Rapid7 Vulnerability & Exploit Database

RHSA-2013:1615: php security, bug fix, and enhancement update

Back to Search

RHSA-2013:1615: php security, bug fix, and enhancement update

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:P/I:N/A:N)
Published
03/06/2013
Created
07/25/2018
Added
11/21/2013
Modified
07/04/2017

Description

PHP is an HTML-embedded scripting language commonly used with the ApacheHTTP Server.It was found that PHP did not properly handle file names with a NULLcharacter. A remote attacker could possibly use this flaw to make a PHPscript access unexpected files and bypass intended file system accessrestrictions. (CVE-2006-7243)A flaw was found in PHP's SSL client's hostname identity check whenhandling certificates that contain hostnames with NULL bytes. If anattacker was able to get a carefully crafted certificate signed by atrusted Certificate Authority, the attacker could use the certificate toconduct man-in-the-middle attacks to spoof SSL servers. (CVE-2013-4248)It was found that the PHP SOAP parser allowed the expansion of external XMLentities during SOAP message parsing. A remote attacker could possibly usethis flaw to read arbitrary files that are accessible to a PHP applicationusing a SOAP extension. (CVE-2013-1643)This update fixes the following bugs:In addition, this update adds the following enhancement:Users of php are advised to upgrade to these updated packages, which fixthese bugs and add this enhancement. After installing the updated packages,the httpd daemon must be restarted for the update to take effect.

Solution(s)

  • redhat-upgrade-php
  • redhat-upgrade-php-bcmath
  • redhat-upgrade-php-cli
  • redhat-upgrade-php-common
  • redhat-upgrade-php-dba
  • redhat-upgrade-php-debuginfo
  • redhat-upgrade-php-devel
  • redhat-upgrade-php-embedded
  • redhat-upgrade-php-enchant
  • redhat-upgrade-php-fpm
  • redhat-upgrade-php-gd
  • redhat-upgrade-php-imap
  • redhat-upgrade-php-intl
  • redhat-upgrade-php-ldap
  • redhat-upgrade-php-mbstring
  • redhat-upgrade-php-mysql
  • redhat-upgrade-php-odbc
  • redhat-upgrade-php-pdo
  • redhat-upgrade-php-pgsql
  • redhat-upgrade-php-process
  • redhat-upgrade-php-pspell
  • redhat-upgrade-php-recode
  • redhat-upgrade-php-snmp
  • redhat-upgrade-php-soap
  • redhat-upgrade-php-tidy
  • redhat-upgrade-php-xml
  • redhat-upgrade-php-xmlrpc
  • redhat-upgrade-php-zts

References

  • redhat-upgrade-php
  • redhat-upgrade-php-bcmath
  • redhat-upgrade-php-cli
  • redhat-upgrade-php-common
  • redhat-upgrade-php-dba
  • redhat-upgrade-php-debuginfo
  • redhat-upgrade-php-devel
  • redhat-upgrade-php-embedded
  • redhat-upgrade-php-enchant
  • redhat-upgrade-php-fpm
  • redhat-upgrade-php-gd
  • redhat-upgrade-php-imap
  • redhat-upgrade-php-intl
  • redhat-upgrade-php-ldap
  • redhat-upgrade-php-mbstring
  • redhat-upgrade-php-mysql
  • redhat-upgrade-php-odbc
  • redhat-upgrade-php-pdo
  • redhat-upgrade-php-pgsql
  • redhat-upgrade-php-process
  • redhat-upgrade-php-pspell
  • redhat-upgrade-php-recode
  • redhat-upgrade-php-snmp
  • redhat-upgrade-php-soap
  • redhat-upgrade-php-tidy
  • redhat-upgrade-php-xml
  • redhat-upgrade-php-xmlrpc
  • redhat-upgrade-php-zts

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;