USN-761-2: PHP vulnerabilities
27 April 2009
PHP vulnerabilities
Releases
Packages
- php5 -
Details
USN-761-1 fixed vulnerabilities in PHP.
This update provides the corresponding updates for Ubuntu 9.04.
Original advisory details:
It was discovered that PHP did not sanitize certain error messages when
display_errors is enabled, which could result in browsers becoming
vulnerable to cross-site scripting attacks when processing the output.
With cross-site scripting vulnerabilities, if a user were tricked into
viewing server output during a crafted server request, a remote attacker
could exploit this to modify the contents, or steal confidential data
(such as passwords), within the same domain. (CVE-2008-5814)
It was discovered that PHP did not properly handle certain malformed
strings when being parsed by the json_decode function. A remote attacker
could exploit this flaw and cause the PHP server to crash, resulting in a
denial of service. This issue only affected Ubuntu 8.04 and 8.10.
(CVE-2009-1271)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 9.04
-
php5-cli
-
5.2.6.dfsg.1-3ubuntu4.1
-
php5-cgi
-
5.2.6.dfsg.1-3ubuntu4.1
-
libapache2-mod-php5
-
5.2.6.dfsg.1-3ubuntu4.1
In general, a standard system upgrade is sufficient to effect the
necessary changes.
References
Related notices
- USN-761-1: libapache2-mod-php5, php5, php5-cli, php5-cgi