DSA-1578-1 php4 -- several vulnerabilities

Related Vulnerabilities: CVE-2007-3799   CVE-2007-3806   CVE-2007-3998   CVE-2007-4657   CVE-2008-2051  

Several vulnerabilities have been discovered in PHP version 4, a server-side, HTML-embedded scripting language. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2007-3799 The session_start function allows remote attackers to insert arbitrary attributes into the session cookie via special characters in a cookie that is obtained from various parameters. CVE-2007-3806 A denial of service was possible through a malicious script abusing the glob() function. CVE-2007-3998 Certain maliciously constructed input to the wordwrap() function could lead to a denial of service attack. CVE-2007-4657 Large len values of the stspn() or strcspn() functions could allow an attacker to trigger integer overflows to expose memory or cause denial of service. CVE-2008-2051 The escapeshellcmd API function could be attacked via incomplete multibyte chars. For the stable distribution (etch), these problems have been fixed in version 6:4.4.4-8+etch6. The php4 packages are no longer present the unstable distribution (sid). We recommend that you upgrade your php4 package.

Debian Security Advisory

DSA-1578-1 php4 -- several vulnerabilities

Date Reported:
17 May 2008
Affected Packages:
php4
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2007-3799, CVE-2007-3806, CVE-2007-3998, CVE-2007-4657, CVE-2008-2051.
More information:

Several vulnerabilities have been discovered in PHP version 4, a server-side, HTML-embedded scripting language. The Common Vulnerabilities and Exposures project identifies the following problems:

  • CVE-2007-3799

    The session_start function allows remote attackers to insert arbitrary attributes into the session cookie via special characters in a cookie that is obtained from various parameters.

  • CVE-2007-3806

    A denial of service was possible through a malicious script abusing the glob() function.

  • CVE-2007-3998

    Certain maliciously constructed input to the wordwrap() function could lead to a denial of service attack.

  • CVE-2007-4657

    Large len values of the stspn() or strcspn() functions could allow an attacker to trigger integer overflows to expose memory or cause denial of service.

  • CVE-2008-2051

    The escapeshellcmd API function could be attacked via incomplete multibyte chars.

For the stable distribution (etch), these problems have been fixed in version 6:4.4.4-8+etch6.

The php4 packages are no longer present the unstable distribution (sid).

We recommend that you upgrade your php4 package.

Fixed in:

Debian GNU/Linux 4.0 (etch)

