Tuesday, January 22, 2013

[USN-1702-1] PHP vulnerability

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with undefined - http://www.enigmail.net/
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=Pt2H
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-1702-1
January 22, 2013

php5 vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 12.04 LTS

Summary:

PHP could be made to expose sensitive information over the network.

Software Description:
- php5: HTML-embedded scripting language interpreter

Details:

It was discovered that PHP incorrectly handled the openssl_encrypt function
when used with an empty string. An attacker could use this flaw to cause
PHP to disclose arbitrary memory contents and possibly expose sensitive
information.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.04 LTS:
php5 5.3.10-1ubuntu3.5

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-1702-1
CVE-2012-6113

Package Information:
https://launchpad.net/ubuntu/+source/php5/5.3.10-1ubuntu3.5

No comments:

Post a Comment