Summary: | dev-php/PEAR-XML_RPC round 2 (CAN-2005-2498) | ||||||||
---|---|---|---|---|---|---|---|---|---|
Product: | Gentoo Security | Reporter: | Sune Kloppenborg Jeppesen (RETIRED) <jaervosz> | ||||||
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> | ||||||
Status: | RESOLVED FIXED | ||||||||
Severity: | major | CC: | php-bugs, yoswink | ||||||
Priority: | High | ||||||||
Version: | unspecified | ||||||||
Hardware: | All | ||||||||
OS: | Linux | ||||||||
Whiteboard: | B1 [glsa] jaervosz | ||||||||
Package list: | Runtime testing required: | --- | |||||||
Attachments: |
|
Description
Sune Kloppenborg Jeppesen (RETIRED)
2005-08-14 21:59:03 UTC
Created attachment 65988 [details]
pear_xml_rpc_without_eval.tgz
Patch by Stefan Esser.
Created attachment 65989 [details]
xmlrpc_1_branch.zip
Patch by Stefan Esser.
http://www.hardened-php.net/advisory_142005.66.html http://www.hardened-php.net/advisory_152005.67.html There is an error in the patch: + + case 'DATETIME.ISO8601': + $XML_RPC_xh[$parser]['vt'] = $GLOBALS['XML_RPC_DateTime']; + $XML_RPC_xh[$parser]['value'] = base64_decode($XML_RPC_xh[$parser] ['ac']); the base64_decode() call should not be there. *** Bug 102324 has been marked as a duplicate of this bug. *** Keeping this bug for PEAR XML-RPC only. Fixed version is PEAR XML_RPC 1.4.0 http://pear.php.net/get/XML_RPC-1.4.0.tgz dev-php/PEAR-XML_RPC-1.4.0 is already in the tree and marked stable. Thx everyone. GLSA 200508-13 |