Source:
http://security.debian.org/pool/updates/main/p/php4/php4_4.4.4-8+etch6.dsc
http://security.debian.org/pool/updates/main/p/php4/php4_4.4.4.orig.tar.gz
http://security.debian.org/pool/updates/main/p/php4/php4_4.4.4-8+etch6.diff.gz
Architecture-independent component:
http://security.debian.org/pool/updates/main/p/php4/php4_4.4.4-8+etch6_all.deb
http://security.debian.org/pool/updates/main/p/php4/php4-pear_4.4.4-8+etch6_all.deb
Alpha:
http://security.debian.org/pool/updates/main/p/php4/php4-xslt_4.4.4-8+etch6_alpha.deb
http://security.debian.org/pool/updates/main/p/php4/libapache2-mod-php4_4.4.4-8+etch6_alpha.deb
http://security.debian.org/pool/updates/main/p/php4/php4-cgi_4.4.4-8+etch6_alpha.deb
http://security.debian.org/pool/updates/main/p/php4/php4-odbc_4.4.4-8+etch6_alpha.deb
http://security.debian.org/pool/updates/main/p/php4/php4-pspell_4.4.4-8+etch6_alpha.deb
http://security.debian.org/pool/updates/main/p/php4/php4-mysql_4.4.4-8+etch6_alpha.deb
http://security.debian.org/pool/updates/main/p/php4/php4-gd_4.4.4-8+etch6_alpha.deb
http://security.debian.org/pool/updates/main/p/php4/php4-domxml_4.4.4-8+etch6_alpha.deb
http://security.debian.org/pool/updates/main/p/php4/php4-curl_4.4.4-8+etch6_alpha.deb
http://security.debian.org/pool/updates/main/p/php4/php4-dev_4.4.4-8+etch6_alpha.deb
http://security.debian.org/pool/updates/main/p/php4/php4-sybase_4.4.4-8+etch6_alpha.deb
http://security.debian.org/pool/updates/main/p/php4/php4-mcal_4.4.4-8+etch6_alpha.deb
http://security.debian.org/pool/updates/main/p/php4/libapache-mod-php4_4.4.4-8+etch6_alpha.deb
http://security.debian.org/pool/updates/main/p/php4/php4-imap_4.4.4-8+etch6_alpha.deb
http://security.debian.org/pool/updates/main/p/php4/php4-mcrypt_4.4.4-8+etch6_alpha.deb
http://security.debian.org/pool/updates/main/p/php4/php4-recode_4.4.4-8+etch6_alpha.deb
http://security.debian.org/pool/updates/main/p/php4/php4-pgsql_4.4.4-8+etch6_alpha.deb
http://security.debian.org/pool/updates/main/p/php4/php4-common_4.4.4-8+etch6_alpha.deb
http://security.debian.org/pool/updates/main/p/php4/php4-cli_4.4.4-8+etch6_alpha.deb
http://security.debian.org/pool/updates/main/p/php4/php4-mhash_4.4.4-8+etch6_alpha.deb
http://security.debian.org/pool/updates/main/p/php4/php4-ldap_4.4.4-8+etch6_alpha.deb
http://security.debian.org/pool/updates/main/p/php4/php4-snmp_4.4.4-8+etch6_alpha.deb
AMD64:
http://security.debian.org/pool/updates/main/p/php4/php4-common_4.4.4-8+etch6_amd64.deb
http://security.debian.org/pool/updates/main/p/php4/php4-curl_4.4.4-8+etch6_amd64.deb
http://security.debian.org/pool/updates/main/p/php4/php4-snmp_4.4.4-8+etch6_amd64.deb
http://security.debian.org/pool/updates/main/p/php4/php4-ldap_4.4.4-8+etch6_amd64.deb
http://security.debian.org/pool/updates/main/p/php4/php4-cli_4.4.4-8+etch6_amd64.deb
http://security.debian.org/pool/updates/main/p/php4/php4-mcrypt_4.4.4-8+etch6_amd64.deb
http://security.debian.org/pool/updates/main/p/php4/php4-imap_4.4.4-8+etch6_amd64.deb
http://security.debian.org/pool/updates/main/p/php4/php4-mysql_4.4.4-8+etch6_amd64.deb
http://security.debian.org/pool/updates/main/p/php4/php4-odbc_4.4.4-8+etch6_amd64.deb
