var-201205-0305
Vulnerability from variot
sapi/cgi/cgi_main.c in PHP before 5.3.12 and 5.4.x before 5.4.2, when configured as a CGI script (aka php-cgi), does not properly handle query strings that lack an = (equals sign) character, which allows remote attackers to execute arbitrary code by placing command-line options in the query string, related to lack of skipping a certain php_getopt for the 'd' case. Parallels Plesk Panel versions 9.0 - 9.2.3 on Linux platforms are vulnerable to remote code execution. PHP is prone to an information-disclosure vulnerability. Exploiting this issue allows remote attackers to view the source code of files in the context of the server process. This may allow the attacker to obtain sensitive information and to run arbitrary PHP code on the affected computer; other attacks are also possible. ----------------------------------------------------------------------
Become a PSI 3.0 beta tester! Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. Download it here! http://secunia.com/psi_30_beta_launch
TITLE: Ubuntu update for php
SECUNIA ADVISORY ID: SA49097
VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/49097/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=49097
RELEASE DATE: 2012-05-07
DISCUSS ADVISORY: http://secunia.com/advisories/49097/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)
http://secunia.com/advisories/49097/
ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=49097
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION: Ubuntu has issued an update for php. This fixes a vulnerability, which can be exploited by malicious people to disclose certain sensitive information or compromise a vulnerable system.
Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
ORIGINAL ADVISORY: USN-1437-1: http://www.ubuntu.com/usn/usn-1437-1/
OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
. HP System Management Homepage (SMH) before v7.1.1 running on Linux, Windows and VMware ESX.
Additionally, this update fixes insufficient validation of upload name which lead to corrupted $_FILES indices.
For the stable distribution (squeeze), this problem has been fixed in version 5.3.3-7+squeeze9.
The testing distribution (wheezy) will be fixed soon.
For the unstable distribution (sid), this problem has been fixed in version 5.4.3-1.
We recommend that you upgrade your php5 packages. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Note: the current version of the following document is available here: https://h20566.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c03368475
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c03368475 Version: 1
HPSBUX02791 SSRT100856 rev.1 - HP-UX Apache Web Server running PHP, Remote Execution of Arbitrary Code, Privilege Elevation, Denial of Service (DoS)
NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.
Release Date: 2012-06-14 Last Updated: 2012-06-14
Potential Security Impact: Remote execution of arbitrary code, privilege elevation, or Denial of Service (DoS).
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY Potential security vulnerabilities have been identified with HP-UX Apache Web Server running PHP. These vulnerabilities could be exploited remotely to execute arbitrary code, elevate privileges, or create a Denial of Service (DoS).
References: CVE-2011-4153, CVE-2012-0830, CVE-2012-0883, CVE-2012-1172, CVE-2012-1823, CVE-2012-2311
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP-UX B.11.23, B.11.31 running HP-UX Apache Web Server Suite v3.24 or earlier
BACKGROUND For a PGP signed
CVSS 2.0 Base Metrics
Reference Base Vector Base Score CVE-2011-4153 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0 CVE-2012-0830 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 CVE-2012-0883 (AV:L/AC:M/Au:N/C:C/I:C/A:C) 6.9 CVE-2012-1172 (AV:N/AC:M/Au:N/C:N/I:P/A:P) 5.8 CVE-2012-1823 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 CVE-2012-2311 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002
RESOLUTION
HP has provided the following software updates to resolve the vulnerabilities. The updates are available for download from http://software.hp.com
HP-UX Web Server Suite v.3.24 containing Apache v2.2.15.13 and PHP v5.2.17 HP-UX 11i Release Apache Depot name
B.11.23 (32-bit) HPUXWS22ATW-B324-32
B.11.23 (64-bit) HPUXWS22ATW-B324-64
B.11.31 (32-bit) HPUXWS22ATW-B324-32
B.11.31 (64-bit) HPUXWS22ATW-B324-64
MANUAL ACTIONS: Yes - Update Install HP-UX Web Server Suite v3.24 or subsequent.
PRODUCT SPECIFIC INFORMATION
HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application that replaces HP-UX Security Patch Check. It analyzes all Security Bulletins issued by HP and lists recommended actions that may apply to a specific HP-UX system. It can also download patches and create a depot automatically. For more information see https://www.hp.com/go/swa
The following text is for use by the HP-UX Software Assistant. HP-UX Web Server Suite v3.24 AFFECTED VERSIONS
HP-UX B.11.23
hpuxws22APCH32.APACHE hpuxws22APCH32.APACHE2 hpuxws22APCH32.AUTH_LDAP hpuxws22APCH32.AUTH_LDAP2 hpuxws22APCH32.MOD_JK hpuxws22APCH32.MOD_JK2 hpuxws22APCH32.MOD_PERL hpuxws22APCH32.MOD_PERL2 hpuxws22APCH32.PHP hpuxws22APCH32.PHP2 hpuxws22APCH32.WEBPROXY hpuxws22APCH32.WEBPROXY2 hpuxws22APACHE.APACHE hpuxws22APACHE.APACHE2 hpuxws22APACHE.AUTH_LDAP hpuxws22APACHE.AUTH_LDAP2 hpuxws22APACHE.MOD_JK hpuxws22APACHE.MOD_JK2 hpuxws22APACHE.MOD_PERL hpuxws22APACHE.MOD_PERL2 hpuxws22APACHE.PHP hpuxws22APACHE.PHP2 hpuxws22APACHE.WEBPROXY hpuxws22APACHE.WEBPROXY2 action: install revision B.2.2.15.13 or subsequent
HP-UX B.11.31
hpuxws22APCH32.APACHE hpuxws22APCH32.APACHE2 hpuxws22APCH32.AUTH_LDAP hpuxws22APCH32.AUTH_LDAP2 hpuxws22APCH32.MOD_JK hpuxws22APCH32.MOD_JK2 hpuxws22APCH32.MOD_PERL hpuxws22APCH32.MOD_PERL2 hpuxws22APCH32.PHP hpuxws22APCH32.PHP2 hpuxws22APCH32.WEBPROXY hpuxws22APCH32.WEBPROXY2 hpuxws22APACHE.APACHE hpuxws22APACHE.APACHE2 hpuxws22APACHE.AUTH_LDAP hpuxws22APACHE.AUTH_LDAP2 hpuxws22APACHE.MOD_JK hpuxws22APACHE.MOD_JK2 hpuxws22APACHE.MOD_PERL hpuxws22APACHE.MOD_PERL2 hpuxws22APACHE.PHP hpuxws22APACHE.PHP2 hpuxws22APACHE.WEBPROXY hpuxws22APACHE.WEBPROXY2
action: install revision B.2.2.15.13 or subsequent
END AFFECTED VERSIONS
HISTORY Version:1 (rev.1) - 14 June 2012 Initial release
Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.
Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com.
Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com
Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins
Security Bulletin List: A list of HP Security Bulletins, updated periodically, is contained in HP Security Notice HPSN-2011-001: https://h20566.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c02964430
Security Bulletin Archive: A list of recently released Security Bulletins is available here: http://h20566.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/
Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.
3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX
Copyright 2012 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits;damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
===================================================================== Red Hat Security Advisory
Synopsis: Critical: php security update Advisory ID: RHSA-2012:0546-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2012-0546.html Issue date: 2012-05-07 CVE Names: CVE-2012-1823 =====================================================================
- Summary:
Updated php packages that fix one security issue are now available for Red Hat Enterprise Linux 5 and 6.
The Red Hat Security Response Team has rated this update as having critical security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section.
- Relevant releases/architectures:
RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64
- Description:
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.
A flaw was found in the way the php-cgi executable processed command line arguments when running in CGI mode. This could lead to the disclosure of the script's source code or arbitrary code execution with the privileges of the PHP interpreter. (CVE-2012-1823)
Red Hat is aware that a public exploit for this issue is available that allows remote code execution in affected PHP CGI configurations. This flaw does not affect the default configuration in Red Hat Enterprise Linux 5 and 6 using the PHP module for Apache httpd to handle PHP scripts.
All php users should upgrade to these updated packages, which contain a backported patch to resolve this issue. After installing the updated packages, the httpd daemon must be restarted for the update to take effect.
