Dotdeb PHP 邮件函数 CRLF注入漏洞

漏洞信息详情

Dotdeb PHP 邮件函数 CRLF注入漏洞

漏洞简介

Dotdeb PHP 5.2.0 Rev 3之前版本的邮件函数中存在CRLF注入漏洞。远程攻击者可以借助查询字符串中的CRLF序列,绕过保护机制和注入任意的电子邮件头。借助PHP_SELF变量可以对其进行处理。

漏洞公告

目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:
Dotdeb Dotdeb PHP 4.4.3
http://packages.dotdeb.org/dists/stable/php4/source/php4_4.4.4-0.dotdeb.1.diff.gz
Dotdeb Dotdeb PHP 4.4.4
http://packages.dotdeb.org/dists/stable/php4/source/php4_4.4.4-0.dotdeb.1.diff.gz
Dotdeb Dotdeb PHP 5.0
http://packages.dotdeb.org/dists/stable/php5/source/php5_5.2.0-0.dotdeb.3.diff.gz
Dotdeb Dotdeb PHP 5.1
http://packages.dotdeb.org/dists/stable/php5/source/php5_5.2.0-0.dotdeb.3.diff.gz
Dotdeb Dotdeb PHP 5.2
http://packages.dotdeb.org/dists/stable/php5/source/php5_5.2.0-0.dotdeb.3.diff.gz

参考网址

来源: BID
名称: 21075
链接:http://www.securityfocus.com/bid/21075

来源: VUPEN
名称: ADV-2006-4531
链接:http://www.frsirt.com/english/advisories/2006/4531

来源: www.dotdeb.org/news
链接:http://www.dotdeb.org/news/severe_security_hole_in_php_packages

来源: XF
名称: dotdeb-mail-header-injection(30251)
链接:http://xforce.iss.net/xforce/xfdb/30251

来源: BUGTRAQ
名称: 20061114 Re: Advisory 14/2006: Dotdeb PHP Email Header Injection Vulnerability
链接:http://www.securityfocus.com/archive/1/archive/1/451839/100/0/threaded

来源: BUGTRAQ
名称: 20061114 Advisory 14/2006: Dotdeb PHP Email Header Injection Vulnerability
链接:http://www.securityfocus.com/archive/1/archive/1/451528/100/0/threaded

来源: MISC
链接:http://www.hardened-php.net/advisory_142006.139.html

来源: SECUNIA
名称: 22877
链接:http://secunia.com/advisories/22877

来源: FULLDISC
名称: 20061114 Advisory 14/2006: Dotdeb PHP Email Header Injection Vulnerability
链接:http://lists.grok.org.uk/pipermail/full-disclosure/2006-November/050712.html

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享