http://security.debian.org/pool/updates/main/p/php4/php4-gd_4.4.4-8+etch6_amd64.deb
http://security.debian.org/pool/updates/main/p/php4/libapache2-mod-php4_4.4.4-8+etch6_amd64.deb
http://security.debian.org/pool/updates/main/p/php4/php4-mhash_4.4.4-8+etch6_amd64.deb
http://security.debian.org/pool/updates/main/p/php4/php4-mcal_4.4.4-8+etch6_amd64.deb
http://security.debian.org/pool/updates/main/p/php4/php4-pspell_4.4.4-8+etch6_amd64.deb
http://security.debian.org/pool/updates/main/p/php4/php4-interbase_4.4.4-8+etch6_amd64.deb
http://security.debian.org/pool/updates/main/p/php4/php4-sybase_4.4.4-8+etch6_amd64.deb
http://security.debian.org/pool/updates/main/p/php4/php4-domxml_4.4.4-8+etch6_amd64.deb
http://security.debian.org/pool/updates/main/p/php4/libapache-mod-php4_4.4.4-8+etch6_amd64.deb
http://security.debian.org/pool/updates/main/p/php4/php4-xslt_4.4.4-8+etch6_amd64.deb
http://security.debian.org/pool/updates/main/p/php4/php4-pgsql_4.4.4-8+etch6_amd64.deb
http://security.debian.org/pool/updates/main/p/php4/php4-recode_4.4.4-8+etch6_amd64.deb
http://security.debian.org/pool/updates/main/p/php4/php4-cgi_4.4.4-8+etch6_amd64.deb
http://security.debian.org/pool/updates/main/p/php4/php4-dev_4.4.4-8+etch6_amd64.deb
ARM:
http://security.debian.org/pool/updates/main/p/php4/php4-xslt_4.4.4-8+etch6_arm.deb
http://security.debian.org/pool/updates/main/p/php4/php4-mysql_4.4.4-8+etch6_arm.deb
http://security.debian.org/pool/updates/main/p/php4/php4-curl_4.4.4-8+etch6_arm.deb
http://security.debian.org/pool/updates/main/p/php4/php4-imap_4.4.4-8+etch6_arm.deb
http://security.debian.org/pool/updates/main/p/php4/php4-mhash_4.4.4-8+etch6_arm.deb
http://security.debian.org/pool/updates/main/p/php4/php4-cgi_4.4.4-8+etch6_arm.deb
http://security.debian.org/pool/updates/main/p/php4/php4-recode_4.4.4-8+etch6_arm.deb
http://security.debian.org/pool/updates/main/p/php4/php4-domxml_4.4.4-8+etch6_arm.deb
http://security.debian.org/pool/updates/main/p/php4/php4-sybase_4.4.4-8+etch6_arm.deb
http://security.debian.org/pool/updates/main/p/php4/libapache-mod-php4_4.4.4-8+etch6_arm.deb
http://security.debian.org/pool/updates/main/p/php4/php4-gd_4.4.4-8+etch6_arm.deb
http://security.debian.org/pool/updates/main/p/php4/php4-pspell_4.4.4-8+etch6_arm.deb
http://security.debian.org/pool/updates/main/p/php4/libapache2-mod-php4_4.4.4-8+etch6_arm.deb
http://security.debian.org/pool/updates/main/p/php4/php4-snmp_4.4.4-8+etch6_arm.deb
http://security.debian.org/pool/updates/main/p/php4/php4-pgsql_4.4.4-8+etch6_arm.deb
http://security.debian.org/pool/updates/main/p/php4/php4-ldap_4.4.4-8+etch6_arm.deb
http://security.debian.org/pool/updates/main/p/php4/php4-odbc_4.4.4-8+etch6_arm.deb
http://security.debian.org/pool/updates/main/p/php4/php4-mcrypt_4.4.4-8+etch6_arm.deb
http://security.debian.org/pool/updates/main/p/php4/php4-cli_4.4.4-8+etch6_arm.deb
http://security.debian.org/pool/updates/main/p/php4/php4-mcal_4.4.4-8+etch6_arm.deb
http://security.debian.org/pool/updates/main/p/php4/php4-dev_4.4.4-8+etch6_arm.deb
http://security.debian.org/pool/updates/main/p/php4/php4-common_4.4.4-8+etch6_arm.deb