- Solution:
Before applying this update, make sure all previously-released errata relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/knowledge/articles/11258
- Bugs fixed (http://bugzilla.redhat.com/):
818607 - CVE-2012-1823 php: command line arguments injection when run in CGI mode (VU#520827)
- Package List:
RHEL Desktop Workstation (v. 5 client):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/php-5.1.6-34.el5_8.src.rpm
i386: php-5.1.6-34.el5_8.i386.rpm php-bcmath-5.1.6-34.el5_8.i386.rpm php-cli-5.1.6-34.el5_8.i386.rpm php-common-5.1.6-34.el5_8.i386.rpm php-dba-5.1.6-34.el5_8.i386.rpm php-debuginfo-5.1.6-34.el5_8.i386.rpm php-devel-5.1.6-34.el5_8.i386.rpm php-gd-5.1.6-34.el5_8.i386.rpm php-imap-5.1.6-34.el5_8.i386.rpm php-ldap-5.1.6-34.el5_8.i386.rpm php-mbstring-5.1.6-34.el5_8.i386.rpm php-mysql-5.1.6-34.el5_8.i386.rpm php-ncurses-5.1.6-34.el5_8.i386.rpm php-odbc-5.1.6-34.el5_8.i386.rpm php-pdo-5.1.6-34.el5_8.i386.rpm php-pgsql-5.1.6-34.el5_8.i386.rpm php-snmp-5.1.6-34.el5_8.i386.rpm php-soap-5.1.6-34.el5_8.i386.rpm php-xml-5.1.6-34.el5_8.i386.rpm php-xmlrpc-5.1.6-34.el5_8.i386.rpm
x86_64: php-5.1.6-34.el5_8.x86_64.rpm php-bcmath-5.1.6-34.el5_8.x86_64.rpm php-cli-5.1.6-34.el5_8.x86_64.rpm php-common-5.1.6-34.el5_8.x86_64.rpm php-dba-5.1.6-34.el5_8.x86_64.rpm php-debuginfo-5.1.6-34.el5_8.x86_64.rpm php-devel-5.1.6-34.el5_8.x86_64.rpm php-gd-5.1.6-34.el5_8.x86_64.rpm php-imap-5.1.6-34.el5_8.x86_64.rpm php-ldap-5.1.6-34.el5_8.x86_64.rpm php-mbstring-5.1.6-34.el5_8.x86_64.rpm php-mysql-5.1.6-34.el5_8.x86_64.rpm php-ncurses-5.1.6-34.el5_8.x86_64.rpm php-odbc-5.1.6-34.el5_8.x86_64.rpm php-pdo-5.1.6-34.el5_8.x86_64.rpm php-pgsql-5.1.6-34.el5_8.x86_64.rpm php-snmp-5.1.6-34.el5_8.x86_64.rpm php-soap-5.1.6-34.el5_8.x86_64.rpm php-xml-5.1.6-34.el5_8.x86_64.rpm php-xmlrpc-5.1.6-34.el5_8.x86_64.rpm
Red Hat Enterprise Linux (v. 5 server):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/php-5.1.6-34.el5_8.src.rpm
i386: php-5.1.6-34.el5_8.i386.rpm php-bcmath-5.1.6-34.el5_8.i386.rpm php-cli-5.1.6-34.el5_8.i386.rpm php-common-5.1.6-34.el5_8.i386.rpm php-dba-5.1.6-34.el5_8.i386.rpm php-debuginfo-5.1.6-34.el5_8.i386.rpm php-devel-5.1.6-34.el5_8.i386.rpm php-gd-5.1.6-34.el5_8.i386.rpm php-imap-5.1.6-34.el5_8.i386.rpm php-ldap-5.1.6-34.el5_8.i386.rpm php-mbstring-5.1.6-34.el5_8.i386.rpm php-mysql-5.1.6-34.el5_8.i386.rpm php-ncurses-5.1.6-34.el5_8.i386.rpm php-odbc-5.1.6-34.el5_8.i386.rpm php-pdo-5.1.6-34.el5_8.i386.rpm php-pgsql-5.1.6-34.el5_8.i386.rpm php-snmp-5.1.6-34.el5_8.i386.rpm php-soap-5.1.6-34.el5_8.i386.rpm php-xml-5.1.6-34.el5_8.i386.rpm php-xmlrpc-5.1.6-34.el5_8.i386.rpm
ia64: php-5.1.6-34.el5_8.ia64.rpm php-bcmath-5.1.6-34.el5_8.ia64.rpm php-cli-5.1.6-34.el5_8.ia64.rpm php-common-5.1.6-34.el5_8.ia64.rpm php-dba-5.1.6-34.el5_8.ia64.rpm php-debuginfo-5.1.6-34.el5_8.ia64.rpm php-devel-5.1.6-34.el5_8.ia64.rpm php-gd-5.1.6-34.el5_8.ia64.rpm php-imap-5.1.6-34.el5_8.ia64.rpm php-ldap-5.1.6-34.el5_8.ia64.rpm php-mbstring-5.1.6-34.el5_8.ia64.rpm php-mysql-5.1.6-34.el5_8.ia64.rpm php-ncurses-5.1.6-34.el5_8.ia64.rpm php-odbc-5.1.6-34.el5_8.ia64.rpm php-pdo-5.1.6-34.el5_8.ia64.rpm php-pgsql-5.1.6-34.el5_8.ia64.rpm php-snmp-5.1.6-34.el5_8.ia64.rpm php-soap-5.1.6-34.el5_8.ia64.rpm php-xml-5.1.6-34.el5_8.ia64.rpm php-xmlrpc-5.1.6-34.el5_8.ia64.rpm
ppc: php-5.1.6-34.el5_8.ppc.rpm php-bcmath-5.1.6-34.el5_8.ppc.rpm php-cli-5.1.6-34.el5_8.ppc.rpm php-common-5.1.6-34.el5_8.ppc.rpm php-dba-5.1.6-34.el5_8.ppc.rpm php-debuginfo-5.1.6-34.el5_8.ppc.rpm php-devel-5.1.6-34.el5_8.ppc.rpm php-gd-5.1.6-34.el5_8.ppc.rpm php-imap-5.1.6-34.el5_8.ppc.rpm php-ldap-5.1.6-34.el5_8.ppc.rpm php-mbstring-5.1.6-34.el5_8.ppc.rpm php-mysql-5.1.6-34.el5_8.ppc.rpm php-ncurses-5.1.6-34.el5_8.ppc.rpm php-odbc-5.1.6-34.el5_8.ppc.rpm php-pdo-5.1.6-34.el5_8.ppc.rpm php-pgsql-5.1.6-34.el5_8.ppc.rpm php-snmp-5.1.6-34.el5_8.ppc.rpm php-soap-5.1.6-34.el5_8.ppc.rpm php-xml-5.1.6-34.el5_8.ppc.rpm php-xmlrpc-5.1.6-34.el5_8.ppc.rpm
s390x: php-5.1.6-34.el5_8.s390x.rpm php-bcmath-5.1.6-34.el5_8.s390x.rpm php-cli-5.1.6-34.el5_8.s390x.rpm php-common-5.1.6-34.el5_8.s390x.rpm php-dba-5.1.6-34.el5_8.s390x.rpm php-debuginfo-5.1.6-34.el5_8.s390x.rpm php-devel-5.1.6-34.el5_8.s390x.rpm php-gd-5.1.6-34.el5_8.s390x.rpm php-imap-5.1.6-34.el5_8.s390x.rpm php-ldap-5.1.6-34.el5_8.s390x.rpm php-mbstring-5.1.6-34.el5_8.s390x.rpm php-mysql-5.1.6-34.el5_8.s390x.rpm php-ncurses-5.1.6-34.el5_8.s390x.rpm php-odbc-5.1.6-34.el5_8.s390x.rpm php-pdo-5.1.6-34.el5_8.s390x.rpm php-pgsql-5.1.6-34.el5_8.s390x.rpm php-snmp-5.1.6-34.el5_8.s390x.rpm php-soap-5.1.6-34.el5_8.s390x.rpm php-xml-5.1.6-34.el5_8.s390x.rpm php-xmlrpc-5.1.6-34.el5_8.s390x.rpm
x86_64: php-5.1.6-34.el5_8.x86_64.rpm php-bcmath-5.1.6-34.el5_8.x86_64.rpm php-cli-5.1.6-34.el5_8.x86_64.rpm php-common-5.1.6-34.el5_8.x86_64.rpm php-dba-5.1.6-34.el5_8.x86_64.rpm php-debuginfo-5.1.6-34.el5_8.x86_64.rpm php-devel-5.1.6-34.el5_8.x86_64.rpm php-gd-5.1.6-34.el5_8.x86_64.rpm php-imap-5.1.6-34.el5_8.x86_64.rpm php-ldap-5.1.6-34.el5_8.x86_64.rpm php-mbstring-5.1.6-34.el5_8.x86_64.rpm php-mysql-5.1.6-34.el5_8.x86_64.rpm php-ncurses-5.1.6-34.el5_8.x86_64.rpm php-odbc-5.1.6-34.el5_8.x86_64.rpm php-pdo-5.1.6-34.el5_8.x86_64.rpm php-pgsql-5.1.6-34.el5_8.x86_64.rpm php-snmp-5.1.6-34.el5_8.x86_64.rpm php-soap-5.1.6-34.el5_8.x86_64.rpm php-xml-5.1.6-34.el5_8.x86_64.rpm php-xmlrpc-5.1.6-34.el5_8.x86_64.rpm
Red Hat Enterprise Linux Desktop Optional (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/php-5.3.3-3.el6_2.8.src.rpm
i386: php-5.3.3-3.el6_2.8.i686.rpm php-bcmath-5.3.3-3.el6_2.8.i686.rpm php-cli-5.3.3-3.el6_2.8.i686.rpm php-common-5.3.3-3.el6_2.8.i686.rpm php-dba-5.3.3-3.el6_2.8.i686.rpm php-debuginfo-5.3.3-3.el6_2.8.i686.rpm php-devel-5.3.3-3.el6_2.8.i686.rpm php-embedded-5.3.3-3.el6_2.8.i686.rpm php-enchant-5.3.3-3.el6_2.8.i686.rpm php-gd-5.3.3-3.el6_2.8.i686.rpm php-imap-5.3.3-3.el6_2.8.i686.rpm php-intl-5.3.3-3.el6_2.8.i686.rpm php-ldap-5.3.3-3.el6_2.8.i686.rpm php-mbstring-5.3.3-3.el6_2.8.i686.rpm php-mysql-5.3.3-3.el6_2.8.i686.rpm php-odbc-5.3.3-3.el6_2.8.i686.rpm php-pdo-5.3.3-3.el6_2.8.i686.rpm php-pgsql-5.3.3-3.el6_2.8.i686.rpm php-process-5.3.3-3.el6_2.8.i686.rpm php-pspell-5.3.3-3.el6_2.8.i686.rpm php-recode-5.3.3-3.el6_2.8.i686.rpm php-snmp-5.3.3-3.el6_2.8.i686.rpm php-soap-5.3.3-3.el6_2.8.i686.rpm php-tidy-5.3.3-3.el6_2.8.i686.rpm php-xml-5.3.3-3.el6_2.8.i686.rpm php-xmlrpc-5.3.3-3.el6_2.8.i686.rpm php-zts-5.3.3-3.el6_2.8.i686.rpm
