[Secure-testing-commits] r5683 - in data: . CVE patches/MOPB/php4-etch patches/MOPB/php4-sarge

Moritz Muehlenhoff jmm-guest at alioth.debian.org
Thu Apr 19 20:58:00 UTC 2007


Author: jmm-guest
Date: 2007-04-19 20:57:57 +0000 (Thu, 19 Apr 2007)
New Revision: 5683

Added:
   data/patches/MOPB/php4-etch/074-CVE-2007-1286-MOPB-04.patch
   data/patches/MOPB/php4-sarge/CVE-2007-1286-MOPB-04.patch
Modified:
   data/CVE/list
   data/mopb.txt
Log:
more php4 updates


Modified: data/CVE/list
===================================================================
--- data/CVE/list	2007-04-19 20:50:22 UTC (rev 5682)
+++ data/CVE/list	2007-04-19 20:57:57 UTC (rev 5683)
@@ -847,6 +847,7 @@
 	NOT-FOR-US: mcweject
 CVE-2007-1718 (CRLF injection vulnerability in the mail function in PHP 4.0.0 through ...)
 	- php4 <unfixed> (medium)
+	[sarge] - php4 <not-affected> (Vulnerable code not present)
 	- php5 <unfixed> (medium)
 CVE-2007-1717 (The mail function in PHP 4.0.0 through 4.4.6 and 5.0.0 through 5.2.1 ...)
 	- php4 <unfixed> (unimportant)

Modified: data/mopb.txt
===================================================================
--- data/mopb.txt	2007-04-19 20:50:22 UTC (rev 5682)
+++ data/mopb.txt	2007-04-19 20:57:57 UTC (rev 5683)
@@ -16,12 +16,8 @@
 26  PHP mb_parse_str() register_globals Activation Vulnerability
 #TODO(medium) -> functionally enables register_globals for any future requests, CVE-2007-1583 (php4 & php5, enables stealth register_globals for life of process)
 
-23  PHP 5 Rejected Session Identifier Double Free Vulnerability
-#TODO(medium) -> locally exploitable to gain access to process memory, hard to do remotely, CVE-2007-1522. (php5 5.2.0+, code execution)
-
 22  PHP session_regenerate_id() Double Free Vulnerability
 #TODO(medium) -> locally exploitable to gain access to process memory, hard to do remotely, CVE-2007-1521 (php4 & php5, code execution)
-[MOPB-22-php4.diff]
 [MOPB-22-php5.diff]
 
 10  PHP php_binary Session Deserialization Information Leak  Vulnerability
@@ -59,6 +55,9 @@
 #TODO(medium) -> needs to be fixed, CVE-2007-1824 (php5, remote code execution, though haven't reproduced it)
 [MOPB-42-php5.diff]
 
+23  PHP 5 Rejected Session Identifier Double Free Vulnerability
+#TODO(medium) -> locally exploitable to gain access to process memory, hard to do remotely, CVE-2007-1522. (php5 5.2.0+, code execution)
+
 19 PHP ext/filter Space Trimming Buffer Underflow Vulnerability
 #TODO(medium) -> for PHP5. CVE-2007-1453 (php5 5.2.0 only, code execution on big endian)
 
@@ -176,16 +175,15 @@
 # php4 checklist
 
    Sarge Etch
-41
-35
-32
+41   ?    ?
+35   ?    ?
 34   /    a
-30
+32   a    a 
+30   
 26
-23
-22
+22   a    a
 10   a    a
-04
+04   a    a
 
 ? = more info
 x = fix needed

Added: data/patches/MOPB/php4-etch/074-CVE-2007-1286-MOPB-04.patch
===================================================================
--- data/patches/MOPB/php4-etch/074-CVE-2007-1286-MOPB-04.patch	2007-04-19 20:50:22 UTC (rev 5682)
+++ data/patches/MOPB/php4-etch/074-CVE-2007-1286-MOPB-04.patch	2007-04-19 20:57:57 UTC (rev 5683)
@@ -0,0 +1,24 @@
+--- php4/ext/standard/var_unserializer.c	2006/08/09 23:29:17	1.18.4.24.2.7
++++ php4-4.4.4/ext/standard/var_unserializer.c	2006/10/27 08:35:25	1.18.4.24.2.8
+@@ -958,6 +958,10 @@
+ 	
+ 	if (*rval == *rval_ref) return 0;
+ 
++	if ((*rval_ref)->refcount > 65500) {
++		return 0;
++	}
++
+ 	if (*rval != NULL) {
+ 	zval_ptr_dtor(rval);
+ 	}
+@@ -999,6 +1003,10 @@
+ 
+ 	id = parse_iv(start + 2) - 1;
+ 	if (id == -1 || var_access(var_hash, id, &rval_ref) != SUCCESS) {
++		return 0;
++	}
++
++	if ((*rval_ref)->refcount > 65500) {
+ 		return 0;
+ 	}
+ 

Added: data/patches/MOPB/php4-sarge/CVE-2007-1286-MOPB-04.patch
===================================================================
--- data/patches/MOPB/php4-sarge/CVE-2007-1286-MOPB-04.patch	2007-04-19 20:50:22 UTC (rev 5682)
+++ data/patches/MOPB/php4-sarge/CVE-2007-1286-MOPB-04.patch	2007-04-19 20:57:57 UTC (rev 5683)
@@ -0,0 +1,24 @@
+--- php4/ext/standard/var_unserializer.c	2006/08/09 23:29:17	1.18.4.24.2.7
++++ php4-4.3.10/ext/standard/var_unserializer.c	2006/10/27 08:35:25	1.18.4.24.2.8
+@@ -958,6 +958,10 @@
+ 	
+ 	if (*rval == *rval_ref) return 0;
+ 
++	if ((*rval_ref)->refcount > 65500) {
++		return 0;
++	}
++
+ 	if (*rval != NULL) {
+ 	zval_ptr_dtor(rval);
+ 	}
+@@ -999,6 +1003,10 @@
+ 
+ 	id = parse_iv(start + 2) - 1;
+ 	if (id == -1 || var_access(var_hash, id, &rval_ref) != SUCCESS) {
++		return 0;
++	}
++
++	if ((*rval_ref)->refcount > 65500) {
+ 		return 0;
+ 	}
+ 




More information about the Secure-testing-commits mailing list