Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

openSUSE-SU-2018:4038-1

Опубликовано: 07 дек. 2018
Источник: suse-cvrf

Описание

Recommended update for php5

This update for php5 fixes the following issues:

Security issue fixed:

  • CVE-2018-19518: Fixed imap_open script injection flaw (bsc#1117107).

This update was imported from the SUSE:SLE-12:Update update project.

Список пакетов

openSUSE Leap 42.3
apache2-mod_php5-5.5.14-109.1
php5-5.5.14-109.1
php5-bcmath-5.5.14-109.1
php5-bz2-5.5.14-109.1
php5-calendar-5.5.14-109.1
php5-ctype-5.5.14-109.1
php5-curl-5.5.14-109.1
php5-dba-5.5.14-109.1
php5-devel-5.5.14-109.1
php5-dom-5.5.14-109.1
php5-enchant-5.5.14-109.1
php5-exif-5.5.14-109.1
php5-fastcgi-5.5.14-109.1
php5-fileinfo-5.5.14-109.1
php5-firebird-5.5.14-109.1
php5-fpm-5.5.14-109.1
php5-ftp-5.5.14-109.1
php5-gd-5.5.14-109.1
php5-gettext-5.5.14-109.1
php5-gmp-5.5.14-109.1
php5-iconv-5.5.14-109.1
php5-imap-5.5.14-109.1
php5-intl-5.5.14-109.1
php5-json-5.5.14-109.1
php5-ldap-5.5.14-109.1
php5-mbstring-5.5.14-109.1
php5-mcrypt-5.5.14-109.1
php5-mssql-5.5.14-109.1
php5-mysql-5.5.14-109.1
php5-odbc-5.5.14-109.1
php5-opcache-5.5.14-109.1
php5-openssl-5.5.14-109.1
php5-pcntl-5.5.14-109.1
php5-pdo-5.5.14-109.1
php5-pear-5.5.14-109.1
php5-pgsql-5.5.14-109.1
php5-phar-5.5.14-109.1
php5-posix-5.5.14-109.1
php5-pspell-5.5.14-109.1
php5-readline-5.5.14-109.1
php5-shmop-5.5.14-109.1
php5-snmp-5.5.14-109.1
php5-soap-5.5.14-109.1
php5-sockets-5.5.14-109.1
php5-sqlite-5.5.14-109.1
php5-suhosin-5.5.14-109.1
php5-sysvmsg-5.5.14-109.1
php5-sysvsem-5.5.14-109.1
php5-sysvshm-5.5.14-109.1
php5-tidy-5.5.14-109.1
php5-tokenizer-5.5.14-109.1
php5-wddx-5.5.14-109.1
php5-xmlreader-5.5.14-109.1
php5-xmlrpc-5.5.14-109.1
php5-xmlwriter-5.5.14-109.1
php5-xsl-5.5.14-109.1
php5-zip-5.5.14-109.1
php5-zlib-5.5.14-109.1

Описание

University of Washington IMAP Toolkit 2007f on UNIX, as used in imap_open() in PHP and other products, launches an rsh command (by means of the imap_rimap function in c-client/imap4r1.c and the tcp_aopen function in osdep/unix/tcp_unix.c) without preventing argument injection, which might allow remote attackers to execute arbitrary OS commands if the IMAP server name is untrusted input (e.g., entered by a user of a web application) and if rsh has been replaced by a program with different argument semantics. For example, if rsh is a link to ssh (as seen on Debian and Ubuntu systems), then the attack can use an IMAP server name containing a "-oProxyCommand" argument.


Затронутые продукты
openSUSE Leap 42.3:apache2-mod_php5-5.5.14-109.1
openSUSE Leap 42.3:php5-5.5.14-109.1
openSUSE Leap 42.3:php5-bcmath-5.5.14-109.1
openSUSE Leap 42.3:php5-bz2-5.5.14-109.1

Ссылки