x86_64: php-5.3.3-3.el6_2.8.x86_64.rpm php-bcmath-5.3.3-3.el6_2.8.x86_64.rpm php-cli-5.3.3-3.el6_2.8.x86_64.rpm php-common-5.3.3-3.el6_2.8.x86_64.rpm php-dba-5.3.3-3.el6_2.8.x86_64.rpm php-debuginfo-5.3.3-3.el6_2.8.x86_64.rpm php-devel-5.3.3-3.el6_2.8.x86_64.rpm php-embedded-5.3.3-3.el6_2.8.x86_64.rpm php-enchant-5.3.3-3.el6_2.8.x86_64.rpm php-gd-5.3.3-3.el6_2.8.x86_64.rpm php-imap-5.3.3-3.el6_2.8.x86_64.rpm php-intl-5.3.3-3.el6_2.8.x86_64.rpm php-ldap-5.3.3-3.el6_2.8.x86_64.rpm php-mbstring-5.3.3-3.el6_2.8.x86_64.rpm php-mysql-5.3.3-3.el6_2.8.x86_64.rpm php-odbc-5.3.3-3.el6_2.8.x86_64.rpm php-pdo-5.3.3-3.el6_2.8.x86_64.rpm php-pgsql-5.3.3-3.el6_2.8.x86_64.rpm php-process-5.3.3-3.el6_2.8.x86_64.rpm php-pspell-5.3.3-3.el6_2.8.x86_64.rpm php-recode-5.3.3-3.el6_2.8.x86_64.rpm php-snmp-5.3.3-3.el6_2.8.x86_64.rpm php-soap-5.3.3-3.el6_2.8.x86_64.rpm php-tidy-5.3.3-3.el6_2.8.x86_64.rpm php-xml-5.3.3-3.el6_2.8.x86_64.rpm php-xmlrpc-5.3.3-3.el6_2.8.x86_64.rpm php-zts-5.3.3-3.el6_2.8.x86_64.rpm
Red Hat Enterprise Linux HPC Node (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/php-5.3.3-3.el6_2.8.src.rpm
x86_64: php-cli-5.3.3-3.el6_2.8.x86_64.rpm php-common-5.3.3-3.el6_2.8.x86_64.rpm php-debuginfo-5.3.3-3.el6_2.8.x86_64.rpm
Red Hat Enterprise Linux HPC Node Optional (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/php-5.3.3-3.el6_2.8.src.rpm
x86_64: php-5.3.3-3.el6_2.8.x86_64.rpm php-bcmath-5.3.3-3.el6_2.8.x86_64.rpm php-dba-5.3.3-3.el6_2.8.x86_64.rpm php-debuginfo-5.3.3-3.el6_2.8.x86_64.rpm php-devel-5.3.3-3.el6_2.8.x86_64.rpm php-embedded-5.3.3-3.el6_2.8.x86_64.rpm php-enchant-5.3.3-3.el6_2.8.x86_64.rpm php-gd-5.3.3-3.el6_2.8.x86_64.rpm php-imap-5.3.3-3.el6_2.8.x86_64.rpm php-intl-5.3.3-3.el6_2.8.x86_64.rpm php-ldap-5.3.3-3.el6_2.8.x86_64.rpm php-mbstring-5.3.3-3.el6_2.8.x86_64.rpm php-mysql-5.3.3-3.el6_2.8.x86_64.rpm php-odbc-5.3.3-3.el6_2.8.x86_64.rpm php-pdo-5.3.3-3.el6_2.8.x86_64.rpm php-pgsql-5.3.3-3.el6_2.8.x86_64.rpm php-process-5.3.3-3.el6_2.8.x86_64.rpm php-pspell-5.3.3-3.el6_2.8.x86_64.rpm php-recode-5.3.3-3.el6_2.8.x86_64.rpm php-snmp-5.3.3-3.el6_2.8.x86_64.rpm php-soap-5.3.3-3.el6_2.8.x86_64.rpm php-tidy-5.3.3-3.el6_2.8.x86_64.rpm php-xml-5.3.3-3.el6_2.8.x86_64.rpm php-xmlrpc-5.3.3-3.el6_2.8.x86_64.rpm php-zts-5.3.3-3.el6_2.8.x86_64.rpm
Red Hat Enterprise Linux Server (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/php-5.3.3-3.el6_2.8.src.rpm
i386: php-5.3.3-3.el6_2.8.i686.rpm php-cli-5.3.3-3.el6_2.8.i686.rpm php-common-5.3.3-3.el6_2.8.i686.rpm php-debuginfo-5.3.3-3.el6_2.8.i686.rpm php-gd-5.3.3-3.el6_2.8.i686.rpm php-ldap-5.3.3-3.el6_2.8.i686.rpm php-mysql-5.3.3-3.el6_2.8.i686.rpm php-odbc-5.3.3-3.el6_2.8.i686.rpm php-pdo-5.3.3-3.el6_2.8.i686.rpm php-pgsql-5.3.3-3.el6_2.8.i686.rpm php-soap-5.3.3-3.el6_2.8.i686.rpm php-xml-5.3.3-3.el6_2.8.i686.rpm php-xmlrpc-5.3.3-3.el6_2.8.i686.rpm
ppc64: php-5.3.3-3.el6_2.8.ppc64.rpm php-cli-5.3.3-3.el6_2.8.ppc64.rpm php-common-5.3.3-3.el6_2.8.ppc64.rpm php-debuginfo-5.3.3-3.el6_2.8.ppc64.rpm php-gd-5.3.3-3.el6_2.8.ppc64.rpm php-ldap-5.3.3-3.el6_2.8.ppc64.rpm php-mysql-5.3.3-3.el6_2.8.ppc64.rpm php-odbc-5.3.3-3.el6_2.8.ppc64.rpm php-pdo-5.3.3-3.el6_2.8.ppc64.rpm php-pgsql-5.3.3-3.el6_2.8.ppc64.rpm php-soap-5.3.3-3.el6_2.8.ppc64.rpm php-xml-5.3.3-3.el6_2.8.ppc64.rpm php-xmlrpc-5.3.3-3.el6_2.8.ppc64.rpm
s390x: php-5.3.3-3.el6_2.8.s390x.rpm php-cli-5.3.3-3.el6_2.8.s390x.rpm php-common-5.3.3-3.el6_2.8.s390x.rpm php-debuginfo-5.3.3-3.el6_2.8.s390x.rpm php-gd-5.3.3-3.el6_2.8.s390x.rpm php-ldap-5.3.3-3.el6_2.8.s390x.rpm php-mysql-5.3.3-3.el6_2.8.s390x.rpm php-odbc-5.3.3-3.el6_2.8.s390x.rpm php-pdo-5.3.3-3.el6_2.8.s390x.rpm php-pgsql-5.3.3-3.el6_2.8.s390x.rpm php-soap-5.3.3-3.el6_2.8.s390x.rpm php-xml-5.3.3-3.el6_2.8.s390x.rpm php-xmlrpc-5.3.3-3.el6_2.8.s390x.rpm
x86_64: php-5.3.3-3.el6_2.8.x86_64.rpm php-cli-5.3.3-3.el6_2.8.x86_64.rpm php-common-5.3.3-3.el6_2.8.x86_64.rpm php-debuginfo-5.3.3-3.el6_2.8.x86_64.rpm php-gd-5.3.3-3.el6_2.8.x86_64.rpm php-ldap-5.3.3-3.el6_2.8.x86_64.rpm php-mysql-5.3.3-3.el6_2.8.x86_64.rpm php-odbc-5.3.3-3.el6_2.8.x86_64.rpm php-pdo-5.3.3-3.el6_2.8.x86_64.rpm php-pgsql-5.3.3-3.el6_2.8.x86_64.rpm php-soap-5.3.3-3.el6_2.8.x86_64.rpm php-xml-5.3.3-3.el6_2.8.x86_64.rpm php-xmlrpc-5.3.3-3.el6_2.8.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/php-5.3.3-3.el6_2.8.src.rpm
i386: php-bcmath-5.3.3-3.el6_2.8.i686.rpm php-dba-5.3.3-3.el6_2.8.i686.rpm php-debuginfo-5.3.3-3.el6_2.8.i686.rpm php-devel-5.3.3-3.el6_2.8.i686.rpm php-embedded-5.3.3-3.el6_2.8.i686.rpm php-enchant-5.3.3-3.el6_2.8.i686.rpm php-imap-5.3.3-3.el6_2.8.i686.rpm php-intl-5.3.3-3.el6_2.8.i686.rpm php-mbstring-5.3.3-3.el6_2.8.i686.rpm php-process-5.3.3-3.el6_2.8.i686.rpm php-pspell-5.3.3-3.el6_2.8.i686.rpm php-recode-5.3.3-3.el6_2.8.i686.rpm php-snmp-5.3.3-3.el6_2.8.i686.rpm php-tidy-5.3.3-3.el6_2.8.i686.rpm php-zts-5.3.3-3.el6_2.8.i686.rpm
ppc64: php-bcmath-5.3.3-3.el6_2.8.ppc64.rpm php-dba-5.3.3-3.el6_2.8.ppc64.rpm php-debuginfo-5.3.3-3.el6_2.8.ppc64.rpm php-devel-5.3.3-3.el6_2.8.ppc64.rpm php-embedded-5.3.3-3.el6_2.8.ppc64.rpm php-enchant-5.3.3-3.el6_2.8.ppc64.rpm php-imap-5.3.3-3.el6_2.8.ppc64.rpm php-intl-5.3.3-3.el6_2.8.ppc64.rpm php-mbstring-5.3.3-3.el6_2.8.ppc64.rpm php-process-5.3.3-3.el6_2.8.ppc64.rpm php-pspell-5.3.3-3.el6_2.8.ppc64.rpm php-recode-5.3.3-3.el6_2.8.ppc64.rpm php-snmp-5.3.3-3.el6_2.8.ppc64.rpm php-tidy-5.3.3-3.el6_2.8.ppc64.rpm php-zts-5.3.3-3.el6_2.8.ppc64.rpm
s390x: php-bcmath-5.3.3-3.el6_2.8.s390x.rpm php-dba-5.3.3-3.el6_2.8.s390x.rpm php-debuginfo-5.3.3-3.el6_2.8.s390x.rpm php-devel-5.3.3-3.el6_2.8.s390x.rpm php-embedded-5.3.3-3.el6_2.8.s390x.rpm php-enchant-5.3.3-3.el6_2.8.s390x.rpm php-imap-5.3.3-3.el6_2.8.s390x.rpm php-intl-5.3.3-3.el6_2.8.s390x.rpm php-mbstring-5.3.3-3.el6_2.8.s390x.rpm php-process-5.3.3-3.el6_2.8.s390x.rpm php-pspell-5.3.3-3.el6_2.8.s390x.rpm php-recode-5.3.3-3.el6_2.8.s390x.rpm php-snmp-5.3.3-3.el6_2.8.s390x.rpm php-tidy-5.3.3-3.el6_2.8.s390x.rpm php-zts-5.3.3-3.el6_2.8.s390x.rpm
