[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

UNIRAS Brief - 737/06 - Two Red Hat Security Advisories:



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

______________________________________________________________________________

 UNIRAS (UK Government CERT) Briefing - 737/06 dated 10.11.06 time 14:00
 UNIRAS is part of NISCC (the UK National Infrastructure Security
 Co-ordination Centre)
______________________________________________________________________________

 UNIRAS material is available from the NISCC website at www.niscc.gov.uk
______________________________________________________________________________

Title
=====

Two Red Hat Security Advisories:

1. RHSA-2006:0726-01 - Moderate: wireshark security update
     
2. RHSA-2006:0731-01 - Important: php security update

Detail
======

1. Wireshark is a program for monitoring network traffic.
Several flaws were found in Wireshark's HTTP, WBXML, LDAP, and XOT protocol
dissectors. Wireshark could crash or stop responding if it read a malformed
packet off the network. (CVE-2006-4805, CVE-2006-5468, CVE-2006-5469,
CVE-2006-5740)

2. PHP is an HTML-embedded scripting language commonly used with the Apache
HTTP Web server.
The Hardened-PHP Project discovered an overflow in the PHP htmlentities()
and htmlspecialchars() routines.  If a PHP script used the vulnerable
functions to parse UTF-8 data, a remote attacker sending a carefully
crafted request could trigger the overflow and potentially execute
arbitrary code as the 'apache' user. (CVE-2006-5465) 




1.



- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - ---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Moderate: wireshark security update
Advisory ID:       RHSA-2006:0726-01
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2006-0726.html
Issue date:        2006-11-09
Updated on:        2006-11-09
Product:           Red Hat Enterprise Linux
CVE Names:         CVE-2006-4574 CVE-2006-4805 CVE-2006-5468 
                   CVE-2006-5469 CVE-2006-5740 
- - ---------------------------------------------------------------------

1. Summary:

New Wireshark packages that fix various security vulnerabilities are now
available.

This update has been rated as having moderate security impact by the Red
Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64
Red Hat Linux Advanced Workstation 2.1 - ia64
Red Hat Enterprise Linux ES version 2.1 - i386
Red Hat Enterprise Linux WS version 2.1 - i386
Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Desktop version 3 - i386, x86_64
Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64

3. Problem description:

Wireshark is a program for monitoring network traffic.

Several flaws were found in Wireshark's HTTP, WBXML, LDAP, and XOT protocol
dissectors. Wireshark could crash or stop responding if it read a malformed
packet off the network. (CVE-2006-4805, CVE-2006-5468, CVE-2006-5469,
CVE-2006-5740)

A single NULL byte heap based buffer overflow was found in Wireshark's MIME
Multipart dissector. Wireshark could crash or possibly execute arbitrary
arbitrary code as the user running Wireshark. (CVE-2006-4574)

Users of Wireshark should upgrade to these updated packages containing
Wireshark version 0.99.4, which is not vulnerable to these issues.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via Red Hat Network.  To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

5. Bug IDs fixed (http://bugzilla.redhat.com/):

211993 - CVE-2006-4574 Multiple Wireshark issues (CVE-2006-4805, CVE-2006-5468, CVE-2006-5469, CVE-2006-5740)

6. RPMs required:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1AS/en/RHEL/SRPMS/wireshark-0.99.4-AS21.1.src.rpm
0044a0fccca9671b0733bacd5953e56b  wireshark-0.99.4-AS21.1.src.rpm

i386:
b74bd883b6fa0bd1c1aaa87fefb94f23  wireshark-0.99.4-AS21.1.i386.rpm
4240d003577952c65242b04388b664e6  wireshark-gnome-0.99.4-AS21.1.i386.rpm

ia64:
0b569ad061f9815fdb7a52959701852e  wireshark-0.99.4-AS21.1.ia64.rpm
f33a6afaf448d5be1a91da35a2699b41  wireshark-gnome-0.99.4-AS21.1.ia64.rpm

