PHP multiple HTTP POST file upload overflows

php-file-upload-overflow (8281) The risk level is classified as MediumMedium Risk

Description:

PHP is vulnerable to several buffer overflow vulnerabilities in the handling of file uploads. By using the HTTP POST method to upload a PHP form containing specially-crafted MIME-encoded data, a remote attacker can overflow a buffer and execute arbitrary code on the Web server with elevated privileges.


Consequences:

Gain Access

Remedy:

Upgrade to the latest version of PHP (4.1.2 or later) or apply the appropriate security fix for your PHP version, available from the PHP Group Web site. See References.

As a workaround, refer to the recommendation listed in Internet Security Systems Security Alert #112. See References.

For Red Hat Linux 6.2:
Upgrade to the latest version of PHP (3.0.18-8 or later), as listed in Red Hat Linux Errata Advisory RHSA-2002:035-18. See References.

For Red Hat Linux 7.0:
Upgrade to the latest version of PHP (4.0.6-13 or later), as listed in Red Hat Linux Errata Advisory RHSA-2002:035-18. See References.

For Red Hat Linux 7.1:
Upgrade to the latest version of PHP (4.0.6-14 or later), as listed in Red Hat Linux Errata Advisory RHSA-2002:035-18. See References.

For Red Hat Linux 7.2:
Upgrade to the latest version of PHP (4.0.6-15 or later), as listed in Red Hat Linux Errata Advisory RHSA-2002:035-18. See References.

For Mandrake Linux 7.1 and Corporate Server 1.0.1:
Upgrade to the latest version of PHP (4.0.6-5.8mdk or later), as listed in MandrakeSoft Security Advisory MDKSA-2002:017 : php. See References.

For Mandrake Linux 7.2:
Upgrade to the latest version of PHP (4.0.6-5.7mdk or later), as listed in MandrakeSoft Security Advisory MDKSA-2002:017 : php. See References.

For Mandrake Linux 8.0:
Upgrade to the latest version of PHP (4.0.6-5.6mdk or later), as listed in MandrakeSoft Security Advisory MDKSA-2002:017 : php. See References.

For Mandrake Linux 8.1:
Upgrade to the latest version of PHP (4.0.6-5.5mdk or later), as listed in MandrakeSoft Security Advisory MDKSA-2002:017 : php. See References.

For Mandrake Single Network Firewall 7.2:
Upgrade to the latest version of PHP (4.0.4pl1-4.2mdk or later), as listed in MandrakeSoft Security Advisory MDKSA-2002:017 : php. See References.

For Debian GNU/Linux 2.2 (potato):
Upgrade to the latest version of PHP3 (3.0.18-0potato1.1 or later) or PHP4 (4.0.3pl1-0potato3 or later), as listed in DSA 115-1. See References.

For EnGarde Secure Linux 1.0.1 (Finestra):
Upgrade to the latest version of php (4.0.6-1.0.18 or later), as listed in EnGarde Secure Linux Security Advisory ESA-20020301-006. See References.

For SuSE Linux 6.4, 7.0, 7.1, 7.2, and 7.2 (all platforms):
Upgrade to the latest version of mod_php or mod_php4, as listed in SuSE Security Announcement SuSE-SA:2002:007. See References.

For Trustix Secure Linux 1.1 and 1.2:
Upgrade to the latest version of mod_php3 (3.0.18-1tr or later), as listed in Trustix Secure Linux Security Advisory #2002-0033. See References.

For Trustix Secure Linux 1.5:
Upgrade to the latest version of mod_php4 (4.0.6-8tr or later), as listed in Trustix Secure Linux Security Advisory #2002-0033. See References.

For Caldera OpenLinux 3.1 and 3.1.1 (Server and Workstation):
Upgrade to the latest version of php (4.0.6-3.2 or later), as listed in Caldera International, Inc. Security Advisory CSSA-2002-023.0. See References.

For Conectiva Linux 5.0, prg graficos and ecommerce:
Upgrade to the latest package of php (3.0.18-6U50_1cl or later), as listed in Conectiva Linux Security Announcement CLSA-2002:468. See References.

For Conectiva Linux 5.1:
Upgrade to the latest package of php (3.0.18-6U51_1cl or later), as listed in Conectiva Linux Security Announcement CLSA-2002:468. See References.

For Conectiva Linux 6.0:
Upgrade to the latest package of php (3.0.18-9U60_1cl or later), as listed in Conectiva Linux Security Announcement CLSA-2002:468. See References.

For Conectiva Linux 7.0:
Upgrade to the latest package of php (4.1.1-1U70_4cl or later), as listed in Conectiva Linux Security Announcement CLSA-2002:468. See References.

For other distributions:
Contact your vendor for upgrade or patch information.

References:

Platforms Affected:

  • Conectiva Linux 5.0
  • Conectiva Linux 5.1
  • Conectiva Linux 6.0
  • Conectiva Linux 7.0
  • Conectiva Linux ecommerce
  • Conectiva Linux prg_graficos
  • Debian Debian Linux 2.2
  • EngardeLinux Secure Community 1.0.1
  • MandrakeSoft Mandrake Linux 7.1
  • MandrakeSoft Mandrake Linux 7.2
  • MandrakeSoft Mandrake Linux 8.0
  • MandrakeSoft Mandrake Linux 8.1
  • MandrakeSoft Mandrake Linux Corporate Server 1.0.1
  • MandrakeSoft Mandrake Single Network Firewall 7.2
  • PHP PHP 3.0.10
  • PHP PHP 3.0.11
  • PHP PHP 3.0.12
  • PHP PHP 3.0.13
  • PHP PHP 3.0.14
  • PHP PHP 3.0.15
  • PHP PHP 3.0.16
  • PHP PHP 3.0.17
  • PHP PHP 3.0.18
  • PHP PHP 4.0 Beta 4 Patch1
  • PHP PHP 4.0 Beta1
  • PHP PHP 4.0 Beta2
  • PHP PHP 4.0 Beta3
  • PHP PHP 4.0 Beta4
  • PHP PHP 4.0 RC1
  • PHP PHP 4.0 RC2
  • PHP PHP 4.0.0
  • PHP PHP 4.0.1
  • PHP PHP 4.0.2
  • PHP PHP 4.0.3
  • PHP PHP 4.0.4
  • PHP PHP 4.0.5
  • PHP PHP 4.0.6
  • PHP PHP 4.0.7
  • PHP PHP 4.1.0
  • PHP PHP 4.1.1
  • RedHat Linux 6.2
  • RedHat Linux 7
  • RedHat Linux 7.1
  • RedHat Linux 7.2
  • RedHat Linux 7.3
  • SCO Caldera OpenLinux Server 3.1
  • SCO Caldera OpenLinux Server 3.1.1
  • SCO Caldera OpenLinux Workstation 3.1
  • SCO Caldera OpenLinux Workstation 3.1.1
  • SUSE SuSE Linux 6.4
  • SUSE SuSE Linux 7.0
  • SUSE SuSE Linux 7.1
  • SUSE SuSE Linux 7.2
  • SUSE SuSE Linux 7.3
  • Trustix Secure Linux 1.1
  • Trustix Secure Linux 1.2
  • Trustix Secure Linux 1.5

Reported:

Feb 27, 2002

The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.

For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this

Return to the main page