Remote exploitation of multiple denial of service vulnerabilities in the PHP Group's PHP scripting language allows attackers to consume CPU resources. The vulnerable routines, php_handle_iff() and php_handle_jpeg(), are reachable from the PHP function getimagesize(), which is defined as follows: array getimagesize ( string filename [, array &imageinfo] ) More information is here: http://www.idefense.com/application/poi/display?id=222&type=vulnerabilities
This issue should also affect RHEL2.1 and RHEL3
Is it possible to put your QA build on people.RH/ ?
Joe, Can you coment if this affects RHEL2.1? The CVE description says it only affects PHP 4.2.2, 4.3.9, 4.3.10 and 5.0.3. We ship 4.1.2-2.2 in RHEL2.1.
Josh: from review; no, this does not affect the RHEL2.1 getimagesize function.
Chris, test packages are now available from here: http://people.redhat.com/jorton/Taroon-php/ http://people.redhat.com/jorton/Nahant-php/
FWIW, two days on our devel platform (taroon) and no problems
An advisory has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on the solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHSA-2005-405.html
An advisory has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on the solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHSA-2005-406.html