Red Hat Linux Advanced Workstation 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1AW/en/RHEL/SRPMS/wireshark-0.99.4-AS21.1.src.rpm
0044a0fccca9671b0733bacd5953e56b  wireshark-0.99.4-AS21.1.src.rpm

ia64:
0b569ad061f9815fdb7a52959701852e  wireshark-0.99.4-AS21.1.ia64.rpm
f33a6afaf448d5be1a91da35a2699b41  wireshark-gnome-0.99.4-AS21.1.ia64.rpm

Red Hat Enterprise Linux ES version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1ES/en/RHEL/SRPMS/wireshark-0.99.4-AS21.1.src.rpm
0044a0fccca9671b0733bacd5953e56b  wireshark-0.99.4-AS21.1.src.rpm

i386:
b74bd883b6fa0bd1c1aaa87fefb94f23  wireshark-0.99.4-AS21.1.i386.rpm
4240d003577952c65242b04388b664e6  wireshark-gnome-0.99.4-AS21.1.i386.rpm

Red Hat Enterprise Linux WS version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1WS/en/RHEL/SRPMS/wireshark-0.99.4-AS21.1.src.rpm
0044a0fccca9671b0733bacd5953e56b  wireshark-0.99.4-AS21.1.src.rpm

i386:
b74bd883b6fa0bd1c1aaa87fefb94f23  wireshark-0.99.4-AS21.1.i386.rpm
4240d003577952c65242b04388b664e6  wireshark-gnome-0.99.4-AS21.1.i386.rpm

Red Hat Enterprise Linux AS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3AS/en/RHEL/SRPMS/wireshark-0.99.4-EL3.1.src.rpm
4d59c60c99a374f67ffcb7392783549a  wireshark-0.99.4-EL3.1.src.rpm

i386:
f71c6c6b2c855f5576e907aeef50191e  wireshark-0.99.4-EL3.1.i386.rpm
35a9915c3ae5a22ab1a76bd5d6d7c422  wireshark-debuginfo-0.99.4-EL3.1.i386.rpm
6861386ad3bbd70399012c74d7509e71  wireshark-gnome-0.99.4-EL3.1.i386.rpm

ia64:
03e212be1a5dc7434628fa234c31bfc6  wireshark-0.99.4-EL3.1.ia64.rpm
72b5a6647025addf98b7699a865834fc  wireshark-debuginfo-0.99.4-EL3.1.ia64.rpm
5744bab221aeb6f132e1038c6690347a  wireshark-gnome-0.99.4-EL3.1.ia64.rpm

ppc:
f20fd0fe2fd6aa43d504a7c237b6ee17  wireshark-0.99.4-EL3.1.ppc.rpm
fc5232d9c54292e069522e3b6a2bec97  wireshark-debuginfo-0.99.4-EL3.1.ppc.rpm
5c901cb605c1ce1868af805df479217f  wireshark-gnome-0.99.4-EL3.1.ppc.rpm

s390:
01b7661dfef18533ba69210e66dc0b73  wireshark-0.99.4-EL3.1.s390.rpm
f37b3d3d51c5043fedc31d66dc197770  wireshark-debuginfo-0.99.4-EL3.1.s390.rpm
918a15ce4e05fe2be3556ed1e62c7d05  wireshark-gnome-0.99.4-EL3.1.s390.rpm

s390x:
8c93a7af1347075dbb663fcd26e2741d  wireshark-0.99.4-EL3.1.s390x.rpm
87229e0ccd2cd2d9c4402b388f4546c8  wireshark-debuginfo-0.99.4-EL3.1.s390x.rpm
f44b0ee5d41d4ecd0622210fcf0ef6f4  wireshark-gnome-0.99.4-EL3.1.s390x.rpm

x86_64:
7bed2f6949e0764ecbd1363a69383b09  wireshark-0.99.4-EL3.1.x86_64.rpm
3d843711818a31fdc2a53b6e68f5dd1b  wireshark-debuginfo-0.99.4-EL3.1.x86_64.rpm
41685c568cb33f8a98648ca637a2d7a4  wireshark-gnome-0.99.4-EL3.1.x86_64.rpm

