Description: | Description:
The remote host is missing updates announced in advisory RHSA-2006:0567.
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Web server.
A flaw was found in the zend_hash_del() PHP function. For PHP scripts that rely on the use of the unset() function, a remote attacker could force variable initialization to be bypassed. This would be a security issue particularly for installations that enable the register_globals setting. register_globals is disabled by default in Red Hat Enterprise Linux. (CVE-2006-3017)
A directory traversal vulnerability was found in PHP. Local users could bypass open_basedir restrictions allowing remote attackers to create files in arbitrary directories via the tempnam() function. (CVE-2006-1494)
A flaw was found in the PHP IMAP MIME header decoding function. An attacker could craft a message with an overly long header which caused PHP to crash. (CVE-2002-2214)
Users of PHP should upgrade to these updated packages, which contain backported patches that resolve these issues.
Solution: Please note that this update is available via Red Hat Network. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date
http://rhn.redhat.com/errata/RHSA-2006-0567.html http://www.php.net/register_globals http://www.redhat.com/security/updates/classification/#moderate
Risk factor : Critical
CVSS Score: 9.3
|