HP Precision:
http://security.debian.org/pool/updates/main/p/php4/php4-snmp_4.4.4-8+etch6_hppa.deb
http://security.debian.org/pool/updates/main/p/php4/php4-common_4.4.4-8+etch6_hppa.deb
http://security.debian.org/pool/updates/main/p/php4/php4-cgi_4.4.4-8+etch6_hppa.deb
http://security.debian.org/pool/updates/main/p/php4/php4-dev_4.4.4-8+etch6_hppa.deb
http://security.debian.org/pool/updates/main/p/php4/php4-xslt_4.4.4-8+etch6_hppa.deb
http://security.debian.org/pool/updates/main/p/php4/php4-gd_4.4.4-8+etch6_hppa.deb
http://security.debian.org/pool/updates/main/p/php4/php4-ldap_4.4.4-8+etch6_hppa.deb
http://security.debian.org/pool/updates/main/p/php4/php4-mysql_4.4.4-8+etch6_hppa.deb
http://security.debian.org/pool/updates/main/p/php4/php4-cli_4.4.4-8+etch6_hppa.deb
http://security.debian.org/pool/updates/main/p/php4/php4-mcrypt_4.4.4-8+etch6_hppa.deb
http://security.debian.org/pool/updates/main/p/php4/php4-imap_4.4.4-8+etch6_hppa.deb
http://security.debian.org/pool/updates/main/p/php4/php4-recode_4.4.4-8+etch6_hppa.deb
http://security.debian.org/pool/updates/main/p/php4/php4-mhash_4.4.4-8+etch6_hppa.deb
http://security.debian.org/pool/updates/main/p/php4/php4-domxml_4.4.4-8+etch6_hppa.deb
http://security.debian.org/pool/updates/main/p/php4/php4-sybase_4.4.4-8+etch6_hppa.deb
http://security.debian.org/pool/updates/main/p/php4/php4-curl_4.4.4-8+etch6_hppa.deb
http://security.debian.org/pool/updates/main/p/php4/php4-odbc_4.4.4-8+etch6_hppa.deb
http://security.debian.org/pool/updates/main/p/php4/php4-pspell_4.4.4-8+etch6_hppa.deb
http://security.debian.org/pool/updates/main/p/php4/php4-mcal_4.4.4-8+etch6_hppa.deb
http://security.debian.org/pool/updates/main/p/php4/libapache2-mod-php4_4.4.4-8+etch6_hppa.deb
http://security.debian.org/pool/updates/main/p/php4/libapache-mod-php4_4.4.4-8+etch6_hppa.deb
http://security.debian.org/pool/updates/main/p/php4/php4-pgsql_4.4.4-8+etch6_hppa.deb
Intel IA-32:
http://security.debian.org/pool/updates/main/p/php4/php4-mcrypt_4.4.4-8+etch6_i386.deb
http://security.debian.org/pool/updates/main/p/php4/php4-pgsql_4.4.4-8+etch6_i386.deb
http://security.debian.org/pool/updates/main/p/php4/php4-curl_4.4.4-8+etch6_i386.deb
http://security.debian.org/pool/updates/main/p/php4/php4-cli_4.4.4-8+etch6_i386.deb
http://security.debian.org/pool/updates/main/p/php4/php4-snmp_4.4.4-8+etch6_i386.deb
http://security.debian.org/pool/updates/main/p/php4/php4-mcal_4.4.4-8+etch6_i386.deb
http://security.debian.org/pool/updates/main/p/php4/php4-common_4.4.4-8+etch6_i386.deb
http://security.debian.org/pool/updates/main/p/php4/php4-ldap_4.4.4-8+etch6_i386.deb
http://security.debian.org/pool/updates/main/p/php4/php4-imap_4.4.4-8+etch6_i386.deb
http://security.debian.org/pool/updates/main/p/php4/php4-odbc_4.4.4-8+etch6_i386.deb
http://security.debian.org/pool/updates/main/p/php4/php4-dev_4.4.4-8+etch6_i386.deb
http://security.debian.org/pool/updates/main/p/php4/php4-pspell_4.4.4-8+etch6_i386.deb
http://security.debian.org/pool/updates/main/p/php4/php4-cgi_4.4.4-8+etch6_i386.deb
http://security.debian.org/pool/updates/main/p/php4/php4-mhash_4.4.4-8+etch6_i386.deb
