Debian Security Advisory

DSA-1295-1 php5 -- several vulnerabilities

Date Reported:
19 May 2007
Affected Packages:
Security database references:
In Mitre's CVE dictionary: CVE-2007-2509, CVE-2007-2510.
More information:

Several remote vulnerabilities have been discovered in PHP, a server-side, HTML-embedded scripting language, which may lead to the execution of arbitrary code. The Common Vulnerabilities and Exposures project identifies the following problems:

  • CVE-2007-2509

    It was discovered that missing input sanitising inside the ftp extension permits an attacker to execute arbitrary FTP commands. This requires the attacker to already have access to the FTP server.

  • CVE-2007-2510

    It was discovered that a buffer overflow in the SOAP extension permits the execution of arbitrary code.

The oldstable distribution (sarge) doesn't include php5.

For the stable distribution (etch) these problems have been fixed in version 5.2.0-8+etch4.

For the unstable distribution (sid) these problems have been fixed in version 5.2.2-1.

We recommend that you upgrade your PHP packages. Packages for the Sparc architectures are not yet available, due to problems on the build host. They will be provided later.

Fixed in:

Debian GNU/Linux 4.0 (etch)

Architecture-independent component:
Intel IA-32:
Intel IA-64:
Big endian MIPS:
Little endian MIPS:
IBM S/390:

MD5 checksums of the listed files are available in the original advisory.