From the PHP 5.2.6 changelog: * Properly address incomplete multibyte chars inside escapeshellcmd() identified by Stefan Esser. The fix for this is here: http://cvs.php.net/viewvc.cgi/php-src/ext/standard/exec.c?r1=1.113.2.3.2.1.2.3&r2=1.113.2.3.2.1.2.4&diff_format=u
This issue is exploitable if you have a script which: 1) passes untrusted script input to escapeshellcmd (as is the intended use for that function) 2) runs a shell script using the output from (1) in a "strange" locale. This does not seem to be exploitable in UTF-8 locales on Linux. Based on this analysis I would say rate this Moderate severity.
Further detail can be found in Stefan Esser's advisory: http://www.sektioneins.de/advisories/SE-2008-03.txt
php-5.2.6-2.fc9 has been pushed to the Fedora 9 testing repository. If problems still persist, please make note of it in this bug report. If you want to test the update, you can install it with su -c 'yum --enablerepo=updates-testing update php'. You can provide feedback for this update here: http://admin.fedoraproject.org/updates/F9/FEDORA-2008-3606
php-5.2.6-2.fc8 has been pushed to the Fedora 8 stable repository. If problems still persist, please make note of it in this bug report.
php-5.2.6-2.fc9 has been pushed to the Fedora 9 stable repository. If problems still persist, please make note of it in this bug report.
https://www.redhat.com/security/data/cve/CVE-2008-2051.html