacker to cause
a denial of service. This issue only affected Ubuntu 10.04 LTS and
Ubuntu 10.10. (CVE-2010-4409)

Rick Regan discovered that when handing PHP textual representations
of the largest subnormal double-precision floating-point number,
the zend_strtod function could go into an infinite loop on 32bit
x86 processors, allowing an attacker to cause a denial of service.
(CVE-2010-4645)

Update instructions

The problem can be corrected by updating your system to the following package version:

Ubuntu 10.10:
php5-cli 5.3.3-1ubuntu9.2
php5-cgi 5.3.3-1ubuntu9.2
libapache2-mod-php5 5.3.3-1ubuntu9.2
Ubuntu 10.04 LTS:
php5-cli 5.3.2-1ubuntu4.6
php5-cgi 5.3.2-1ubuntu4.6
libapache2-mod-php5 5.3.2-1ubuntu4.6
Ubuntu 9.10:
php5-cli 5.2.10.dfsg.1-2ubuntu6.6
php5-cgi 5.2.10.dfsg.1-2ubuntu6.6
libapache2-mod-php5 5.2.10.dfsg.1-2ubuntu6.6
Ubuntu 8.04 LTS:
php5-cli 5.2.4-2ubuntu5.13
php5-cgi 5.2.4-2ubuntu5.13
libapache2-mod-php5 5.2.4-2ubuntu5.13
Ubuntu 6.06 LTS:
php5-cli 5.1.2-1ubuntu3.20
php5-cgi 5.1.2-1ubuntu3.20
libapache2-mod-php5 5.1.2-1ubuntu3.20

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2009-5016, CVE-2010-3436, CVE-2010-3709, CVE-2010-3710, CVE-2010-3870, CVE-2010-4156, CVE-2010-4409, CVE-2010-4645