Red Hat Desktop version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3desktop/en/RHEL/SRPMS/wireshark-0.99.4-EL3.1.src.rpm
4d59c60c99a374f67ffcb7392783549a  wireshark-0.99.4-EL3.1.src.rpm

i386:
f71c6c6b2c855f5576e907aeef50191e  wireshark-0.99.4-EL3.1.i386.rpm
35a9915c3ae5a22ab1a76bd5d6d7c422  wireshark-debuginfo-0.99.4-EL3.1.i386.rpm
6861386ad3bbd70399012c74d7509e71  wireshark-gnome-0.99.4-EL3.1.i386.rpm

x86_64:
7bed2f6949e0764ecbd1363a69383b09  wireshark-0.99.4-EL3.1.x86_64.rpm
3d843711818a31fdc2a53b6e68f5dd1b  wireshark-debuginfo-0.99.4-EL3.1.x86_64.rpm
41685c568cb33f8a98648ca637a2d7a4  wireshark-gnome-0.99.4-EL3.1.x86_64.rpm

Red Hat Enterprise Linux ES version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3ES/en/RHEL/SRPMS/wireshark-0.99.4-EL3.1.src.rpm
4d59c60c99a374f67ffcb7392783549a  wireshark-0.99.4-EL3.1.src.rpm

i386:
f71c6c6b2c855f5576e907aeef50191e  wireshark-0.99.4-EL3.1.i386.rpm
35a9915c3ae5a22ab1a76bd5d6d7c422  wireshark-debuginfo-0.99.4-EL3.1.i386.rpm
6861386ad3bbd70399012c74d7509e71  wireshark-gnome-0.99.4-EL3.1.i386.rpm

ia64:
03e212be1a5dc7434628fa234c31bfc6  wireshark-0.99.4-EL3.1.ia64.rpm
72b5a6647025addf98b7699a865834fc  wireshark-debuginfo-0.99.4-EL3.1.ia64.rpm
5744bab221aeb6f132e1038c6690347a  wireshark-gnome-0.99.4-EL3.1.ia64.rpm

x86_64:
7bed2f6949e0764ecbd1363a69383b09  wireshark-0.99.4-EL3.1.x86_64.rpm
3d843711818a31fdc2a53b6e68f5dd1b  wireshark-debuginfo-0.99.4-EL3.1.x86_64.rpm
41685c568cb33f8a98648ca637a2d7a4  wireshark-gnome-0.99.4-EL3.1.x86_64.rpm

Red Hat Enterprise Linux WS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3WS/en/RHEL/SRPMS/wireshark-0.99.4-EL3.1.src.rpm
4d59c60c99a374f67ffcb7392783549a  wireshark-0.99.4-EL3.1.src.rpm

i386:
f71c6c6b2c855f5576e907aeef50191e  wireshark-0.99.4-EL3.1.i386.rpm
35a9915c3ae5a22ab1a76bd5d6d7c422  wireshark-debuginfo-0.99.4-EL3.1.i386.rpm
6861386ad3bbd70399012c74d7509e71  wireshark-gnome-0.99.4-EL3.1.i386.rpm

ia64:
03e212be1a5dc7434628fa234c31bfc6  wireshark-0.99.4-EL3.1.ia64.rpm
72b5a6647025addf98b7699a865834fc  wireshark-debuginfo-0.99.4-EL3.1.ia64.rpm
5744bab221aeb6f132e1038c6690347a  wireshark-gnome-0.99.4-EL3.1.ia64.rpm

x86_64:
7bed2f6949e0764ecbd1363a69383b09  wireshark-0.99.4-EL3.1.x86_64.rpm
3d843711818a31fdc2a53b6e68f5dd1b  wireshark-debuginfo-0.99.4-EL3.1.x86_64.rpm
41685c568cb33f8a98648ca637a2d7a4  wireshark-gnome-0.99.4-EL3.1.x86_64.rpm

