Debian Security Advisory DSA 1578-1 (php4)

Summary
The remote host is missing an update to php4 announced via advisory DSA 1578-1.
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201578-1
Insight
Several vulnerabilities have been discovered in PHP version 4, a server-side, HTML-embedded scripting language. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2007-3799 The session_start function allows remote attackers to insert arbitrary attributes into the session cookie via special characters in a cookie that is obtained from various parameters. CVE-2007-3806 A denial of service was possible through a malicious script abusing the glob() function. CVE-2007-3998 Certain maliciously constructed input to the wordwrap() function could lead to a denial of service attack. CVE-2007-4657 Large len values of the stspn() or strcspn() functions could allow an attacker to trigger integer overflows to expose memory or cause denial of service. CVE-2008-2051 The escapeshellcmd API function could be attacked via incomplete multibyte chars. For the stable distribution (etch), these problems have been fixed in version 6:4.4.4-8+etch6. The php4 are no longer present the unstable distribution (sid). We recommend that you upgrade your php4 package.