x86_64: php-bcmath-5.3.3-3.el6_2.8.x86_64.rpm php-dba-5.3.3-3.el6_2.8.x86_64.rpm php-debuginfo-5.3.3-3.el6_2.8.x86_64.rpm php-devel-5.3.3-3.el6_2.8.x86_64.rpm php-embedded-5.3.3-3.el6_2.8.x86_64.rpm php-enchant-5.3.3-3.el6_2.8.x86_64.rpm php-imap-5.3.3-3.el6_2.8.x86_64.rpm php-intl-5.3.3-3.el6_2.8.x86_64.rpm php-mbstring-5.3.3-3.el6_2.8.x86_64.rpm php-process-5.3.3-3.el6_2.8.x86_64.rpm php-pspell-5.3.3-3.el6_2.8.x86_64.rpm php-recode-5.3.3-3.el6_2.8.x86_64.rpm php-snmp-5.3.3-3.el6_2.8.x86_64.rpm php-tidy-5.3.3-3.el6_2.8.x86_64.rpm php-zts-5.3.3-3.el6_2.8.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/php-5.3.3-3.el6_2.8.src.rpm
i386: php-5.3.3-3.el6_2.8.i686.rpm php-cli-5.3.3-3.el6_2.8.i686.rpm php-common-5.3.3-3.el6_2.8.i686.rpm php-debuginfo-5.3.3-3.el6_2.8.i686.rpm php-gd-5.3.3-3.el6_2.8.i686.rpm php-ldap-5.3.3-3.el6_2.8.i686.rpm php-mysql-5.3.3-3.el6_2.8.i686.rpm php-odbc-5.3.3-3.el6_2.8.i686.rpm php-pdo-5.3.3-3.el6_2.8.i686.rpm php-pgsql-5.3.3-3.el6_2.8.i686.rpm php-soap-5.3.3-3.el6_2.8.i686.rpm php-xml-5.3.3-3.el6_2.8.i686.rpm php-xmlrpc-5.3.3-3.el6_2.8.i686.rpm
x86_64: php-5.3.3-3.el6_2.8.x86_64.rpm php-cli-5.3.3-3.el6_2.8.x86_64.rpm php-common-5.3.3-3.el6_2.8.x86_64.rpm php-debuginfo-5.3.3-3.el6_2.8.x86_64.rpm php-gd-5.3.3-3.el6_2.8.x86_64.rpm php-ldap-5.3.3-3.el6_2.8.x86_64.rpm php-mysql-5.3.3-3.el6_2.8.x86_64.rpm php-odbc-5.3.3-3.el6_2.8.x86_64.rpm php-pdo-5.3.3-3.el6_2.8.x86_64.rpm php-pgsql-5.3.3-3.el6_2.8.x86_64.rpm php-soap-5.3.3-3.el6_2.8.x86_64.rpm php-xml-5.3.3-3.el6_2.8.x86_64.rpm php-xmlrpc-5.3.3-3.el6_2.8.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/php-5.3.3-3.el6_2.8.src.rpm
i386: php-bcmath-5.3.3-3.el6_2.8.i686.rpm php-dba-5.3.3-3.el6_2.8.i686.rpm php-debuginfo-5.3.3-3.el6_2.8.i686.rpm php-devel-5.3.3-3.el6_2.8.i686.rpm php-embedded-5.3.3-3.el6_2.8.i686.rpm php-enchant-5.3.3-3.el6_2.8.i686.rpm php-imap-5.3.3-3.el6_2.8.i686.rpm php-intl-5.3.3-3.el6_2.8.i686.rpm php-mbstring-5.3.3-3.el6_2.8.i686.rpm php-process-5.3.3-3.el6_2.8.i686.rpm php-pspell-5.3.3-3.el6_2.8.i686.rpm php-recode-5.3.3-3.el6_2.8.i686.rpm php-snmp-5.3.3-3.el6_2.8.i686.rpm php-tidy-5.3.3-3.el6_2.8.i686.rpm php-zts-5.3.3-3.el6_2.8.i686.rpm
x86_64: php-bcmath-5.3.3-3.el6_2.8.x86_64.rpm php-dba-5.3.3-3.el6_2.8.x86_64.rpm php-debuginfo-5.3.3-3.el6_2.8.x86_64.rpm php-devel-5.3.3-3.el6_2.8.x86_64.rpm php-embedded-5.3.3-3.el6_2.8.x86_64.rpm php-enchant-5.3.3-3.el6_2.8.x86_64.rpm php-imap-5.3.3-3.el6_2.8.x86_64.rpm php-intl-5.3.3-3.el6_2.8.x86_64.rpm php-mbstring-5.3.3-3.el6_2.8.x86_64.rpm php-process-5.3.3-3.el6_2.8.x86_64.rpm php-pspell-5.3.3-3.el6_2.8.x86_64.rpm php-recode-5.3.3-3.el6_2.8.x86_64.rpm php-snmp-5.3.3-3.el6_2.8.x86_64.rpm php-tidy-5.3.3-3.el6_2.8.x86_64.rpm php-zts-5.3.3-3.el6_2.8.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package
- References:
https://www.redhat.com/security/data/cve/CVE-2012-1823.html https://access.redhat.com/security/updates/classification/#critical
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2012 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFPqBidXlSAg2UNWIIRAtuSAJwIgGRkPkW5/AUENoUr0jScjBiojQCeLkVK WUs1dQ+935LKCja022LRegM= =dMtA -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce .
Problem Description:
A vulnerability has been found and corrected in php(-cgi):
PHP-CGI-based setups contain a vulnerability when parsing query string parameters from php files.
Update:
It was discovered that the previous fix for the CVE-2012-1823 vulnerability was incomplete (CVE-2012-2335, CVE-2012-2336). The updated packages provides the latest version (5.3.13) which provides a solution to this flaw.
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1823 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2335 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2336 https://bugs.php.net/bug.php?id=61910 http://eindbazen.net/2012/05/php-cgi-advisory-cve-2012-1823/ http://www.openwall.com/lists/oss-security/2012/05/09/9
Updated Packages:
Mandriva Linux 2010.1: 140d36ed5578274826846a0ff7ca05a9 2010.1/i586/apache-mod_php-5.3.13-0.1mdv2010.2.i586.rpm 24775050f82b736c2133fc30f93e809e 2010.1/i586/libphp5_common5-5.3.13-0.1mdv2010.2.i586.rpm f3fb19456fe4b8fd41f4306c007e85fb 2010.1/i586/php-bcmath-5.3.13-0.1mdv2010.2.i586.rpm 99a812ad5970bc37414909de5ef578fa 2010.1/i586/php-bz2-5.3.13-0.1mdv2010.2.i586.rpm 634f717747ee4db7cdd19a93ffd2d5ef 2010.1/i586/php-calendar-5.3.13-0.1mdv2010.2.i586.rpm 3429fa2b956f67b8602489e4b7d3757a 2010.1/i586/php-cgi-5.3.13-0.1mdv2010.2.i586.rpm 51a1d975e31b445ef71901cd04d8fd3a 2010.1/i586/php-cli-5.3.13-0.1mdv2010.2.i586.rpm ba763fffd3798434cb0cde5c8f7a8891 2010.1/i586/php-ctype-5.3.13-0.1mdv2010.2.i586.rpm ebf996e845619b26515e6f3e828c8fbf 2010.1/i586/php-curl-5.3.13-0.1mdv2010.2.i586.rpm ec57b30c43f5678b8cd822fd85df5e34 2010.1/i586/php-dba-5.3.13-0.1mdv2010.2.i586.rpm 85799e72a9511c0f54ff2435fba0aaab 2010.1/i586/php-devel-5.3.13-0.1mdv2010.2.i586.rpm 823c9544385c894e4c5edd1b52bf4e92 2010.1/i586/php-doc-5.3.13-0.1mdv2010.2.i586.rpm 5d753655d5615e92db188468903b8d16 2010.1/i586/php-dom-5.3.13-0.1mdv2010.2.i586.rpm 705fbff48501d08bae719a2d7841d8c2 2010.1/i586/php-enchant-5.3.13-0.1mdv2010.2.i586.rpm 4f78075bddc8fa173a7384e545e3cd5c 2010.1/i586/php-exif-5.3.13-0.1mdv2010.2.i586.rpm e8fefd604fd5006361419135c9059076 2010.1/i586/php-fileinfo-5.3.13-0.1mdv2010.2.i586.rpm bc65e927149d5277ad634b0bad8a868a 2010.1/i586/php-filter-5.3.13-0.1mdv2010.2.i586.rpm ea6a6fd721db888225dfea83a0ad99d9 2010.1/i586/php-fpm-5.3.13-0.1mdv2010.2.i586.rpm 7fb6a2914e72a63ec9401c9662f9bc2b 2010.1/i586/php-ftp-5.3.13-0.1mdv2010.2.i586.rpm 0df19020817d838aba51f052c29f6532 2010.1/i586/php-gd-5.3.13-0.1mdv2010.2.i586.rpm 5ce28c873da3fc5e0feda8e3cad2247a 2010.1/i586/php-gettext-5.3.13-0.1mdv2010.2.i586.rpm acbe524bfc8e156906c70124496a3161 2010.1/i586/php-gmp-5.3.13-0.1mdv2010.2.i586.rpm d03bc0f91411297408ac3dbbd5c426b3 2010.1/i586/php-hash-5.3.13-0.1mdv2010.2.i586.rpm 19bc92bd8b1a4ea4b86b497f5f48933c 2010.1/i586/php-iconv-5.3.13-0.1mdv2010.2.i586.rpm a891fe8d9bcbbfc4458fb31a23720338 2010.1/i586/php-imap-5.3.13-0.1mdv2010.2.i586.rpm edec73af34ecb6b42ed0a14dadb8949d 2010.1/i586/php-ini-5.3.13-0.1mdv2010.2.i586.rpm 529135563f982966be228d0e7055a97d 2010.1/i586/php-intl-5.3.13-0.1mdv2010.2.i586.rpm 