Red Hat Enterprise Linux AS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4AS/en/RHEL/SRPMS/wireshark-0.99.4-EL4.1.src.rpm
b1a38e3fa8fd9c7c48a0656379ab7d8f  wireshark-0.99.4-EL4.1.src.rpm

i386:
c928c01ee33bc8bb911a7b0cae309211  wireshark-0.99.4-EL4.1.i386.rpm
d741948a5eab62bc83e4355e1dd7833a  wireshark-debuginfo-0.99.4-EL4.1.i386.rpm
129275da7e12c989135c107493bfd1b6  wireshark-gnome-0.99.4-EL4.1.i386.rpm

ia64:
13015d70892b94b5c1ef57ad6c3d2a3e  wireshark-0.99.4-EL4.1.ia64.rpm
eb2225ef824146be3c9fbfa65e79898e  wireshark-debuginfo-0.99.4-EL4.1.ia64.rpm
9d3e24a1f93e3439817eae3403293ed6  wireshark-gnome-0.99.4-EL4.1.ia64.rpm

ppc:
b9b57ad476bf11236cc17db38c80011a  wireshark-0.99.4-EL4.1.ppc.rpm
18b660267144802a5a4a63201368ece6  wireshark-debuginfo-0.99.4-EL4.1.ppc.rpm
5c8e0feb48e0b59a7ee7db132f2d0d0d  wireshark-gnome-0.99.4-EL4.1.ppc.rpm

s390:
2ee68666a5c43132ba15d72d6edcd40f  wireshark-0.99.4-EL4.1.s390.rpm
74c6c26f4e51ba06f63eab2613c8ab2e  wireshark-debuginfo-0.99.4-EL4.1.s390.rpm
a0fe55b1d72438d52249191450eb833c  wireshark-gnome-0.99.4-EL4.1.s390.rpm

s390x:
807c2940f8091242fe13e6278ec7b4b2  wireshark-0.99.4-EL4.1.s390x.rpm
903b1eb1e5d20288be64df9639ac5352  wireshark-debuginfo-0.99.4-EL4.1.s390x.rpm
005596f5c35bcef053c923be315a0610  wireshark-gnome-0.99.4-EL4.1.s390x.rpm

x86_64:
f6e29f056b7b6ec894ffa15f1e3c28a9  wireshark-0.99.4-EL4.1.x86_64.rpm
4041f21163382e20847cd2a1fa18bb1b  wireshark-debuginfo-0.99.4-EL4.1.x86_64.rpm
775d4bd277c4a86edf54c7b87c15f167  wireshark-gnome-0.99.4-EL4.1.x86_64.rpm

Red Hat Enterprise Linux Desktop version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4Desktop/en/RHEL/SRPMS/wireshark-0.99.4-EL4.1.src.rpm
b1a38e3fa8fd9c7c48a0656379ab7d8f  wireshark-0.99.4-EL4.1.src.rpm

i386:
c928c01ee33bc8bb911a7b0cae309211  wireshark-0.99.4-EL4.1.i386.rpm
d741948a5eab62bc83e4355e1dd7833a  wireshark-debuginfo-0.99.4-EL4.1.i386.rpm
129275da7e12c989135c107493bfd1b6  wireshark-gnome-0.99.4-EL4.1.i386.rpm

x86_64:
f6e29f056b7b6ec894ffa15f1e3c28a9  wireshark-0.99.4-EL4.1.x86_64.rpm
4041f21163382e20847cd2a1fa18bb1b  wireshark-debuginfo-0.99.4-EL4.1.x86_64.rpm
775d4bd277c4a86edf54c7b87c15f167  wireshark-gnome-0.99.4-EL4.1.x86_64.rpm

Red Hat Enterprise Linux ES version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4ES/en/RHEL/SRPMS/wireshark-0.99.4-EL4.1.src.rpm
b1a38e3fa8fd9c7c48a0656379ab7d8f  wireshark-0.99.4-EL4.1.src.rpm

i386:
c928c01ee33bc8bb911a7b0cae309211  wireshark-0.99.4-EL4.1.i386.rpm
d741948a5eab62bc83e4355e1dd7833a  wireshark-debuginfo-0.99.4-EL4.1.i386.rpm
129275da7e12c989135c107493bfd1b6  wireshark-gnome-0.99.4-EL4.1.i386.rpm

ia64:
13015d70892b94b5c1ef57ad6c3d2a3e  wireshark-0.99.4-EL4.1.ia64.rpm
eb2225ef824146be3c9fbfa65e79898e  wireshark-debuginfo-0.99.4-EL4.1.ia64.rpm
9d3e24a1f93e3439817eae3403293ed6  wireshark-gnome-0.99.4-EL4.1.ia64.rpm

x86_64:
f6e29f056b7b6ec894ffa15f1e3c28a9  wireshark-0.99.4-EL4.1.x86_64.rpm
4041f21163382e20847cd2a1fa18bb1b  wireshark-debuginfo-0.99.4-EL4.1.x86_64.rpm
775d4bd277c4a86edf54c7b87c15f167  wireshark-gnome-0.99.4-EL4.1.x86_64.rpm

