diff options
author | Oliver Eikemeier <eik@FreeBSD.org> | 2004-07-15 08:01:25 +0000 |
---|---|---|
committer | Oliver Eikemeier <eik@FreeBSD.org> | 2004-07-15 08:01:25 +0000 |
commit | c3620917d94af7f1840bdc392aecfaf1e145d199 (patch) | |
tree | d7df15931815bf38ac573b99c90dac8bd95f2f30 /security | |
parent | 6b6400b515cb6d5fd56c53ea4690adae087dde20 (diff) |
Notes
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 52 |
1 files changed, 52 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index e3236d8e425b..65703c0f9034 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -1305,6 +1305,7 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. <cvename>CAN-2004-0421</cvename> <url>http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=120508</url> <url>http://rhn.redhat.com/errata/RHSA-2004-181.html</url> + <url>http://secunia.com/advisories/11505</url> <url>http://www.osvdb.org/5726</url> <bid>10244</bid> </references> @@ -3973,4 +3974,55 @@ misc.c: <entry>2004-07-11</entry> </dates> </vuln> + + <vuln vid="4764cfd6-d630-11d8-b479-02e0185c0b53"> + <topic>PHP memory_limit and strip_tags() vulnerabilities</topic> + <affects> + <package> + <name>php4</name> + <name>php4-{cgi,cli,dtc,horde,nms}</name> + <name>mod_php4-twig</name> + <range><lt>4.3.8</lt></range> + </package> + <package> + <name>mod_php4</name> + <range><lt>4.3.8,1</lt></range> + </package> + <package> + <name>php5</name> + <name>php5-{cgi,cli}</name> + <range><lt>5.0.0</lt></range> + </package> + <package> + <name>mod_php5</name> + <range><lt>5.0.0,1</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Stefan Esser has reported two vulnerabilities in PHP, which can + be exploited by malicious people to bypass security functionality + or compromise a vulnerable system. An error within PHP's memory_limit + request termination allows remote code execution on PHP servers + with activated memory_limit. A binary safety problem within PHP's + strip_tags() function may allow injection of arbitrary tags in + Internet Explorer and Safari browsers.</p> + </body> + </description> + <references> + <url>http://www.php.net/ChangeLog-4.php</url> + <url>http://www.php.net/ChangeLog-5.php</url> + <url>http://security.e-matters.de/advisories/112004.html</url> + <url>http://security.e-matters.de/advisories/122004.html</url> + <url>http://secunia.com/advisories/12064</url> + <url>http://www.osvdb.org/7870</url> + <url>http://www.osvdb.org/7871</url> + <cvename>CAN-2004-0594</cvename> + <cvename>CAN-2004-0595</cvename> + </references> + <dates> + <discovery>2007-07-07</discovery> + <entry>2004-07-15</entry> + </dates> + </vuln> </vuxml> |