http://security.debian.org/pool/updates/main/p/php4/libapache-mod-php4_4.4.4-8+etch6_i386.deb
http://security.debian.org/pool/updates/main/p/php4/php4-mysql_4.4.4-8+etch6_i386.deb
http://security.debian.org/pool/updates/main/p/php4/libapache2-mod-php4_4.4.4-8+etch6_i386.deb
http://security.debian.org/pool/updates/main/p/php4/php4-domxml_4.4.4-8+etch6_i386.deb
http://security.debian.org/pool/updates/main/p/php4/php4-interbase_4.4.4-8+etch6_i386.deb
http://security.debian.org/pool/updates/main/p/php4/php4-gd_4.4.4-8+etch6_i386.deb
http://security.debian.org/pool/updates/main/p/php4/php4-sybase_4.4.4-8+etch6_i386.deb
http://security.debian.org/pool/updates/main/p/php4/php4-recode_4.4.4-8+etch6_i386.deb
http://security.debian.org/pool/updates/main/p/php4/php4-xslt_4.4.4-8+etch6_i386.deb
Intel IA-64:
http://security.debian.org/pool/updates/main/p/php4/php4-curl_4.4.4-8+etch6_ia64.deb
http://security.debian.org/pool/updates/main/p/php4/php4-recode_4.4.4-8+etch6_ia64.deb
http://security.debian.org/pool/updates/main/p/php4/php4-cgi_4.4.4-8+etch6_ia64.deb
http://security.debian.org/pool/updates/main/p/php4/libapache-mod-php4_4.4.4-8+etch6_ia64.deb
http://security.debian.org/pool/updates/main/p/php4/php4-gd_4.4.4-8+etch6_ia64.deb
http://security.debian.org/pool/updates/main/p/php4/php4-mcrypt_4.4.4-8+etch6_ia64.deb
http://security.debian.org/pool/updates/main/p/php4/libapache2-mod-php4_4.4.4-8+etch6_ia64.deb
http://security.debian.org/pool/updates/main/p/php4/php4-domxml_4.4.4-8+etch6_ia64.deb
http://security.debian.org/pool/updates/main/p/php4/php4-dev_4.4.4-8+etch6_ia64.deb
http://security.debian.org/pool/updates/main/p/php4/php4-odbc_4.4.4-8+etch6_ia64.deb
http://security.debian.org/pool/updates/main/p/php4/php4-pspell_4.4.4-8+etch6_ia64.deb
http://security.debian.org/pool/updates/main/p/php4/php4-xslt_4.4.4-8+etch6_ia64.deb
http://security.debian.org/pool/updates/main/p/php4/php4-snmp_4.4.4-8+etch6_ia64.deb
http://security.debian.org/pool/updates/main/p/php4/php4-mysql_4.4.4-8+etch6_ia64.deb
http://security.debian.org/pool/updates/main/p/php4/php4-imap_4.4.4-8+etch6_ia64.deb
http://security.debian.org/pool/updates/main/p/php4/php4-sybase_4.4.4-8+etch6_ia64.deb
http://security.debian.org/pool/updates/main/p/php4/php4-ldap_4.4.4-8+etch6_ia64.deb
http://security.debian.org/pool/updates/main/p/php4/php4-cli_4.4.4-8+etch6_ia64.deb
http://security.debian.org/pool/updates/main/p/php4/php4-mcal_4.4.4-8+etch6_ia64.deb
http://security.debian.org/pool/updates/main/p/php4/php4-mhash_4.4.4-8+etch6_ia64.deb
http://security.debian.org/pool/updates/main/p/php4/php4-common_4.4.4-8+etch6_ia64.deb
http://security.debian.org/pool/updates/main/p/php4/php4-pgsql_4.4.4-8+etch6_ia64.deb
Big-endian MIPS:
http://security.debian.org/pool/updates/main/p/php4/php4-imap_4.4.4-8+etch6_mips.deb
http://security.debian.org/pool/updates/main/p/php4/php4-dev_4.4.4-8+etch6_mips.deb
http://security.debian.org/pool/updates/main/p/php4/php4-mysql_4.4.4-8+etch6_mips.deb
http://security.debian.org/pool/updates/main/p/php4/php4-gd_4.4.4-8+etch6_mips.deb
http://security.debian.org/pool/updates/main/p/php4/php4-ldap_4.4.4-8+etch6_mips.deb