Red Hat Enterprise Linux WS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4WS/en/RHEL/SRPMS/wireshark-0.99.4-EL4.1.src.rpm
b1a38e3fa8fd9c7c48a0656379ab7d8f  wireshark-0.99.4-EL4.1.src.rpm

i386:
c928c01ee33bc8bb911a7b0cae309211  wireshark-0.99.4-EL4.1.i386.rpm
d741948a5eab62bc83e4355e1dd7833a  wireshark-debuginfo-0.99.4-EL4.1.i386.rpm
129275da7e12c989135c107493bfd1b6  wireshark-gnome-0.99.4-EL4.1.i386.rpm

ia64:
13015d70892b94b5c1ef57ad6c3d2a3e  wireshark-0.99.4-EL4.1.ia64.rpm
eb2225ef824146be3c9fbfa65e79898e  wireshark-debuginfo-0.99.4-EL4.1.ia64.rpm
9d3e24a1f93e3439817eae3403293ed6  wireshark-gnome-0.99.4-EL4.1.ia64.rpm

x86_64:
f6e29f056b7b6ec894ffa15f1e3c28a9  wireshark-0.99.4-EL4.1.x86_64.rpm
4041f21163382e20847cd2a1fa18bb1b  wireshark-debuginfo-0.99.4-EL4.1.x86_64.rpm
775d4bd277c4a86edf54c7b87c15f167  wireshark-gnome-0.99.4-EL4.1.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4574
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4805
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5468
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5469
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5740
http://www.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is <secalert@xxxxxxxxxx>.  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2006 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iD8DBQFFU32pXlSAg2UNWIIRAn8ZAJ9SdULy0YBgf5azB2lgH2HbfpecfwCfc7Ly
SpCUFYkaaMy8zgFm41ldlac=
=OPMj
- -----END PGP SIGNATURE-----



2.



- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - ---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Important: php security update
Advisory ID:       RHSA-2006:0731-01
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2006-0731.html
Issue date:        2006-11-10
Updated on:        2006-11-10
Product:           Red Hat Application Stack
CVE Names:         CVE-2006-5465 
- - ---------------------------------------------------------------------

1. Summary:

Updated PHP packages that fix a security issue are now available for the
Red Hat Application Stack.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Application Stack v1 for Enterprise Linux AS (v.4) - i386, x86_64
Red Hat Application Stack v1 for Enterprise Linux ES (v.4) - i386, x86_64

3. Problem description:

PHP is an HTML-embedded scripting language commonly used with the Apache
HTTP Web server.

The Hardened-PHP Project discovered an overflow in the PHP htmlentities()
and htmlspecialchars() routines.  If a PHP script used the vulnerable
functions to parse UTF-8 data, a remote attacker sending a carefully
crafted request could trigger the overflow and potentially execute
arbitrary code as the 'apache' user. (CVE-2006-5465) 

Users of PHP should upgrade to these updated packages which contain a
backported patch to correct this issue.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via Red Hat Network.  To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

5. Bug IDs fixed (http://bugzilla.redhat.com/):

213644 - CVE-2006-5465 PHP buffer overflow

6. RPMs required:

Red Hat Application Stack v1 for Enterprise Linux AS (v.4):

