USN-112-1: PHP4 vulnerabilities
Publication date
14 April 2005
Overview
PHP4 vulnerabilities
Releases
Details
An integer overflow was discovered in the exif_process_IFD_TAG()
function in PHP4’s EXIF module. EXIF tags with a specially crafted
“Image File Directory” (IFD) tag caused a buffer overflow which could
have been exploited to execute arbitrary code with the privileges of
the PHP4 server. (CAN-2005-1042)
The same module also contained a Denial of Service vulnerability. EXIF
headers with a large IFD nesting level caused an unbound recursion
which would eventually overflow the stack and cause the executed
program to crash. (CAN-2005-1043)
In web applications that automatically process EXIF tags of uploaded
images, both vulnerabilities could be exploited remotely.
An integer overflow was discovered in the exif_process_IFD_TAG()
function in PHP4’s EXIF module. EXIF tags with a specially crafted
“Image File Directory” (IFD) tag caused a buffer overflow which could
have been exploited to execute arbitrary code with the privileges of
the PHP4 server. (CAN-2005-1042)
The same module also contained a Denial of Service vulnerability. EXIF
headers with a large IFD nesting level caused an unbound recursion
which would eventually overflow the stack and cause the executed
program to crash. (CAN-2005-1043)
In web applications that automatically process EXIF tags of uploaded
images, both vulnerabilities could be exploited remotely.
Update instructions
In general, a standard system update will make all the necessary changes.
Learn more about how to get the fixes.The problem can be corrected by updating your system to the following package versions:
Ubuntu Release | Package Version | ||
---|---|---|---|
4.10 warty | libapache2-mod-php4 – | ||
php4-cgi – |
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.