Description of problem: MOPB-26-2007 describes a bug in the mbstring extension which may a remote attacker to enable the "register_globals" setting for the lifetime of an httpd child process, if the mb_parse_string() is used to process untrusted script input of a length which can force the default memory_limit to be exhausted. (CVE: CVE-2007-1583; Impact: Low) Version-Release number of selected component (if applicable): 5.1.6-7.el5
MOPB-34-2007 describes a bug in the mail() function which allows a remote attacker to inject arbitrary headers into generated mail, if the "subject" parameter passed to the function uses untrusted (and unsanitized) script input; this may allow the attacker to force the script to send bulk e-mail to unintended recipients. (CVE-2007-1718, Impact: Low)
An advisory has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on the solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHSA-2007-0153.html