SRPMS:
ftp://updates.redhat.com/4AS-RHWAS/en/os/SRPMS/php-5.1.4-1.el4s1.5.src.rpm
9161a1d8e9bce699d4bd831b9b0ca06f  php-5.1.4-1.el4s1.5.src.rpm

i386:
83947aee60a8d3ee50e440de5ab47fd0  php-5.1.4-1.el4s1.5.i386.rpm
13ae4bedc7e1687f5b6e49cfa778268c  php-bcmath-5.1.4-1.el4s1.5.i386.rpm
0acb5aeb696fae4b66613b0069498b43  php-dba-5.1.4-1.el4s1.5.i386.rpm
baf8296a4ef6ca6bd58fa435b610ad38  php-debuginfo-5.1.4-1.el4s1.5.i386.rpm
50e3d2f7054f9c06c1ed189859a263c7  php-devel-5.1.4-1.el4s1.5.i386.rpm
f28e19c9cf8f2862a5e7b5473646ad4c  php-gd-5.1.4-1.el4s1.5.i386.rpm
bbfb6117572d65c5ddef5867a1ba2602  php-imap-5.1.4-1.el4s1.5.i386.rpm
e630f9ec2a88f94de7cffedbb69dc13f  php-ldap-5.1.4-1.el4s1.5.i386.rpm
86628677256e0dcf96d5e5f1b6782e4b  php-mbstring-5.1.4-1.el4s1.5.i386.rpm
0fe958c2a351bb83a612e62ec233adc4  php-mysql-5.1.4-1.el4s1.5.i386.rpm
bf4c8581463c09a64e95aa9fb1bc7541  php-ncurses-5.1.4-1.el4s1.5.i386.rpm
a3f61f9b1a3aaa1ae45a17609e3a883d  php-odbc-5.1.4-1.el4s1.5.i386.rpm
2776adfdc5b395a055e8c678cba4fc6e  php-pdo-5.1.4-1.el4s1.5.i386.rpm
2fae4d10a2a18db6e1b30d7eb3cae8ad  php-pgsql-5.1.4-1.el4s1.5.i386.rpm
d784de802fe900fe0f03cf7bfe2432a5  php-snmp-5.1.4-1.el4s1.5.i386.rpm
5b97be5e2b5de8ed19950e284a0410d0  php-soap-5.1.4-1.el4s1.5.i386.rpm
f1bbc1d5bdc903b9d469ee1fc9993954  php-xml-5.1.4-1.el4s1.5.i386.rpm
ec864278247fe343b014e736b92fe393  php-xmlrpc-5.1.4-1.el4s1.5.i386.rpm

x86_64:
6db081a10dfa5af39e2f2f150b3c91b7  php-5.1.4-1.el4s1.5.x86_64.rpm
0f847444a2c2b9e2efa63b6430a2d1a2  php-bcmath-5.1.4-1.el4s1.5.x86_64.rpm
913527609e55127c5a62fa74ae7a055a  php-dba-5.1.4-1.el4s1.5.x86_64.rpm
6715be4d78de845a1c901d33d2a64a31  php-debuginfo-5.1.4-1.el4s1.5.x86_64.rpm
f7e197b2b1507513b0d2fe10f9222749  php-devel-5.1.4-1.el4s1.5.x86_64.rpm
c0214169b8fbd802ab60d69ad7e8cdbf  php-gd-5.1.4-1.el4s1.5.x86_64.rpm
0073cb2971941a6f48b1d6d2ff9d8463  php-imap-5.1.4-1.el4s1.5.x86_64.rpm
32139845801f794850ef3f9d5168e14c  php-ldap-5.1.4-1.el4s1.5.x86_64.rpm
88a355fa5d7cab6dd63e16014d2667b9  php-mbstring-5.1.4-1.el4s1.5.x86_64.rpm
6dd28379b47bf167b72c6d266fdd9ad7  php-mysql-5.1.4-1.el4s1.5.x86_64.rpm
14c241ac5172c06eb6e61103932a3e2e  php-ncurses-5.1.4-1.el4s1.5.x86_64.rpm
c3a70245150763eb9244a19206f6cbe5  php-odbc-5.1.4-1.el4s1.5.x86_64.rpm
a8616a5c2c84273ba6932aa8b93d5d72  php-pdo-5.1.4-1.el4s1.5.x86_64.rpm
be110a73781f9d4856d020d9e2c84415  php-pgsql-5.1.4-1.el4s1.5.x86_64.rpm
4a6ad0570e308e421351af1cb55ac3a3  php-snmp-5.1.4-1.el4s1.5.x86_64.rpm
ab3ec9bf114ad466aeffb5be74f59bc5  php-soap-5.1.4-1.el4s1.5.x86_64.rpm
4453298b314c8bc9cfc8840f25037ac7  php-xml-5.1.4-1.el4s1.5.x86_64.rpm
a4cc0023fa194029b7fc57f295419b3b  php-xmlrpc-5.1.4-1.el4s1.5.x86_64.rpm

