aboutsummaryrefslogtreecommitdiffstats
path: root/polish/security/2004/dsa-531.wml
blob: b657433183ec653db4b78397071bdd79fd42d4dc (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
#use wml::debian::translation-check translation="1.1" maintainer=""
#pddp rafalm80
<define-tag description>several vulnerabilities</define-tag>
<define-tag moreinfo>
<p>Two vulnerabilities were discovered in php4:</p>

<ul>

<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0594">CAN-2004-0594</a>
   <p>The memory_limit functionality in PHP 4.x up to
   4.3.7, and 5.x up to 5.0.0RC3, under certain conditions such as
   when register_globals is enabled, allows remote attackers to
   execute arbitrary code by triggering a memory_limit abort during
   execution of the zend_hash_init function and overwriting a
   HashTable destructor pointer before the initialization of key data
   structures is complete.</p>

<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0595">CAN-2004-0595</a>
   <p>The strip_tags function in PHP 4.x up to 4.3.7, and
   5.x up to 5.0.0RC3, does not filter null (\0) characters within tag
   names when restricting input to allowed tags, which allows
   dangerous tags to be processed by web browsers such as Internet
   Explorer and Safari, which ignore null characters and facilitate
   the exploitation of cross-site scripting (XSS) vulnerabilities.</p>

</ul>

<p>For the current stable distribution (woody), these problems have been
fixed in version 4.1.2-7.</p>

<p>For the unstable distribution (sid), these problems have been fixed in
version 4:4.3.8-1.</p>

<p>We recommend that you update your php4 package.</p>
</define-tag>

# do not modify the following line
#include "$(ENGLISHDIR)/security/2004/dsa-531.data"

© 2014-2024 Faster IT GmbH | imprint | privacy policy