copyright | disclaimer | privacy | contact  
Australia's Leading Computer Emergency Response Team
 
Search this site

 
On this site

 > HOME
 > About AusCERT
 > Membership
 > Contact Us
 > PKI Services
 > Publications
 > Sec. Bulletins
 > Conferences
 > News & Media
 > Services
 > Web Log
 > Site Map
 > Site Help
 > Member login





 

ESB-2014.0991 - [Win][UNIX/Linux][Debian] php5: Execute arbitrary code/commands - Remote/unauthenticated

Date: 17 June 2014
References: ESB-2014.1331  ESB-2014.1429  ESB-2014.1431  ESB-2014.1617  ESB-2014.2005  ESB-2016.1572  

Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2014.0991
                           php5 security update
                               17 June 2014

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           php5
Publisher:         Debian
Operating System:  Debian GNU/Linux 7
                   UNIX variants (UNIX, Linux, OSX)
                   Windows
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2014-4049  

Original Bulletin: 
   http://www.debian.org/security/2014/dsa-2961

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than Debian. It is recommended that administrators 
         running php5 check for an updated version of the software for their
         operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-2961-1                   security@debian.org
http://www.debian.org/security/                      Salvatore Bonaccorso
June 16, 2014                          http://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : php5
CVE ID         : CVE-2014-4049
Debian Bug     : 751364

It was discovered that PHP, a general-purpose scripting language
commonly used for web application development, is vulnerable to a
heap-based buffer overflow in the DNS TXT record parsing. A malicious
server or man-in-the-middle attacker could possibly use this flaw to
execute arbitrary code as the PHP interpreter if a PHP application uses
dns_get_record() to perform a DNS query.

For the stable distribution (wheezy), this problem has been fixed in
version 5.4.4-14+deb7u11.

For the testing distribution (jessie), this problem has been fixed in
version 5.6.0~beta4+dfsg-3.

For the unstable distribution (sid), this problem has been fixed in
version 5.6.0~beta4+dfsg-3.

We recommend that you upgrade your php5 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=dJZx
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=cFEn
-----END PGP SIGNATURE-----