Red Hat Application Stack v1 for Enterprise Linux ES (v.4):

SRPMS:
ftp://updates.redhat.com/4ES-RHWAS/en/os/SRPMS/php-5.1.4-1.el4s1.5.src.rpm
9161a1d8e9bce699d4bd831b9b0ca06f  php-5.1.4-1.el4s1.5.src.rpm

i386:
83947aee60a8d3ee50e440de5ab47fd0  php-5.1.4-1.el4s1.5.i386.rpm
13ae4bedc7e1687f5b6e49cfa778268c  php-bcmath-5.1.4-1.el4s1.5.i386.rpm
0acb5aeb696fae4b66613b0069498b43  php-dba-5.1.4-1.el4s1.5.i386.rpm
baf8296a4ef6ca6bd58fa435b610ad38  php-debuginfo-5.1.4-1.el4s1.5.i386.rpm
50e3d2f7054f9c06c1ed189859a263c7  php-devel-5.1.4-1.el4s1.5.i386.rpm
f28e19c9cf8f2862a5e7b5473646ad4c  php-gd-5.1.4-1.el4s1.5.i386.rpm
bbfb6117572d65c5ddef5867a1ba2602  php-imap-5.1.4-1.el4s1.5.i386.rpm
e630f9ec2a88f94de7cffedbb69dc13f  php-ldap-5.1.4-1.el4s1.5.i386.rpm
86628677256e0dcf96d5e5f1b6782e4b  php-mbstring-5.1.4-1.el4s1.5.i386.rpm
0fe958c2a351bb83a612e62ec233adc4  php-mysql-5.1.4-1.el4s1.5.i386.rpm
bf4c8581463c09a64e95aa9fb1bc7541  php-ncurses-5.1.4-1.el4s1.5.i386.rpm
a3f61f9b1a3aaa1ae45a17609e3a883d  php-odbc-5.1.4-1.el4s1.5.i386.rpm
2776adfdc5b395a055e8c678cba4fc6e  php-pdo-5.1.4-1.el4s1.5.i386.rpm
2fae4d10a2a18db6e1b30d7eb3cae8ad  php-pgsql-5.1.4-1.el4s1.5.i386.rpm
d784de802fe900fe0f03cf7bfe2432a5  php-snmp-5.1.4-1.el4s1.5.i386.rpm
5b97be5e2b5de8ed19950e284a0410d0  php-soap-5.1.4-1.el4s1.5.i386.rpm
f1bbc1d5bdc903b9d469ee1fc9993954  php-xml-5.1.4-1.el4s1.5.i386.rpm
ec864278247fe343b014e736b92fe393  php-xmlrpc-5.1.4-1.el4s1.5.i386.rpm

