[Secure-testing-commits] r5662 - in data: . CVE
Moritz Muehlenhoff
jmm-guest at alioth.debian.org
Tue Apr 17 21:57:42 UTC 2007
Author: jmm-guest
Date: 2007-04-17 21:57:39 +0000 (Tue, 17 Apr 2007)
New Revision: 5662
Modified:
data/CVE/list
data/mopb.txt
Log:
update another PHP local code execution entry
treat asciiz truncation is a regular bug, this is a security problem
in broken setups
Modified: data/CVE/list
===================================================================
--- data/CVE/list 2007-04-17 21:31:14 UTC (rev 5661)
+++ data/CVE/list 2007-04-17 21:57:39 UTC (rev 5662)
@@ -1116,9 +1116,9 @@
CVE-2007-1485 (** DISPUTED ** ...)
NOT-FOR-US: LIBFtp
CVE-2007-1484 (The array_user_key_compare function in PHP 4.4.6 and earlier, and 5.x ...)
- - php4 <unfixed> (medium)
- - php5 <unfixed> (medium)
- NOTE: local malicious scripts only, but allows arbitrary process memory access
+ - php4 <unfixed> (unimportant)
+ - php5 <unfixed> (unimportant)
+ NOTE: local malicious scripts only
CVE-2007-1483 (Multiple PHP remote file inclusion vulnerabilities in WebCalendar ...)
- webcalendar 1.0.5-1 (high)
CVE-2007-1482 (Cross-site scripting (XSS) vulnerability in index.php in WBBlog allows ...)
Modified: data/mopb.txt
===================================================================
--- data/mopb.txt 2007-04-17 21:31:14 UTC (rev 5661)
+++ data/mopb.txt 2007-04-17 21:57:39 UTC (rev 5662)
@@ -35,7 +35,7 @@
#TODO(medium) -> needs to be fixed, CVE-2007-1718 (php4 & php5, header injection possible via some MTAs when set to process the headers for recipients)
33 PHP mail() Message ASCIIZ Byte Truncation
-#TODO(low) -> applications could end up vulnerable to phishing attacks if attackers injected a nearly correct-looking email content prior to the NULL byte, CVE-2007-1717 (php4 & php5, possible phishing or other impersonation possible, though this problem is really a problem with the application allowing unsanitized inputs)
+N/A This is a bug, but not security-relevant, CVE-2007-1717 (php4 & php5)
32 PHP 4.4.5/4.4.6 session_decode() Double Free Vulnerability (U)
TODO(medium) -> needs to be fixed in php/etch, sarge not affected (php4 4.4.5/4.4.6, remote code execution)
@@ -62,7 +62,7 @@
#Fixed in Etch as part of the 5.2.1 backport, dupe CVE-2007-0907/CVE-2007-1584
24 PHP array_user_key_compare() Double DTOR Vulnerability
-#TODO(medium) -> locally exploitable to gain access to process memory (not remote), CVE-2007-1484 (php4 & php5, code execution)
+N/A Only triggerable by malicious script, CVE-2007-1484 (php4 & php5, code execution)
23 PHP 5 Rejected Session Identifier Double Free Vulnerability
#TODO(medium) -> locally exploitable to gain access to process memory, hard to do remotely, CVE-2007-1522. (php5 5.2.0+, code execution)
More information about the Secure-testing-commits
mailing list