http://security.debian.org/pool/updates/main/p/php4/php4-snmp_4.4.4-8+etch6_mips.deb
http://security.debian.org/pool/updates/main/p/php4/php4-common_4.4.4-8+etch6_mips.deb
http://security.debian.org/pool/updates/main/p/php4/php4-cgi_4.4.4-8+etch6_mips.deb
http://security.debian.org/pool/updates/main/p/php4/php4-xslt_4.4.4-8+etch6_mips.deb
http://security.debian.org/pool/updates/main/p/php4/php4-sybase_4.4.4-8+etch6_mips.deb
http://security.debian.org/pool/updates/main/p/php4/libapache2-mod-php4_4.4.4-8+etch6_mips.deb
http://security.debian.org/pool/updates/main/p/php4/php4-mcal_4.4.4-8+etch6_mips.deb
http://security.debian.org/pool/updates/main/p/php4/php4-odbc_4.4.4-8+etch6_mips.deb
http://security.debian.org/pool/updates/main/p/php4/php4-cli_4.4.4-8+etch6_mips.deb
http://security.debian.org/pool/updates/main/p/php4/php4-curl_4.4.4-8+etch6_mips.deb
http://security.debian.org/pool/updates/main/p/php4/php4-recode_4.4.4-8+etch6_mips.deb
http://security.debian.org/pool/updates/main/p/php4/php4-pspell_4.4.4-8+etch6_mips.deb
http://security.debian.org/pool/updates/main/p/php4/php4-pgsql_4.4.4-8+etch6_mips.deb
http://security.debian.org/pool/updates/main/p/php4/php4-mcrypt_4.4.4-8+etch6_mips.deb
http://security.debian.org/pool/updates/main/p/php4/php4-mhash_4.4.4-8+etch6_mips.deb
http://security.debian.org/pool/updates/main/p/php4/php4-domxml_4.4.4-8+etch6_mips.deb
http://security.debian.org/pool/updates/main/p/php4/libapache-mod-php4_4.4.4-8+etch6_mips.deb
Little-endian MIPS:
http://security.debian.org/pool/updates/main/p/php4/php4-odbc_4.4.4-8+etch6_mipsel.deb
http://security.debian.org/pool/updates/main/p/php4/php4-sybase_4.4.4-8+etch6_mipsel.deb
http://security.debian.org/pool/updates/main/p/php4/php4-pspell_4.4.4-8+etch6_mipsel.deb
http://security.debian.org/pool/updates/main/p/php4/php4-snmp_4.4.4-8+etch6_mipsel.deb
http://security.debian.org/pool/updates/main/p/php4/php4-cgi_4.4.4-8+etch6_mipsel.deb
http://security.debian.org/pool/updates/main/p/php4/libapache-mod-php4_4.4.4-8+etch6_mipsel.deb
http://security.debian.org/pool/updates/main/p/php4/php4-mcal_4.4.4-8+etch6_mipsel.deb
http://security.debian.org/pool/updates/main/p/php4/php4-ldap_4.4.4-8+etch6_mipsel.deb
http://security.debian.org/pool/updates/main/p/php4/libapache2-mod-php4_4.4.4-8+etch6_mipsel.deb
http://security.debian.org/pool/updates/main/p/php4/php4-common_4.4.4-8+etch6_mipsel.deb
http://security.debian.org/pool/updates/main/p/php4/php4-pgsql_4.4.4-8+etch6_mipsel.deb
http://security.debian.org/pool/updates/main/p/php4/php4-xslt_4.4.4-8+etch6_mipsel.deb
http://security.debian.org/pool/updates/main/p/php4/php4-dev_4.4.4-8+etch6_mipsel.deb
http://security.debian.org/pool/updates/main/p/php4/php4-curl_4.4.4-8+etch6_mipsel.deb
http://security.debian.org/pool/updates/main/p/php4/php4-recode_4.4.4-8+etch6_mipsel.deb
http://security.debian.org/pool/updates/main/p/php4/php4-gd_4.4.4-8+etch6_mipsel.deb
http://security.debian.org/pool/updates/main/p/php4/php4-mcrypt_4.4.4-8+etch6_mipsel.deb
http://security.debian.org/pool/updates/main/p/php4/php4-cli_4.4.4-8+etch6_mipsel.deb