x86_64:
6db081a10dfa5af39e2f2f150b3c91b7  php-5.1.4-1.el4s1.5.x86_64.rpm
0f847444a2c2b9e2efa63b6430a2d1a2  php-bcmath-5.1.4-1.el4s1.5.x86_64.rpm
913527609e55127c5a62fa74ae7a055a  php-dba-5.1.4-1.el4s1.5.x86_64.rpm
6715be4d78de845a1c901d33d2a64a31  php-debuginfo-5.1.4-1.el4s1.5.x86_64.rpm
f7e197b2b1507513b0d2fe10f9222749  php-devel-5.1.4-1.el4s1.5.x86_64.rpm
c0214169b8fbd802ab60d69ad7e8cdbf  php-gd-5.1.4-1.el4s1.5.x86_64.rpm
0073cb2971941a6f48b1d6d2ff9d8463  php-imap-5.1.4-1.el4s1.5.x86_64.rpm
32139845801f794850ef3f9d5168e14c  php-ldap-5.1.4-1.el4s1.5.x86_64.rpm
88a355fa5d7cab6dd63e16014d2667b9  php-mbstring-5.1.4-1.el4s1.5.x86_64.rpm
6dd28379b47bf167b72c6d266fdd9ad7  php-mysql-5.1.4-1.el4s1.5.x86_64.rpm
14c241ac5172c06eb6e61103932a3e2e  php-ncurses-5.1.4-1.el4s1.5.x86_64.rpm
c3a70245150763eb9244a19206f6cbe5  php-odbc-5.1.4-1.el4s1.5.x86_64.rpm
a8616a5c2c84273ba6932aa8b93d5d72  php-pdo-5.1.4-1.el4s1.5.x86_64.rpm
be110a73781f9d4856d020d9e2c84415  php-pgsql-5.1.4-1.el4s1.5.x86_64.rpm
4a6ad0570e308e421351af1cb55ac3a3  php-snmp-5.1.4-1.el4s1.5.x86_64.rpm
ab3ec9bf114ad466aeffb5be74f59bc5  php-soap-5.1.4-1.el4s1.5.x86_64.rpm
4453298b314c8bc9cfc8840f25037ac7  php-xml-5.1.4-1.el4s1.5.x86_64.rpm
a4cc0023fa194029b7fc57f295419b3b  php-xmlrpc-5.1.4-1.el4s1.5.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5465
http://www.hardened-php.net/advisory_132006.138.html
http://www.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is <secalert@xxxxxxxxxx>.  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2006 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iD8DBQFFVEHpXlSAg2UNWIIRApwlAJkBQS+/krcnKQUca2fm9j5b526VFgCfeAEu
nGnQVWdWKo5miIgKowRcKFc=
=Whe1
- -----END PGP SIGNATURE-----



______________________________________________________________________________

NISCC values your feedback.

1. Which of the following most reflects the value of the briefing to you?
(Place an 'X' next to your choice)

Very useful:__ Useful:__ Not useful:__ 

2. If you did not find it useful, why not?


3. Any other comments? How could we improve our briefings?


Thank you for your contribution.
______________________________________________________________________________

For additional information or assistance, please contact our help desk
by telephone.  You may send Not Protectively Marked information via
e-mail to uniras@xxxxxxxxxxxxx

Office hours:

Mon - Fri: 08:30 - 17:00 hours
Tel: +44 (0) 870 487 0748 and follow the voice prompts
Fax: +44 (0) 870 487 0749

On-call duty officer outside office hours:
Tel: +44 (0) 870 487 0748 and follow the voice prompts

______________________________________________________________________________

UNIRAS wishes to acknowledge the contributions of Red Hat for the
information contained in this briefing.
______________________________________________________________________________

This notice contains information released by the original author.
Some of the information may have changed since it was released. If the
vulnerability affects you, it may be prudent to retrieve the advisory
from the site of the original source to ensure that you receive the most
current information concerning that problem.

Reference to any specific commercial product, process, or service by
trade name, trademark manufacturer, or otherwise, does not constitute or
imply its endorsement, recommendation, or favouring by UNIRAS or NISCC.
The views and opinions of authors expressed within this notice shall not
be used for advertising or product endorsement purposes.

Neither UNIRAS or NISCC shall also accept responsibility for any errors
or omissions contained within this briefing notice. In particular, they
shall not be liable for any loss or damage whatsoever, arising from or
in connection with the usage of information contained within this
notice.

UNIRAS is a member of the Forum of Incident Response and Security Teams
(FIRST) and has contacts with other international Incident Response
Teams (IRTs) in order to foster cooperation and coordination in incident
prevention, to prompt rapid reaction to incidents, and to promote
information sharing amongst its members and the community at large.
______________________________________________________________________________

<End of UNIRAS Briefing>

-----BEGIN PGP SIGNATURE-----
Version: PGP 8.1

iQA/AwUBRVSFeGl7oeQsXfKvEQISTwCgibqICtaCjzw9uYE3jD3q7sUuMa4AoPfW
ovLaUfVnEuybOKPaIWHu4H7E
=6pr1
-----END PGP SIGNATURE-----


______________________________________________________________________
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email 
______________________________________________________________________

______________________________________________________________________
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email 
______________________________________________________________________