Summary
The remote host is missing an update to php
announced via advisory MDVSA-2009:285.
Solution
To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:285
Insight
Multiple vulnerabilities has been found and corrected in php:
The _gdGetColors function in gd_gd.c in PHP 5.2.11 and 5.3.0, and the GD Graphics Library 2.x, does not properly verify a certain colorsTotal structure member, which might allow remote attackers to conduct buffer overflow or buffer over-read attacks via a crafted GD file, a different vulnerability than CVE-2009-3293. NOTE: some of these details are obtained from third party information (CVE-2009-3546).
Added two upstream patches to address a bypass vulnerability in open_basedir and safe_mode.
Additionally on CS4 a regression was found and fixed when using the gd-bundled.so variant from the php-gd package.
This update fixes these vulnerabilities.
Affected: 2009.0, 2009.1, Corporate 3.0, Corporate 4.0, Enterprise Server 5.0, Multi Network Firewall 2.0
Severity
Classification
-
CVE CVE-2009-3293, CVE-2009-3546 -
CVSS Base Score: 9.3
AV:N/AC:M/Au:N/C:C/I:C/A:C
Related Vulnerabilities