Wednesday, September 22, 2010

PHP: code execution security vulnerabilities

Users of PHP please be advised of a code execution security vulnerabilities that has been identified.

To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)

Amplify’d from www.criticalwatch.com
USN-989-1: [USN-989-1] PHP code execution, security vulnerabilities
Details follow:



Auke van Slooten discovered that PHP incorrectly handled certain xmlrpc

requests. An attacker could exploit this issue to cause the PHP server to

crash, resulting in a denial of service. This issue only affected Ubuntu

6.06 LTS, 8.04 LTS, 9.04 and 9.10. (CVE-2010-0397)



It was discovered that the pseudorandom number generator in PHP did not

provide the expected entropy. An attacker could exploit this issue to

predict values that were intended to be random, such as session cookies.

This issue only affected Ubuntu 6.06 LTS, 8.04 LTS, 9.04 and 9.10.

(CVE-2010-1128)
Read more at www.criticalwatch.com
 

No comments:

Post a Comment