CVE-2007-3806, CVE-2007-2519 and CVE-2007-3799

Related Vulnerabilities: CVE-2007-3806   CVE-2007-2519   CVE-2007-3799  

Debian Bug report logs - #441433
CVE-2007-3806, CVE-2007-2519 and CVE-2007-3799

version graph

Reported by: Nico Golde <nion@debian.org>

Date: Sun, 9 Sep 2007 19:30:02 UTC

Severity: important

Tags: security

Found in version php5/5.2.3-1

Fixed in version 5.2.4-1

Done: sean finney <seanius@seanius.net>

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, Debian PHP Maintainers <pkg-php-maint@lists.alioth.debian.org>:
Bug#441433; Package php5. (full text, mbox, link).


Acknowledgement sent to Nico Golde <nion@debian.org>:
New Bug report received and forwarded. Copy sent to Debian PHP Maintainers <pkg-php-maint@lists.alioth.debian.org>. (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Nico Golde <nion@debian.org>
To: submit@bugs.debian.org
Subject: CVE-2007-3806, CVE-2007-2519 and CVE-2007-3799
Date: Sun, 9 Sep 2007 21:27:28 +0200
[Message part 1 (text/plain, inline)]
Package: php5
Version: 5.2.3-1
Severity: important
Tags: security

Hi,
3 CVEs had been issued against php5:

CVE-2007-3799[0]:
The session_start function in ext/session in PHP 4.x up to 
4.4.7 and 5.x up to 5.2.3 allows remote attackers to insert 
arbitrary attributes into the session cookie via special 
characters in a cookie that is obtained from (1) PATH_INFO, 
(2) the session_id function, and (3) the session_start 
function, which are not encoded or filtered when the new 
session cookie is generated.

CVE-2007-2519[1]:
Directory traversal vulnerability in the installer in PEAR 
1.0 through 1.5.3 allows user-assisted remote attackers to 
overwrite arbitrary files via a .. (dot dot) sequence in the 
(1) install-as attribute in the file element in package.xml 
1.0 or the (2) as attribute in the install element in 
package.xml 2.0. NOTE: it could be argued that this does not 
cross privilege boundaries in typical installations, since 
the code being installed could perform the same actions.

CVE-2007-3806[2]:
The glob function in PHP 5.2.3 allows context-dependent 
attackers to cause a denial of service and possibly execute 
arbitrary code via an invalid value of the flags parameter, 
probably related to memory corruption.

Please include the CVE ids in your changelog entries if you
fix the issues.

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3799
[1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2519
[2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3806
-- 
Nico Golde - http://ngolde.de - nion@jabber.ccc.de - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
[Message part 2 (application/pgp-signature, inline)]

Reply sent to sean finney <seanius@seanius.net>:
You have taken responsibility. (full text, mbox, link).


Notification sent to Nico Golde <nion@debian.org>:
Bug acknowledged by developer. (full text, mbox, link).


Message #10 received at 441433-done@bugs.debian.org (full text, mbox, reply):

From: sean finney <seanius@seanius.net>
To: 441433-done@bugs.debian.org
Subject: fixed in unstable
Date: Thu, 20 Sep 2007 19:22:49 +0200
[Message part 1 (text/plain, inline)]
Version: 5.2.4-1

The bugs referenced in this email are all fixed in unstable, and fixes are 
pending in stable/oldstable if relevant.  the next upload of 5.2.4 will 
contain references to the CVE id's if appropriate.



	sean
[signature.asc (application/pgp-signature, inline)]

Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Mon, 21 Jan 2008 07:27:41 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 17:29:26 2019; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.