Debian Security Advisory

DSA-2089-1 php5 -- several vulnerabilities

Date Reported:
06 Aug 2010
Affected Packages:
Security database references:
In Mitre's CVE dictionary: CVE-2010-1917, CVE-2010-2225, CVE-2010-3065.
More information:

Several remote vulnerabilities have been discovered in PHP 5, an hypertext preprocessor. The Common Vulnerabilities and Exposures project identifies the following problems:

  • CVE-2010-1917

    The fnmatch function can be abused to conduct denial of service attacks (by crashing the interpreter) by the means of a stack overflow.

  • CVE-2010-2225

    The SplObjectStorage unserializer allows attackers to execute arbitrary code via serialized data by the means of a use-after-free vulnerability.

  • CVE-2010-3065

    The default sessions serializer does not correctly handle a special marker, which allows an attacker to inject arbitrary variables into the session and possibly exploit vulnerabilities in the unserializer.

  • CVE-2010-1128

    For this vulnerability (predictable entropy for the Linear Congruential Generator used to generate session ids) we do not consider upstream's solution to be sufficient. It is recommended to uncomment the session.entropy_file and session.entropy_length settings in the php.ini files. Further improvements can be achieved by setting session.hash_function to 1 (one) and incrementing the value of session.entropy_length.

For the stable distribution (lenny), these problems have been fixed in version 5.2.6.dfsg.1-1+lenny9.

For the testing distribution (squeeze) and the unstable distribution (sid), these problems will be fixed soon.

We recommend that you upgrade your php5 packages.

Fixed in:

Debian GNU/Linux 5.0 (stable)

Architecture-independent component:
HP Precision:
Intel IA-32:
Intel IA-64:
Big-endian MIPS:
Little-endian MIPS:
IBM S/390:
Sun Sparc:

MD5 checksums of the listed files are available in the original advisory.