CentOS has released updated packages to address PHP _php_stream_scandir() function buffer overflow vulnerability.
PHP contains a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or execute arbitrary code on a targeted system.
The vulnerability is due to an unspecified error in the affected software. An unauthenticated, remote attacker could exploit this vulnerability by submitting crafted requests. Successful exploitation could trigger a buffer overflow condition that could allow the attacker to execute arbitrary code or cause a DoS condition on the system.
PHP has confirmed this vulnerability and released updated software.
The following PHP versions are vulnerable:
PHP versions 5.4.4 and prior
PHP versions 5.3.14 and prior
To exploit this vulnerability, the attacker would need to send crafted requests to a targeted system. To achieve this objective, the attacker would need access to trusted, internal networks. This access requirement decreases the likelihood of a successful exploit.
PHP has released a changelog at the following link: CVE-2012-2688
Apple has released a security advisory at the following link: HT5501
Red Hat has released updated software for registered subscribers at the following link: Red Hat Network. Red Hat packages can be updated on Red Hat Enterprise Linux versions 5 and later using the yum tool.
Version 4, February 22, 2013, 7:57 AM: Red Hat has released a security advisory and updated packages to address the PHP _php_stream_scandir() function buffer overflow vulnerability.
Version 3, September 26, 2012, 1:33 PM: Apple has released a security advisory and updated software to address the PHP _php_stream_scandir() function buffer overflow vulnerability.
Version 2, July 24, 2012, 1:22 PM: FreeBSD has released a VuXML document and updated ports collection to address the PHP _php_stream_scandir() function buffer overflow vulnerability.
Version 1, July 20, 2012, 12:08 PM: PHP contains a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service condition or execute arbitrary code. Updated software is available.
The security vulnerability applies to the following combinations of products.
5.3.0 Base | 5.3.1 Base | 5.3.10 Base | 5.3.11 Base | 5.3.12 Base | 5.3.13 Base | 5.3.14 Base | 5.3.2 Base | 5.3.3 Base | 5.3.4 Base | 5.3.5 Base | 5.3.6 Base | 5.3.7 Base | 5.3.8 Base | 5.3.9 Base | 5.4.0 Base | 5.4.1 Base | 5.4.2 Base | 5.4.3 Base | 5.4.4 Base
Mac OS X
10.6.1 Intel, PPC | 10.6.2 Base | 10.6.3 Base | 10.6.4 Base | 10.6.5 Base | 10.6.6 Base | 10.6.7 Base | 10.6.8 Base | 10.7 Base | 10.7.1 Base | 10.7.2 Base | 10.7.3 Base | 10.7.4 Base | 10.8 .1, Base | 10.8.1 Base
Mac OS X Server
10.6.1 Intel, PPC | 10.6.2 Base | 10.6.3 Base | 10.6.4 Base | 10.6.5 Base | 10.6.6 Base | 10.6.7 Base | 10.6.8 Base | 10.7 Base | 10.7.1 Base | 10.7.2 Base | 10.7.3 Base | 10.7.4 Base | 10.8.0 Base | 10.8.1 Base
LEGAL DISCLAIMER The urgency and severity ratings of this alert are not tailored to individual users; users may value alerts differently based upon their network configurations and circumstances. THE ALERT, AND INFORMATION CONTAINED THEREIN, ARE PROVIDED ON AN "AS IS" BASIS AND DO NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE ALERT, AND INFORMATION CONTAINED THEREIN, OR MATERIALS LINKED FROM THE ALERT, IS AT YOUR OWN RISK. INFORMATION IN THIS ALERT AND ANY RELATED COMMUNICATIONS IS BASED ON OUR KNOWLEDGE AT THE TIME OF PUBLICATION AND IS SUBJECT TO CHANGE WITHOUT NOTICE. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE ALERTS AT ANY TIME.