Executive Summary

Summary
Title php5 regression update
Informations
Name DSA-3074 First vendor Publication 2014-11-18
Vendor Debian Last vendor Modification 2014-11-19
Severity (Vendor) N/A Revision 2

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P)
Cvss Base Score 5 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

The previous update for php5, DSA-3074-1, introduced regression in the sessionclean cron script. The change was intended to fix a potential symlink attack using filenames including the NULL character (Debian bug #766147), but depended on sed package version too recent, not in Wheezy.

This update reverts the fix, so people are advised to keep kernel symlink protection (sysctl fs.protected_symlinks=1) enabled as it is by default on Wheezy, which is enough to prevent successful exploitation.

For the stable distribution (wheezy), this problem has been fixed in version 5.4.35-0+deb7u2.

We recommend that you upgrade your php5 packages.

Original Source

Url : http://www.debian.org/security/2014/dsa-3074

Alert History

If you want to see full details history, please login or register.
0
1
2
Date Informations
2014-11-21 13:25:14
  • Multiple Updates
2014-11-19 13:22:57
  • Multiple Updates
2014-11-19 00:21:36
  • First insertion