2de32f3e7d7da5e06a83f9bf8eac6318 2010.1/i586/php-json-5.3.13-0.1mdv2010.2.i586.rpm 2b4f232c6bd026de886d8199dba4c2f2 2010.1/i586/php-ldap-5.3.13-0.1mdv2010.2.i586.rpm c14fe2ed7cfeb5320fed29676af9e682 2010.1/i586/php-mbstring-5.3.13-0.1mdv2010.2.i586.rpm 606e65e002f946dcf9fa8f7f3950f81d 2010.1/i586/php-mcrypt-5.3.13-0.1mdv2010.2.i586.rpm 84e35a42b7861251869a439b0031f225 2010.1/i586/php-mssql-5.3.13-0.1mdv2010.2.i586.rpm 95caf9f4d272fdeae006851e482a2461 2010.1/i586/php-mysql-5.3.13-0.1mdv2010.2.i586.rpm 5bb6f61f906e8572f66cbbcb0a3a667b 2010.1/i586/php-mysqli-5.3.13-0.1mdv2010.2.i586.rpm 28e5bdd198862a80dfea2ab9e86b9678 2010.1/i586/php-mysqlnd-5.3.13-0.1mdv2010.2.i586.rpm 802e12a27b7256dbba5b9029e7bbb00b 2010.1/i586/php-odbc-5.3.13-0.1mdv2010.2.i586.rpm f3f2b22190a0180e4adddd36ac43b808 2010.1/i586/php-openssl-5.3.13-0.1mdv2010.2.i586.rpm 850ed2a02899e7ef950368f1e6936e7b 2010.1/i586/php-pcntl-5.3.13-0.1mdv2010.2.i586.rpm 128bc6c67ee8960e29c893a0a210f967 2010.1/i586/php-pdo-5.3.13-0.1mdv2010.2.i586.rpm 31d3d8d11a8ec860ff748b4491ed637d 2010.1/i586/php-pdo_dblib-5.3.13-0.1mdv2010.2.i586.rpm 840fd711e567a690f46a5aa686a47019 2010.1/i586/php-pdo_mysql-5.3.13-0.1mdv2010.2.i586.rpm 6b979eef99f357fc4e283c98c5ef96ea 2010.1/i586/php-pdo_odbc-5.3.13-0.1mdv2010.2.i586.rpm 9b5d0ca325bbfcf6b87f74748caceb76 2010.1/i586/php-pdo_pgsql-5.3.13-0.1mdv2010.2.i586.rpm 70c688be75e34b79a9a35462570a2ada 2010.1/i586/php-pdo_sqlite-5.3.13-0.1mdv2010.2.i586.rpm e67f4f8ded56378452b8a548b126266b 2010.1/i586/php-pgsql-5.3.13-0.1mdv2010.2.i586.rpm 4d26258bb774b1d9aff74d3fdc1e3c2c 2010.1/i586/php-phar-5.3.13-0.1mdv2010.2.i586.rpm 74bc08429969529762425997772f8a5d 2010.1/i586/php-posix-5.3.13-0.1mdv2010.2.i586.rpm e697d56093f50bbde693541d67b7566c 2010.1/i586/php-pspell-5.3.13-0.1mdv2010.2.i586.rpm 0fc94be46e664a52fbc9111958cd4146 2010.1/i586/php-readline-5.3.13-0.1mdv2010.2.i586.rpm af7e1bb5a2722063cc52af223dc90787 2010.1/i586/php-recode-5.3.13-0.1mdv2010.2.i586.rpm fee14325fb3a764988c4e2a69c7938b4 2010.1/i586/php-session-5.3.13-0.1mdv2010.2.i586.rpm e89aba4b7dec345be125261046d31b92 2010.1/i586/php-shmop-5.3.13-0.1mdv2010.2.i586.rpm 69f2a66fef9892c0405d3a03c72096b2 2010.1/i586/php-snmp-5.3.13-0.1mdv2010.2.i586.rpm 4db2b4b3d7670603b5922a122dc975aa 2010.1/i586/php-soap-5.3.13-0.1mdv2010.2.i586.rpm e02779584cc1c588d75346f6995ad5a6 2010.1/i586/php-sockets-5.3.13-0.1mdv2010.2.i586.rpm aae3b1c32441f481c49f7f38c1c96294 2010.1/i586/php-sqlite3-5.3.13-0.1mdv2010.2.i586.rpm b4255e1825f289410b71b6a210229b8e 2010.1/i586/php-sqlite-5.3.13-0.1mdv2010.2.i586.rpm dd54ede221fd579f1ebd81be6930010b 2010.1/i586/php-sybase_ct-5.3.13-0.1mdv2010.2.i586.rpm 4bdebc41d1b654e904d39c8f89be51a2 2010.1/i586/php-sysvmsg-5.3.13-0.1mdv2010.2.i586.rpm 3d485895eca51f5f801323baf1f0f8bf 2010.1/i586/php-sysvsem-5.3.13-0.1mdv2010.2.i586.rpm a5c65e02a46da5f9a1be3235565926a3 2010.1/i586/php-sysvshm-5.3.13-0.1mdv2010.2.i586.rpm 1a1e6a0a91388e7113f2774bb0f16c01 2010.1/i586/php-tidy-5.3.13-0.1mdv2010.2.i586.rpm cf565e35c341273ed2b4378c9f0980c8 2010.1/i586/php-tokenizer-5.3.13-0.1mdv2010.2.i586.rpm b1fd12591b6500464a97eb2ae47b2f60 2010.1/i586/php-wddx-5.3.13-0.1mdv2010.2.i586.rpm f0f801ce893ad8eb55bb21d010af641a 2010.1/i586/php-xml-5.3.13-0.1mdv2010.2.i586.rpm 055873d10551544750bd05555cc63155 2010.1/i586/php-xmlreader-5.3.13-0.1mdv2010.2.i586.rpm 69a6e3930ed1b2d1ddac5df5719bc6d6 2010.1/i586/php-xmlrpc-5.3.13-0.1mdv2010.2.i586.rpm de7f360c56f74b036ea924d9f7c76b59 2010.1/i586/php-xmlwriter-5.3.13-0.1mdv2010.2.i586.rpm 4cbd130cf269dd2769dd084322eaf77a 2010.1/i586/php-xsl-5.3.13-0.1mdv2010.2.i586.rpm 1d32b52e968a2bd7c4ff6b640f38ae36 2010.1/i586/php-zip-5.3.13-0.1mdv2010.2.i586.rpm 9508241b048c6acc033c16494f797289 2010.1/i586/php-zlib-5.3.13-0.1mdv2010.2.i586.rpm cd0e0682df60061148366ab6b10394d2 2010.1/SRPMS/apache-mod_php-5.3.13-0.1mdv2010.2.src.rpm f454d177e9bd631df2a4eeca3d33fe38 2010.1/SRPMS/php-5.3.13-0.1mdv2010.2.src.rpm 281be8fe2bb8cd404ade445f64c616da 2010.1/SRPMS/php-ini-5.3.13-0.1mdv2010.2.src.rpm
Mandriva Linux 2010.1/X86_64: 5c32f90215090901240e661f8e2224a9 2010.1/x86_64/apache-mod_php-5.3.13-0.1mdv2010.2.x86_64.rpm c21032781b826fe3a8202eff5b7ef8b5 2010.1/x86_64/lib64php5_common5-5.3.13-0.1mdv2010.2.x86_64.rpm a2d0b2b43aa856d5872679d455e56a1e 2010.1/x86_64/php-bcmath-5.3.13-0.1mdv2010.2.x86_64.rpm 5421084c1b946cb2c5eeebfed07ac829 2010.1/x86_64/php-bz2-5.3.13-0.1mdv2010.2.x86_64.rpm 48aa03dcba36a09689dc6c7f2497741c 2010.1/x86_64/php-calendar-5.3.13-0.1mdv2010.2.x86_64.rpm c503b930c9d60cbd4d4ea58d8a6deda7 2010.1/x86_64/php-cgi-5.3.13-0.1mdv2010.2.x86_64.rpm 228b72cbf197c817d866d1fe3c7ed6b2 2010.1/x86_64/php-cli-5.3.13-0.1mdv2010.2.x86_64.rpm c9435be90a6e5fae1a980109c9bc9aca 2010.1/x86_64/php-ctype-5.3.13-0.1mdv2010.2.x86_64.rpm 0eb2e95722b4af3006f560c8441d687f 2010.1/x86_64/php-curl-5.3.13-0.1mdv2010.2.x86_64.rpm ccebc661c63d1028540c1212de90bbae 2010.1/x86_64/php-dba-5.3.13-0.1mdv2010.2.x86_64.rpm 2edc5f5c47a0ee2bbf001fae9024849f 2010.1/x86_64/php-devel-5.3.13-0.1mdv2010.2.x86_64.rpm 3b3eeb211bf45ede0abaae347d8bc745 2010.1/x86_64/php-doc-5.3.13-0.1mdv2010.2.x86_64.rpm 29f9a4fcee784caeaa54d88ae6f1fda9 2010.1/x86_64/php-dom-5.3.13-0.1mdv2010.2.x86_64.rpm eda0d150731e178912024b0ff6665835 2010.1/x86_64/php-enchant-5.3.13-0.1mdv2010.2.x86_64.rpm cf52bd1d68b75ba6841fe6258b9a1f69 2010.1/x86_64/php-exif-5.3.13-0.1mdv2010.2.x86_64.rpm 0243226aa4bf036a4054b48966f80cf3 2010.1/x86_64/php-fileinfo-5.3.13-0.1mdv2010.2.x86_64.rpm a5bca21277b5c72133340ea059cf0df0 2010.1/x86_64/php-filter-5.3.13-0.1mdv2010.2.x86_64.rpm 3c7007006b1d93d8c96e86dcf27ea38b 2010.1/x86_64/php-fpm-5.3.13-0.1mdv2010.2.x86_64.rpm f9549d4ed2973e5c1519546e971fd81a 2010.1/x86_64/php-ftp-5.3.13-0.1mdv2010.2.x86_64.rpm c7231a7117abab68e8c4d1a3f6a80ccb 2010.1/x86_64/php-gd-5.3.13-0.1mdv2010.2.x86_64.rpm 0ca2c9679c082508a4c2b007ec5a8c46 2010.1/x86_64/php-gettext-5.3.13-0.1mdv2010.2.x86_64.rpm 7d0de98a757251e874aff11ab76db12b 2010.1/x86_64/php-gmp-5.3.13-0.1mdv2010.2.x86_64.rpm 8757a89019988ab9b689c282ae06cf01 2010.1/x86_64/php-hash-5.3.13-0.1mdv2010.2.x86_64.rpm 996f5bcb88fc855db3cc4c779897a9ad 2010.1/x86_64/php-iconv-5.3.13-0.1mdv2010.2.x86_64.rpm 1580fd0ebb4ff0bd0e3c2a6e8925fc8a 2010.1/x86_64/php-imap-5.3.13-0.1mdv2010.2.x86_64.rpm 