Bug 853329 (CVE-2011-1398)

Summary: CVE-2011-1398 PHP: sapi_header_op() %0D sequence handling security bypass
Product: [Other] Security Response Reporter: Kurt Seifried <kseifried>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: btotty, fedora, jorton, krajguru, rpm, yjog
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2013-12-11 10:33:38 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 865986, 958614, 1037490, 1037491    
Bug Blocks: 854174, 855229, 952520    

Description Kurt Seifried 2012-08-31 05:15:13 UTC
This was originally reported by rui_hirokawa.jp to the PHP project.

The CVE database entry reports:

The sapi_header_op function in main/SAPI.c in PHP before 5.3.11 does
not properly handle %0D sequences (aka carriage return characters),
which allows remote attackers to bypass an HTTP response-splitting
protection mechanism via a crafted URL, related to improper
interaction between the PHP header function and certain browsers, as
demonstrated by Internet Explorer and Google Chrome.

Upstream bug and fix:

https://bugs.php.net/bug.php?id=60227
https://bugs.php.net/patch-display.php?bug_id=60227&patch=SAPI.diff&revision=latest
http://svn.php.net/viewvc/php/php-src/branches/PHP_5_4/main/SAPI.c?r1=323986&r2=323985&pathrev=323986


External references:

(none)

Comment 8 errata-xmlrpc 2013-02-21 10:14:26 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 6

Via RHSA-2013:0514 https://rhn.redhat.com/errata/RHSA-2013-0514.html

Comment 13 errata-xmlrpc 2013-09-30 22:12:28 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 5

Via RHSA-2013:1307 https://rhn.redhat.com/errata/RHSA-2013-1307.html

Comment 15 Huzaifa S. Sidhpurwala 2013-10-03 10:58:16 UTC
Statement:

(none)

Comment 18 errata-xmlrpc 2013-12-11 02:25:58 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 5

Via RHSA-2013:1814 https://rhn.redhat.com/errata/RHSA-2013-1814.html