Bug 468450 - php-Smarty: arbitrary code execution due to an error when processing data with embedded variables
php-Smarty: arbitrary code execution due to an error when processing data wit...
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
: Security
Depends On:
Blocks:
  Show dependency treegraph
 
Reported: 2008-10-24 15:18 EDT by Jan Lieskovsky
Modified: 2008-10-24 15:41 EDT (History)
3 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2008-10-24 15:41:23 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Jan Lieskovsky 2008-10-24 15:18:01 EDT
From Secunia advisory:

A vulnerability has been reported in Smarty, which can be exploited by malicious people to bypass certain security restrictions.

The vulnerability is caused due to an error when processing data with embedded variables. This can be exploited to potentially execute arbitrary PHP code.

This vulnerability is reported in version 2.6.19.

References: 
http://secunia.com/advisories/32329/
http://bugs.gentoo.org/show_bug.cgi?id=243856
Comment 1 Christopher Stone 2008-10-24 15:34:18 EDT
What is the point in opening this bug?  And why did I waste my time creating bug #467317 is this is the bug that is going to be used to track this issue which has already been fixed BTW.
Comment 2 Tomas Hoger 2008-10-24 15:41:23 EDT
Fedora updates updating php-Smarty to fixed upstream version:

  https://admin.fedoraproject.org/updates/F8/FEDORA-2008-8956
  https://admin.fedoraproject.org/updates/F9/FEDORA-2008-8945

Note You need to log in before you can comment on or make changes to this bug.