SuSE: 2012:0472-1: important: PHP5
Summary
This update of PHP5 fixes multiple security flaws:
* CVE-2011-4153, missing checks of return values could
allow remote attackers to cause a denial of service (NULL
pointer dereference)
* CVE-2012-0057, specially crafted XSLT stylesheets
could allow remote attackers to create arbitrary files with
arbitrary content
* CVE-2012-0807, a stack based buffer overflow in
php5's Suhosin extension could allow remote attackers to
execute arbitrary code via a long string that is used in a
Set-Cookie HTTP header
* CVE-2012-0831, temporary changes to the
magic_quotes_gpc directive during the importing of
environment variables is not properly performed which makes
it easier for remote attackers to conduct SQL injections
Security Issue references:
* CVE-2011-4153
References
#741520 #741859 #743308 #746661 #749111
Cross- CVE-2011-4153 CVE-2012-0057 CVE-2012-0807
CVE-2012-0831
Affected Products:
SUSE Linux Enterprise Software Development Kit 11 SP2
SUSE Linux Enterprise Server 11 SP2 for VMware
SUSE Linux Enterprise Server 11 SP2
https://www.suse.com/security/cve/CVE-2011-4153.html
https://www.suse.com/security/cve/CVE-2012-0057.html
https://www.suse.com/security/cve/CVE-2012-0807.html
https://www.suse.com/security/cve/CVE-2012-0831.html
https://bugzilla.novell.com/741520
https://bugzilla.novell.com/741859
https://bugzilla.novell.com/743308
https://bugzilla.novell.com/746661
https://bugzilla.novell.com/749111
https://login.microfocus.com/nidp/app/login