89a3915683d63a757fa29e53fadf0e1d 2010.1/x86_64/php-ini-5.3.13-0.1mdv2010.2.x86_64.rpm 38115fadfb51fdfd10ea14def4d9143d 2010.1/x86_64/php-intl-5.3.13-0.1mdv2010.2.x86_64.rpm 06aaaa6c43d85283ba31e079f9e1e0e0 2010.1/x86_64/php-json-5.3.13-0.1mdv2010.2.x86_64.rpm b9f6e00a0ac3916b91442ed6c62ad440 2010.1/x86_64/php-ldap-5.3.13-0.1mdv2010.2.x86_64.rpm 9b634f67d80ba028247dafe559276859 2010.1/x86_64/php-mbstring-5.3.13-0.1mdv2010.2.x86_64.rpm bd39ac4808035578dec2e24a98457b03 2010.1/x86_64/php-mcrypt-5.3.13-0.1mdv2010.2.x86_64.rpm 4acc008044469403769de09af155f0d5 2010.1/x86_64/php-mssql-5.3.13-0.1mdv2010.2.x86_64.rpm 8d5826fa6ba3dcaf214839a654e74659 2010.1/x86_64/php-mysql-5.3.13-0.1mdv2010.2.x86_64.rpm ea0e352e2900b493b9d355257ec99a4e 2010.1/x86_64/php-mysqli-5.3.13-0.1mdv2010.2.x86_64.rpm 40b23996dd377b3699ca230f30451e09 2010.1/x86_64/php-mysqlnd-5.3.13-0.1mdv2010.2.x86_64.rpm 4a49bad04937598951093dbf1e57eb19 2010.1/x86_64/php-odbc-5.3.13-0.1mdv2010.2.x86_64.rpm ef337452c999c609f38511b30424aa95 2010.1/x86_64/php-openssl-5.3.13-0.1mdv2010.2.x86_64.rpm 8adda9b3ac67749c4cbbca498fe97042 2010.1/x86_64/php-pcntl-5.3.13-0.1mdv2010.2.x86_64.rpm aab08edd87702937cc87e3eea9683e04 2010.1/x86_64/php-pdo-5.3.13-0.1mdv2010.2.x86_64.rpm b769d4729112be42057acbecc42784fd 2010.1/x86_64/php-pdo_dblib-5.3.13-0.1mdv2010.2.x86_64.rpm 51f45520e81ae006da36c27e9ff23d29 2010.1/x86_64/php-pdo_mysql-5.3.13-0.1mdv2010.2.x86_64.rpm 337fef4ac991f694fbc52f1b51292f0e 2010.1/x86_64/php-pdo_odbc-5.3.13-0.1mdv2010.2.x86_64.rpm ee046601f134c275c1c5394156868176 2010.1/x86_64/php-pdo_pgsql-5.3.13-0.1mdv2010.2.x86_64.rpm f1b25be0d7a2e6948dd6d95776da6f27 2010.1/x86_64/php-pdo_sqlite-5.3.13-0.1mdv2010.2.x86_64.rpm c61a1bc81075ebfc94e820984597774b 2010.1/x86_64/php-pgsql-5.3.13-0.1mdv2010.2.x86_64.rpm 11bed7992443f01305ad4ce8304e9f07 2010.1/x86_64/php-phar-5.3.13-0.1mdv2010.2.x86_64.rpm dd6008750a431325112944e3a5783d0c 2010.1/x86_64/php-posix-5.3.13-0.1mdv2010.2.x86_64.rpm f5531db71580b0c17c5796cfd79f4020 2010.1/x86_64/php-pspell-5.3.13-0.1mdv2010.2.x86_64.rpm 80c9841836ea5246babb676ce79adb9d 2010.1/x86_64/php-readline-5.3.13-0.1mdv2010.2.x86_64.rpm 6271ebd8132c7d94513646d0bbfedf15 2010.1/x86_64/php-recode-5.3.13-0.1mdv2010.2.x86_64.rpm 77e395b19c6068c941cc1ee1c89e15c6 2010.1/x86_64/php-session-5.3.13-0.1mdv2010.2.x86_64.rpm b310511e16b059f753cef3fbe39a35b0 2010.1/x86_64/php-shmop-5.3.13-0.1mdv2010.2.x86_64.rpm 70b99d0120ea8c6018a327996314ab49 2010.1/x86_64/php-snmp-5.3.13-0.1mdv2010.2.x86_64.rpm 33f829a30afaeab74203389d8a48a2d9 2010.1/x86_64/php-soap-5.3.13-0.1mdv2010.2.x86_64.rpm 64295e56e1c81c3322aa49bd1bf2d838 2010.1/x86_64/php-sockets-5.3.13-0.1mdv2010.2.x86_64.rpm 9afd6ba7da1e9ffa58a33c822eeb6a9d 2010.1/x86_64/php-sqlite3-5.3.13-0.1mdv2010.2.x86_64.rpm 8f8e7ee68199f5fdb8867b10d8cede5a 2010.1/x86_64/php-sqlite-5.3.13-0.1mdv2010.2.x86_64.rpm 84d824d25bcd058301b8a8cac4eece97 2010.1/x86_64/php-sybase_ct-5.3.13-0.1mdv2010.2.x86_64.rpm cdd27855aa2b685fba70fea949d0f8f5 2010.1/x86_64/php-sysvmsg-5.3.13-0.1mdv2010.2.x86_64.rpm 47714ed1a09513b0fa4016fed1faf374 2010.1/x86_64/php-sysvsem-5.3.13-0.1mdv2010.2.x86_64.rpm 878cc21a21bcb9120f0c60d0dc3c848d 2010.1/x86_64/php-sysvshm-5.3.13-0.1mdv2010.2.x86_64.rpm ed7017d81df4e68da01f9d790c5e9e75 2010.1/x86_64/php-tidy-5.3.13-0.1mdv2010.2.x86_64.rpm e2dbcbefd496f408e56c5072938f62d6 2010.1/x86_64/php-tokenizer-5.3.13-0.1mdv2010.2.x86_64.rpm c629479463912ae1d91c4399e5b05f67 2010.1/x86_64/php-wddx-5.3.13-0.1mdv2010.2.x86_64.rpm 5a71b4a2a66aa994585f3372f13ad969 2010.1/x86_64/php-xml-5.3.13-0.1mdv2010.2.x86_64.rpm 9e99f81386d263bf395a4462ce3333f8 2010.1/x86_64/php-xmlreader-5.3.13-0.1mdv2010.2.x86_64.rpm 76c565d3fdcba0133b6c25a914a4fed3 2010.1/x86_64/php-xmlrpc-5.3.13-0.1mdv2010.2.x86_64.rpm af3b32c6d60342fb5c7a7c455f647f34 2010.1/x86_64/php-xmlwriter-5.3.13-0.1mdv2010.2.x86_64.rpm 31a1efcba8488b85ec31054bea181262 2010.1/x86_64/php-xsl-5.3.13-0.1mdv2010.2.x86_64.rpm d3b08c3d48baefa3ee14632b876100fb 2010.1/x86_64/php-zip-5.3.13-0.1mdv2010.2.x86_64.rpm a6a3b117484b1bb2e7d449c08fa49b46 2010.1/x86_64/php-zlib-5.3.13-0.1mdv2010.2.x86_64.rpm cd0e0682df60061148366ab6b10394d2 2010.1/SRPMS/apache-mod_php-5.3.13-0.1mdv2010.2.src.rpm f454d177e9bd631df2a4eeca3d33fe38 2010.1/SRPMS/php-5.3.13-0.1mdv2010.2.src.rpm 281be8fe2bb8cd404ade445f64c616da 2010.1/SRPMS/php-ini-5.3.13-0.1mdv2010.2.src.rpm
Mandriva Linux 2011: 35cdd956ce62db7548d2626d8a8f7ae8 2011/i586/apache-mod_php-5.3.13-0.1-mdv2011.0.i586.rpm dd02a276ddca3ae7ad754e19a41e8ff8 2011/i586/libphp5_common5-5.3.13-0.1-mdv2011.0.i586.rpm 7a8feff11aa910f94074c57b54a124d6 2011/i586/php-bcmath-5.3.13-0.1-mdv2011.0.i586.rpm 3c70edc391c1c8fb7845f81f3b3f5bac 2011/i586/php-bz2-5.3.13-0.1-mdv2011.0.i586.rpm d8020203023aaf02a30b22559d5a67c7 2011/i586/php-calendar-5.3.13-0.1-mdv2011.0.i586.rpm e0f010a7d61cf27e13a486ff6e5d6ce4 2011/i586/php-cgi-5.3.13-0.1-mdv2011.0.i586.rpm 345ee6e60bc1973f0049ab25f7dc3557 2011/i586/php-cli-5.3.13-0.1-mdv2011.0.i586.rpm c4e851c0260ad96797ca56deb2b6f3c7 2011/i586/php-ctype-5.3.13-0.1-mdv2011.0.i586.rpm 073d81d6531862861015cf7f53173045 2011/i586/php-curl-5.3.13-0.1-mdv2011.0.i586.rpm 1330fd10a3bdd3787913db7795054819 2011/i586/php-dba-5.3.13-0.1-mdv2011.0.i586.rpm b6d0fefa9206b7cd3f4c73744c324906 2011/i586/php-devel-5.3.13-0.1-mdv2011.0.i586.rpm 32a9567d7a61d6f35654e8d33baec58a 2011/i586/php-doc-5.3.13-0.1-mdv2011.0.i586.rpm 149566d373265e732f1ec3140d11cac2 2011/i586/php-dom-5.3.13-0.1-mdv2011.0.i586.rpm 6f4b1fe24a35809c93e9489347c448bb 2011/i586/php-enchant-5.3.13-0.1-mdv2011.0.i586.rpm 44f27021f7ff8202f5f34a8b0720be5b 2011/i586/php-exif-5.3.13-0.1-mdv2011.0.i586.rpm 5d32e3e7dc217fd69b6dc99dffb747f7 2011/i586/php-fileinfo-5.3.13-0.1-mdv2011.0.i586.rpm 043c17fad24c3113600799c63c5dde18 2011/i586/php-filter-5.3.13-0.1-mdv2011.0.i586.rpm 08c16e8ec2f1c821df8090c38c43809b 2011/i586/php-fpm-5.3.13-0.1-mdv2011.0.i586.rpm 209b4baf966b45cb48790e7a020b1aa9 2011/i586/php-ftp-5.3.13-0.1-mdv2011.0.i586.rpm eac85767ff89fcf822b2c2cf408b2aca 2011/i586/php-gd-5.3.13-0.1-mdv2011.0.i586.rpm 7c7c5ab6370c934b727dac2ad1c9bd33 2011/i586/php-gettext-5.3.13-0.1-mdv2011.0.i586.rpm babb1410dd897504ec526243789fd749 2011/i586/php-gmp-5.3.13-0.1-mdv2011.0.i586.rpm 