Rapid7 Vulnerability & Exploit Database

SuSE 9.1 security update for php4

Back to Search

SuSE 9.1 security update for php4

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
11/01/2004
Created
07/25/2018
Added
11/01/2004
Modified
11/18/2015

Description

The system is missing one or more SuSE security patches. Note: After this update php4-recode can no longer be used at the same time as php4-mysql, php4-imap or apache2-mod_auth_mysql due to the RTLD_GLOBAL fixes. Please refer to /usr/share/doc/packages/php4/README.SuSE for details. This update fixes four security issues. The first and less important bug can be exploited by remote attackers to bypass HTML tag filtering (cross-site-scripting prevention) by supplying special tags. These kind of tags should be ignored because they are not valid but they get accepted by some commercial web-browsers. The second bug can be exploited by remote attackers by triggering the memory_limit in unsafe states of a PHP execution path to execute arbitrary code. The third and fourth bug depend in bad array parsing of the user input via GET, POST and COOKIE. One could lead to overwriting variable $_FILES, while the other could expose some pieces of the php memory to the attacker. Moreover, the dlopen() flag for opening php4 modules has been reverted back to RTLD_GLOBAL, as RTDL_LOCAL had some side effects when extensions like php4-unixODBC load their own libraries (unixODBC uses RTLD_GLOBAL).

Solution(s)

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;