TITLE:
Mandriva update for php

SECUNIA ADVISORY ID:
SA18697

VERIFY ADVISORY:
http://secunia.com/advisories/18697/

CRITICAL:
Less critical

IMPACT:
Cross Site Scripting

WHERE:
>From remote

OPERATING SYSTEM:
Mandrake Corporate Server 2.x
http://secunia.com/product/1222/
Mandrakelinux 10.1
http://secunia.com/product/4198/

DESCRIPTION:
Mandriva has issued an update for php. This fixes some
vulnerabilities, which can be exploited by malicious people to
conduct HTTP response splitting attacks and potentially to conduct
cross-site scripting attacks.

For more information:
SA18431

SOLUTION:
Apply updated packages.

Mandrakelinux 10.1:

df01c3861affe2f3e1c889018bb2bdbf
10.1/RPMS/libphp_common432-4.3.8-3.7.101mdk.i586.rpm
f9df1052bc1f6ce85a3bbb5ec544b077
10.1/RPMS/php432-devel-4.3.8-3.7.101mdk.i586.rpm
3be049c85f40f7051f3cf1e44b165485
10.1/RPMS/php-cgi-4.3.8-3.7.101mdk.i586.rpm
de903ca3c9126f451f48d71e30042066
10.1/RPMS/php-cli-4.3.8-3.7.101mdk.i586.rpm
d697297c4330d93379848b2f3ea5b59c
10.1/SRPMS/php-4.3.8-3.7.101mdk.src.rpm

Mandrakelinux 10.1/X86_64:

c9123a9203fd795b7445c2d54b2e0e65
x86_64/10.1/RPMS/lib64php_common432-4.3.8-3.7.101mdk.x86_64.rpm
a8ec659d640715f2cbe8ec5b93868de2
x86_64/10.1/RPMS/php432-devel-4.3.8-3.7.101mdk.x86_64.rpm
76ff7da663400e000c148d5562540097
x86_64/10.1/RPMS/php-cgi-4.3.8-3.7.101mdk.x86_64.rpm
d4c84cc9cf9325560e641f20040579ee
x86_64/10.1/RPMS/php-cli-4.3.8-3.7.101mdk.x86_64.rpm
d697297c4330d93379848b2f3ea5b59c
x86_64/10.1/SRPMS/php-4.3.8-3.7.101mdk.src.rpm

Corporate Server 2.1:

09f5076909971d5604836d7b9ea9fd45
corporate/2.1/RPMS/php-4.2.3-4.7.C21mdk.i586.rpm
8c035441a66315b1eff8b17312c3a930
corporate/2.1/RPMS/php-common-4.2.3-4.7.C21mdk.i586.rpm
c6f1fd24fe3e8f1ab43dcac22606486f
corporate/2.1/RPMS/php-devel-4.2.3-4.7.C21mdk.i586.rpm
86819061809b349bd18566a406273570
corporate/2.1/RPMS/php-pear-4.2.3-4.7.C21mdk.i586.rpm
7dd951360a264bf5866d065a00d5238f
corporate/2.1/SRPMS/php-4.2.3-4.7.C21mdk.src.rpm

Corporate Server 2.1/X86_64:

37b27434d1c44f27d8c277ae564b936e
x86_64/corporate/2.1/RPMS/php-4.2.3-4.7.C21mdk.x86_64.rpm
6136563a8257ef44180ca6b4401901f6
x86_64/corporate/2.1/RPMS/php-common-4.2.3-4.7.C21mdk.x86_64.rpm
bbdb1dbdda2d70b035ef466443bfc422
x86_64/corporate/2.1/RPMS/php-devel-4.2.3-4.7.C21mdk.x86_64.rpm
5d44bf1bfea2cf67b4d8e89199163451
x86_64/corporate/2.1/RPMS/php-pear-4.2.3-4.7.C21mdk.x86_64.rpm
7dd951360a264bf5866d065a00d5238f
x86_64/corporate/2.1/SRPMS/php-4.2.3-4.7.C21mdk.src.rpm

ORIGINAL ADVISORY:
http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:028

OTHER REFERENCES:
SA18431:
http://secunia.com/advisories/18431/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

----------------------------------------------------------------------