63feb83eda18663f3ae28fee522a79c8 2011/i586/php-hash-5.3.13-0.1-mdv2011.0.i586.rpm a8aad04e3c20f9223832632f412c4c69 2011/i586/php-iconv-5.3.13-0.1-mdv2011.0.i586.rpm 22f5f2b807af8ea7445e8682f6718ab2 2011/i586/php-imap-5.3.13-0.1-mdv2011.0.i586.rpm ff780d80135cc18647edecdde6b77e16 2011/i586/php-ini-5.3.13-0.1-mdv2011.0.i586.rpm 10475ddafeeb384ae3afb7f5d2d1afa8 2011/i586/php-intl-5.3.13-0.1-mdv2011.0.i586.rpm e3261da452695aed46718ec06a1f17ed 2011/i586/php-json-5.3.13-0.1-mdv2011.0.i586.rpm f6238f4f4566582418666333eb797994 2011/i586/php-ldap-5.3.13-0.1-mdv2011.0.i586.rpm 9ae1d9fc8320fa272fa56484f425e7d8 2011/i586/php-mbstring-5.3.13-0.1-mdv2011.0.i586.rpm 86710277f0bca955ced6610b199fcf16 2011/i586/php-mcrypt-5.3.13-0.1-mdv2011.0.i586.rpm a9dad85e7658b897bcd9a3c088a71168 2011/i586/php-mssql-5.3.13-0.1-mdv2011.0.i586.rpm 66063a764c3a2b90143c5653c0f1dd2c 2011/i586/php-mysql-5.3.13-0.1-mdv2011.0.i586.rpm c7993bdf0b9ceaf4f2fa86dbc558ddfb 2011/i586/php-mysqli-5.3.13-0.1-mdv2011.0.i586.rpm afcd3e1e62498bffaa9432c5d5c505f5 2011/i586/php-mysqlnd-5.3.13-0.1-mdv2011.0.i586.rpm 21a837c5413d3e89b7747b70b343ff39 2011/i586/php-odbc-5.3.13-0.1-mdv2011.0.i586.rpm 9653980157e82a7cc1fcb428e6a11831 2011/i586/php-openssl-5.3.13-0.1-mdv2011.0.i586.rpm 2a7283323df15b449a0911147e4e120a 2011/i586/php-pcntl-5.3.13-0.1-mdv2011.0.i586.rpm 5943398e22f4b3aab9fb741e7b6a8014 2011/i586/php-pdo-5.3.13-0.1-mdv2011.0.i586.rpm 4a8632f0605a849c61148479c3dce11c 2011/i586/php-pdo_dblib-5.3.13-0.1-mdv2011.0.i586.rpm 90bfc85fce2cf88d5cc7e9d383bac674 2011/i586/php-pdo_mysql-5.3.13-0.1-mdv2011.0.i586.rpm 13a2e35fe9389ceff1bd86915d4fbb45 2011/i586/php-pdo_odbc-5.3.13-0.1-mdv2011.0.i586.rpm bd5ac6d3de510f5648e0796262ee0284 2011/i586/php-pdo_pgsql-5.3.13-0.1-mdv2011.0.i586.rpm c8a144f194b2e263d30d42549ef72df7 2011/i586/php-pdo_sqlite-5.3.13-0.1-mdv2011.0.i586.rpm 9fc72c845adc2c8b526ccda1045e95cb 2011/i586/php-pgsql-5.3.13-0.1-mdv2011.0.i586.rpm ceed9de56ba7babbb1103c0505360ae8 2011/i586/php-phar-5.3.13-0.1-mdv2011.0.i586.rpm 99df22a88e7ec65277c5f1d67946b674 2011/i586/php-posix-5.3.13-0.1-mdv2011.0.i586.rpm 2a7c90e39eaed912fd8ef49d5edcf3b0 2011/i586/php-pspell-5.3.13-0.1-mdv2011.0.i586.rpm b4f54f67b9372e1bef78b6a40a756d31 2011/i586/php-readline-5.3.13-0.1-mdv2011.0.i586.rpm c3ab166b9fc83521a75c13dff80f3a56 2011/i586/php-recode-5.3.13-0.1-mdv2011.0.i586.rpm a6c67fe24586ad45656a0e11906e7bb3 2011/i586/php-session-5.3.13-0.1-mdv2011.0.i586.rpm 39dd1f3c8218f0537aad8f03aa96b833 2011/i586/php-shmop-5.3.13-0.1-mdv2011.0.i586.rpm 7d516b28e8f45f06883657d93d152c31 2011/i586/php-snmp-5.3.13-0.1-mdv2011.0.i586.rpm 511c2eadd6584227584704adf97150e9 2011/i586/php-soap-5.3.13-0.1-mdv2011.0.i586.rpm d2bb4858eb41257b9e3c72b385b55fed 2011/i586/php-sockets-5.3.13-0.1-mdv2011.0.i586.rpm ef20af5ac9def94fc4db18e4e9ef80f3 2011/i586/php-sqlite3-5.3.13-0.1-mdv2011.0.i586.rpm d87d2f151f37050dd9f3d1fb66cc5be6 2011/i586/php-sqlite-5.3.13-0.1-mdv2011.0.i586.rpm 1214cb4bc37c7fb285dd6c2f00411904 2011/i586/php-sybase_ct-5.3.13-0.1-mdv2011.0.i586.rpm 1bd2a3a7f3408e7e304190e4145cec7f 2011/i586/php-sysvmsg-5.3.13-0.1-mdv2011.0.i586.rpm 602e9fbc2dd26d526709da1fbb5f43a3 2011/i586/php-sysvsem-5.3.13-0.1-mdv2011.0.i586.rpm 1f4d61a55c51175890bf3fe8da58178b 2011/i586/php-sysvshm-5.3.13-0.1-mdv2011.0.i586.rpm 7f81e3126928fd1e48e61a04e978e549 2011/i586/php-tidy-5.3.13-0.1-mdv2011.0.i586.rpm a2ea94863a07932b8cc8adfaf9984801 2011/i586/php-tokenizer-5.3.13-0.1-mdv2011.0.i586.rpm 7ca9553c6d0280546bc198cf7e349fd0 2011/i586/php-wddx-5.3.13-0.1-mdv2011.0.i586.rpm 2657cd50ab3d1ed89c40dd022b18a78a 2011/i586/php-xml-5.3.13-0.1-mdv2011.0.i586.rpm 4484a28aa070a5507ca51b7b6ccd9c4f 2011/i586/php-xmlreader-5.3.13-0.1-mdv2011.0.i586.rpm fb655f70ba8fd02cb283c685fb32198d 2011/i586/php-xmlrpc-5.3.13-0.1-mdv2011.0.i586.rpm 595eb1d07062b9ea1cbfa4db0c858b24 2011/i586/php-xmlwriter-5.3.13-0.1-mdv2011.0.i586.rpm 13c04bf3f0134e29372d595589f59193 2011/i586/php-xsl-5.3.13-0.1-mdv2011.0.i586.rpm 0a98ea3d088772271f96eeb7a5f23ba2 2011/i586/php-zip-5.3.13-0.1-mdv2011.0.i586.rpm e5242f7e29696cf3f9a80eb65ac97184 2011/i586/php-zlib-5.3.13-0.1-mdv2011.0.i586.rpm 43577b68968398f3e83bbb150c2ba4dd 2011/SRPMS/apache-mod_php-5.3.13-0.1.src.rpm 75c0847b9bfff7a4ecf5f5097e39b5e0 2011/SRPMS/php-5.3.13-0.1.src.rpm daa6819e438adce22445ffb6f25c10f0 2011/SRPMS/php-ini-5.3.13-0.1.src.rpm
Mandriva Linux 2011/X86_64: 6f1b882d07cd219f673c90396542719e 2011/x86_64/apache-mod_php-5.3.13-0.1-mdv2011.0.x86_64.rpm 11c80f46a5669769a85ef8f391d07a70 2011/x86_64/lib64php5_common5-5.3.13-0.1-mdv2011.0.x86_64.rpm 7e4e71c5b17031412c13ea2d9b2477c5 2011/x86_64/php-bcmath-5.3.13-0.1-mdv2011.0.x86_64.rpm 528be2af28cf1a4843850e1b565c3898 2011/x86_64/php-bz2-5.3.13-0.1-mdv2011.0.x86_64.rpm 39b482e7037283b454056f4882d5917b 2011/x86_64/php-calendar-5.3.13-0.1-mdv2011.0.x86_64.rpm 9829b1d862405439321b3ecbfb4c7ea1 2011/x86_64/php-cgi-5.3.13-0.1-mdv2011.0.x86_64.rpm 5e705973df7b6c201fabeb2c75d3a74a 2011/x86_64/php-cli-5.3.13-0.1-mdv2011.0.x86_64.rpm eb3b69da40fb3992024aa0a9fea15a8d 2011/x86_64/php-ctype-5.3.13-0.1-mdv2011.0.x86_64.rpm a7fd1763425d19677b6adc88a835770f 2011/x86_64/php-curl-5.3.13-0.1-mdv2011.0.x86_64.rpm 0a4712efbe6fd4e1d2590842f620982c 2011/x86_64/php-dba-5.3.13-0.1-mdv2011.0.x86_64.rpm ca749d3257f0bb0595a6495816d17c29 2011/x86_64/php-devel-5.3.13-0.1-mdv2011.0.x86_64.rpm 56a0d712c402bcddcaba739f35ea07a6 2011/x86_64/php-doc-5.3.13-0.1-mdv2011.0.x86_64.rpm 2a6cf45b3a94ae3e571e3dbcbbc08804 2011/x86_64/php-dom-5.3.13-0.1-mdv2011.0.x86_64.rpm 0f109c681babe75db077f8d9af926f85 2011/x86_64/php-enchant-5.3.13-0.1-mdv2011.0.x86_64.rpm 7d419c4fd0f8180bb777b4b198dbf192 2011/x86_64/php-exif-5.3.13-0.1-mdv2011.0.x86_64.rpm befa5de9e5e4a3a2ab04a4899a0c654e 2011/x86_64/php-fileinfo-5.3.13-0.1-mdv2011.0.x86_64.rpm ef19b2adb8544747b6dbc673d5b758cd 2011/x86_64/php-filter-5.3.13-0.1-mdv2011.0.x86_64.rpm 42952a220d307fab9e88012a0db43ecd 2011/x86_64/php-fpm-5.3.13-0.1-mdv2011.0.x86_64.rpm 40c04426bafdec1b7ac6efd7e80112e3 2011/x86_64/php-ftp-5.3.13-0.1-mdv2011.0.x86_64.rpm 4fb018ed2383c082d45e4b75a346d588 2011/x86_64/php-gd-5.3.13-0.1-mdv2011.0.x86_64.rpm 7237c26a2db73c6a115fc4e035ecb0f2 2011/x86_64/php-gettext-5.3.13-0.1-mdv2011.0.x86_64.rpm 1a474b43b899509ba9516fa042fe1ddd 