http://security.debian.org/pool/updates/main/p/php4/php4-mhash_4.4.4-8+etch6_mipsel.deb
http://security.debian.org/pool/updates/main/p/php4/php4-domxml_4.4.4-8+etch6_mipsel.deb
http://security.debian.org/pool/updates/main/p/php4/php4-imap_4.4.4-8+etch6_mipsel.deb
http://security.debian.org/pool/updates/main/p/php4/php4-mysql_4.4.4-8+etch6_mipsel.deb
PowerPC:
http://security.debian.org/pool/updates/main/p/php4/libapache-mod-php4_4.4.4-8+etch6_powerpc.deb
http://security.debian.org/pool/updates/main/p/php4/libapache2-mod-php4_4.4.4-8+etch6_powerpc.deb
http://security.debian.org/pool/updates/main/p/php4/php4-domxml_4.4.4-8+etch6_powerpc.deb
http://security.debian.org/pool/updates/main/p/php4/php4-ldap_4.4.4-8+etch6_powerpc.deb
http://security.debian.org/pool/updates/main/p/php4/php4-imap_4.4.4-8+etch6_powerpc.deb
http://security.debian.org/pool/updates/main/p/php4/php4-recode_4.4.4-8+etch6_powerpc.deb
http://security.debian.org/pool/updates/main/p/php4/php4-mcrypt_4.4.4-8+etch6_powerpc.deb
http://security.debian.org/pool/updates/main/p/php4/php4-cgi_4.4.4-8+etch6_powerpc.deb
http://security.debian.org/pool/updates/main/p/php4/php4-mhash_4.4.4-8+etch6_powerpc.deb
http://security.debian.org/pool/updates/main/p/php4/php4-cli_4.4.4-8+etch6_powerpc.deb
http://security.debian.org/pool/updates/main/p/php4/php4-pspell_4.4.4-8+etch6_powerpc.deb
http://security.debian.org/pool/updates/main/p/php4/php4-odbc_4.4.4-8+etch6_powerpc.deb
http://security.debian.org/pool/updates/main/p/php4/php4-gd_4.4.4-8+etch6_powerpc.deb
http://security.debian.org/pool/updates/main/p/php4/php4-mcal_4.4.4-8+etch6_powerpc.deb
http://security.debian.org/pool/updates/main/p/php4/php4-common_4.4.4-8+etch6_powerpc.deb
http://security.debian.org/pool/updates/main/p/php4/php4-xslt_4.4.4-8+etch6_powerpc.deb
http://security.debian.org/pool/updates/main/p/php4/php4-sybase_4.4.4-8+etch6_powerpc.deb
http://security.debian.org/pool/updates/main/p/php4/php4-snmp_4.4.4-8+etch6_powerpc.deb
http://security.debian.org/pool/updates/main/p/php4/php4-mysql_4.4.4-8+etch6_powerpc.deb
http://security.debian.org/pool/updates/main/p/php4/php4-curl_4.4.4-8+etch6_powerpc.deb
http://security.debian.org/pool/updates/main/p/php4/php4-dev_4.4.4-8+etch6_powerpc.deb
http://security.debian.org/pool/updates/main/p/php4/php4-pgsql_4.4.4-8+etch6_powerpc.deb
IBM S/390:
http://security.debian.org/pool/updates/main/p/php4/php4-xslt_4.4.4-8+etch6_s390.deb
http://security.debian.org/pool/updates/main/p/php4/php4-domxml_4.4.4-8+etch6_s390.deb
http://security.debian.org/pool/updates/main/p/php4/php4-snmp_4.4.4-8+etch6_s390.deb
http://security.debian.org/pool/updates/main/p/php4/php4-cli_4.4.4-8+etch6_s390.deb
http://security.debian.org/pool/updates/main/p/php4/php4-odbc_4.4.4-8+etch6_s390.deb
http://security.debian.org/pool/updates/main/p/php4/php4-sybase_4.4.4-8+etch6_s390.deb
http://security.debian.org/pool/updates/main/p/php4/php4-mysql_4.4.4-8+etch6_s390.deb
http://security.debian.org/pool/updates/main/p/php4/php4-ldap_4.4.4-8+etch6_s390.deb
http://security.debian.org/pool/updates/main/p/php4/libapache-mod-php4_4.4.4-8+etch6_s390.deb
