Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:18461
HistoryNov 20, 2007 - 12:00 a.m.

rPSA-2007-0242-1 php5 php5-cgi php5-mysql php5-pear php5-pgsql php5-soap php5-xsl

2007-11-2000:00:00
vulners.com
24

rPath Security Advisory: 2007-0242-1
Published: 2007-11-19
Products:
rPath Appliance Platform Linux Service 1
rPath Linux 1

Rating: Minor
Exposure Level Classification:
Remote Deterministic Denial of Service
Updated Versions:
php5=conary.rpath.com@rpl:1/5.2.5-1-1
php5-cgi=conary.rpath.com@rpl:1/5.2.5-1-1
php5-mysql=conary.rpath.com@rpl:1/5.2.5-1-1
php5-pear=conary.rpath.com@rpl:1/5.2.5-1-1
php5-pgsql=conary.rpath.com@rpl:1/5.2.5-1-1
php5-soap=conary.rpath.com@rpl:1/5.2.5-1-1
php5-xsl=conary.rpath.com@rpl:1/5.2.5-1-1

rPath Issue Tracking System:
https://issues.rpath.com/browse/RPL-1943

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4887
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4783
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4840
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5898
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5899
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5900

Description:
Previous versions of the php5 package contain multiple vulnerabilities,
the most serious of which involve several Denial of Service attacks
(application crashes and temporary application hangs). It is not
currently known that these vulnerabilities can be exploited to execute
malicious code.

In its default configuration, rPath Linux 1 does not install php5 and
is thus not vulnerable; however, systems upon which php5 and an exposed
application have been installed may be vulnerable.

http://wiki.rpath.com/Advisories:rPSA-2007-0242

Copyright 2007 rPath, Inc.
This file is distributed under the terms of the MIT License.
A copy is available at http://www.rpath.com/permanent/mit-license.html