http://security.debian.org/pool/updates/main/p/php4/php4-imap_4.4.4-8+etch6_s390.deb
http://security.debian.org/pool/updates/main/p/php4/php4-cgi_4.4.4-8+etch6_s390.deb
http://security.debian.org/pool/updates/main/p/php4/php4-pgsql_4.4.4-8+etch6_s390.deb
http://security.debian.org/pool/updates/main/p/php4/php4-gd_4.4.4-8+etch6_s390.deb
http://security.debian.org/pool/updates/main/p/php4/libapache2-mod-php4_4.4.4-8+etch6_s390.deb
http://security.debian.org/pool/updates/main/p/php4/php4-pspell_4.4.4-8+etch6_s390.deb
http://security.debian.org/pool/updates/main/p/php4/php4-common_4.4.4-8+etch6_s390.deb
http://security.debian.org/pool/updates/main/p/php4/php4-recode_4.4.4-8+etch6_s390.deb
http://security.debian.org/pool/updates/main/p/php4/php4-curl_4.4.4-8+etch6_s390.deb
http://security.debian.org/pool/updates/main/p/php4/php4-dev_4.4.4-8+etch6_s390.deb
http://security.debian.org/pool/updates/main/p/php4/php4-mcal_4.4.4-8+etch6_s390.deb
http://security.debian.org/pool/updates/main/p/php4/php4-mhash_4.4.4-8+etch6_s390.deb
http://security.debian.org/pool/updates/main/p/php4/php4-mcrypt_4.4.4-8+etch6_s390.deb
Sun Sparc:
http://security.debian.org/pool/updates/main/p/php4/php4-recode_4.4.4-8+etch6_sparc.deb
http://security.debian.org/pool/updates/main/p/php4/php4-sybase_4.4.4-8+etch6_sparc.deb
http://security.debian.org/pool/updates/main/p/php4/php4-gd_4.4.4-8+etch6_sparc.deb
http://security.debian.org/pool/updates/main/p/php4/php4-mysql_4.4.4-8+etch6_sparc.deb
http://security.debian.org/pool/updates/main/p/php4/php4-mhash_4.4.4-8+etch6_sparc.deb
http://security.debian.org/pool/updates/main/p/php4/php4-ldap_4.4.4-8+etch6_sparc.deb
http://security.debian.org/pool/updates/main/p/php4/php4-odbc_4.4.4-8+etch6_sparc.deb
http://security.debian.org/pool/updates/main/p/php4/php4-pgsql_4.4.4-8+etch6_sparc.deb
http://security.debian.org/pool/updates/main/p/php4/php4-common_4.4.4-8+etch6_sparc.deb
http://security.debian.org/pool/updates/main/p/php4/php4-dev_4.4.4-8+etch6_sparc.deb
http://security.debian.org/pool/updates/main/p/php4/php4-snmp_4.4.4-8+etch6_sparc.deb
http://security.debian.org/pool/updates/main/p/php4/libapache2-mod-php4_4.4.4-8+etch6_sparc.deb
http://security.debian.org/pool/updates/main/p/php4/php4-pspell_4.4.4-8+etch6_sparc.deb
http://security.debian.org/pool/updates/main/p/php4/php4-mcal_4.4.4-8+etch6_sparc.deb
http://security.debian.org/pool/updates/main/p/php4/php4-mcrypt_4.4.4-8+etch6_sparc.deb
http://security.debian.org/pool/updates/main/p/php4/php4-cli_4.4.4-8+etch6_sparc.deb
http://security.debian.org/pool/updates/main/p/php4/php4-imap_4.4.4-8+etch6_sparc.deb
http://security.debian.org/pool/updates/main/p/php4/php4-cgi_4.4.4-8+etch6_sparc.deb
http://security.debian.org/pool/updates/main/p/php4/php4-domxml_4.4.4-8+etch6_sparc.deb
http://security.debian.org/pool/updates/main/p/php4/php4-curl_4.4.4-8+etch6_sparc.deb
http://security.debian.org/pool/updates/main/p/php4/php4-xslt_4.4.4-8+etch6_sparc.deb
http://security.debian.org/pool/updates/main/p/php4/libapache-mod-php4_4.4.4-8+etch6_sparc.deb

MD5 checksums of the listed files are available in the original advisory.