2011/x86_64/php-gmp-5.3.13-0.1-mdv2011.0.x86_64.rpm 28e8e4748273a5ccaeb65b54d666402f 2011/x86_64/php-hash-5.3.13-0.1-mdv2011.0.x86_64.rpm d3f5e9dfc04ce0ad319884c2501529c4 2011/x86_64/php-iconv-5.3.13-0.1-mdv2011.0.x86_64.rpm c166f30d0bab63ab66c91fdc7f23109e 2011/x86_64/php-imap-5.3.13-0.1-mdv2011.0.x86_64.rpm c2a6c0df9bdb831fa633b00afe1656ca 2011/x86_64/php-ini-5.3.13-0.1-mdv2011.0.x86_64.rpm 8ef06e0d3bc50c6af030273db341f33f 2011/x86_64/php-intl-5.3.13-0.1-mdv2011.0.x86_64.rpm 5e59fb195dd577622ba638e6f61301ce 2011/x86_64/php-json-5.3.13-0.1-mdv2011.0.x86_64.rpm 51d4d134118097c396fd9ae22658fd95 2011/x86_64/php-ldap-5.3.13-0.1-mdv2011.0.x86_64.rpm 43089444e735a7fb955f4b2073a89b8e 2011/x86_64/php-mbstring-5.3.13-0.1-mdv2011.0.x86_64.rpm 67cb0bb2abf2ac499616a9f6b67e42a4 2011/x86_64/php-mcrypt-5.3.13-0.1-mdv2011.0.x86_64.rpm 6167541236c972e1b3ca07ab4e3aa435 2011/x86_64/php-mssql-5.3.13-0.1-mdv2011.0.x86_64.rpm 8169e0c8a9121ed5b088e50f729a08f2 2011/x86_64/php-mysql-5.3.13-0.1-mdv2011.0.x86_64.rpm a9f88ce7ae03e6c9614bbbe77badd211 2011/x86_64/php-mysqli-5.3.13-0.1-mdv2011.0.x86_64.rpm 09ffa27ee341ea0f316c001302dc6b4f 2011/x86_64/php-mysqlnd-5.3.13-0.1-mdv2011.0.x86_64.rpm 52eca2dca4ad432fdb9ca2a42f8af637 2011/x86_64/php-odbc-5.3.13-0.1-mdv2011.0.x86_64.rpm f6e46b6f5ad8a961cbfde8b8e767054a 2011/x86_64/php-openssl-5.3.13-0.1-mdv2011.0.x86_64.rpm 3dd5efd7a83830669edf081f84a6ddd0 2011/x86_64/php-pcntl-5.3.13-0.1-mdv2011.0.x86_64.rpm f000fb58640165fa93eb8939c88f51b9 2011/x86_64/php-pdo-5.3.13-0.1-mdv2011.0.x86_64.rpm e91e95bb78ee4ccc6edc8a676cf83331 2011/x86_64/php-pdo_dblib-5.3.13-0.1-mdv2011.0.x86_64.rpm 82ca0b0fa4daa2d13d351f57cac4b1ad 2011/x86_64/php-pdo_mysql-5.3.13-0.1-mdv2011.0.x86_64.rpm 2a2e4cf2e7b3d6c718072e34bbf1f4d5 2011/x86_64/php-pdo_odbc-5.3.13-0.1-mdv2011.0.x86_64.rpm bae3bd360ca8da31e3444555b1ba5984 2011/x86_64/php-pdo_pgsql-5.3.13-0.1-mdv2011.0.x86_64.rpm 265ffe4fec20f1a276a4ae598f897097 2011/x86_64/php-pdo_sqlite-5.3.13-0.1-mdv2011.0.x86_64.rpm de5791ef4c4f09caf289efcc2946bd40 2011/x86_64/php-pgsql-5.3.13-0.1-mdv2011.0.x86_64.rpm 3e5a5c8d71d73d792f6a9c5d1d1ff0e0 2011/x86_64/php-phar-5.3.13-0.1-mdv2011.0.x86_64.rpm 1b106b0000d8cf09217a8c6066a08abe 2011/x86_64/php-posix-5.3.13-0.1-mdv2011.0.x86_64.rpm 4142e252a6e80033b49966678333d4fc 2011/x86_64/php-pspell-5.3.13-0.1-mdv2011.0.x86_64.rpm 2eaa627598b484e870a745dfce89561c 2011/x86_64/php-readline-5.3.13-0.1-mdv2011.0.x86_64.rpm 16aa5e0d0038dad164fd251584267b25 2011/x86_64/php-recode-5.3.13-0.1-mdv2011.0.x86_64.rpm 1f2221028312e63a8fe0153b0f37268d 2011/x86_64/php-session-5.3.13-0.1-mdv2011.0.x86_64.rpm 08339bda25dfc15853d8f4f3093906b5 2011/x86_64/php-shmop-5.3.13-0.1-mdv2011.0.x86_64.rpm af74d89511d56956fd18f47588c8134a 2011/x86_64/php-snmp-5.3.13-0.1-mdv2011.0.x86_64.rpm a60760ee2c728bcd933f7f129918e20f 2011/x86_64/php-soap-5.3.13-0.1-mdv2011.0.x86_64.rpm 23edc8e373f493137a741d3f5b8a776f 2011/x86_64/php-sockets-5.3.13-0.1-mdv2011.0.x86_64.rpm 0ee3559a3748ba690ee5c4f99a324b1e 2011/x86_64/php-sqlite3-5.3.13-0.1-mdv2011.0.x86_64.rpm a4b3e977bffee9f122cb6e9582edb3f1 2011/x86_64/php-sqlite-5.3.13-0.1-mdv2011.0.x86_64.rpm edcf9dd12733f50cc808a336b26e0fe2 2011/x86_64/php-sybase_ct-5.3.13-0.1-mdv2011.0.x86_64.rpm d6cd75e157f0b6b026444a1407cf90a7 2011/x86_64/php-sysvmsg-5.3.13-0.1-mdv2011.0.x86_64.rpm 0c283bd1ae67f256a6e776f35e36b30c 2011/x86_64/php-sysvsem-5.3.13-0.1-mdv2011.0.x86_64.rpm 85f7cb718011e2ff913ce142a12a6343 2011/x86_64/php-sysvshm-5.3.13-0.1-mdv2011.0.x86_64.rpm 63b205689a9cb3929379ce8c6415fecc 2011/x86_64/php-tidy-5.3.13-0.1-mdv2011.0.x86_64.rpm addd08fffff1581bfa703aeba53c5566 2011/x86_64/php-tokenizer-5.3.13-0.1-mdv2011.0.x86_64.rpm 138500dc24f46346ae847fc2f56ca7a7 2011/x86_64/php-wddx-5.3.13-0.1-mdv2011.0.x86_64.rpm 27801c8421becc9030eb1e2e06342efe 2011/x86_64/php-xml-5.3.13-0.1-mdv2011.0.x86_64.rpm 1fefd162d7a627212ccca1ecda6ccdf2 2011/x86_64/php-xmlreader-5.3.13-0.1-mdv2011.0.x86_64.rpm 2e6d1bbc2319425bfe20b189f4fe4b79 2011/x86_64/php-xmlrpc-5.3.13-0.1-mdv2011.0.x86_64.rpm 421888369bc51fcfcb7a0fcedb23e3e4 2011/x86_64/php-xmlwriter-5.3.13-0.1-mdv2011.0.x86_64.rpm f5d79e3adf80fadf2f185db98ec3b142 2011/x86_64/php-xsl-5.3.13-0.1-mdv2011.0.x86_64.rpm e126fa1b8d8f0a7c18bae56a00345299 2011/x86_64/php-zip-5.3.13-0.1-mdv2011.0.x86_64.rpm a8492adb1cc9cd92d2771d151161ac2e 2011/x86_64/php-zlib-5.3.13-0.1-mdv2011.0.x86_64.rpm 43577b68968398f3e83bbb150c2ba4dd 2011/SRPMS/apache-mod_php-5.3.13-0.1.src.rpm 75c0847b9bfff7a4ecf5f5097e39b5e0 2011/SRPMS/php-5.3.13-0.1.src.rpm daa6819e438adce22445ffb6f25c10f0 2011/SRPMS/php-ini-5.3.13-0.1.src.rpm
To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
iD8DBQFPq4WAmqjQ0CJFipgRAihWAKCc3667vbSD/ihxb7LB9g9x2C+bnQCg89XH JTVUFGYH3hR84ZM7EV65I9g= =hQaF -----END PGP SIGNATURE-----
Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201205-0305", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "enterprise linux desktop", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "6.0" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "5.3" }, { "model": "hp-ux", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "b.11.23" }, { "model": "opensuse", "scope": "eq", "trust": 1.0, "vendor": "opensuse", "version": "12.1" }, { "model": "linux enterprise software development kit", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "10" }, { "model": "mac os x", "scope": "lt", "trust": 1.0, "vendor": "apple", "version": "10.8.2" }, { "model": "storage", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "2.0" }, { "model": "enterprise linux server", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "5.0" }, { "model": "enterprise linux server", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "6.0" }, { "model": "opensuse", "scope": "eq", "trust": 1.0, "vendor": "opensuse", "version": "11.4" }, { "model": "php", "scope": "lt", "trust": 1.0, "vendor": "php", "version": "5.4.2" }, { "model": "linux enterprise software development kit", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "11" }, { "model": "hp-ux", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "b.11.31" }, { "model": "mac os x", "scope": "lt", "trust": 1.0, "vendor": "apple", "version": "10.7.5" }, { "model": "fedora", "scope": "eq", "trust": 1.0, "vendor": "fedoraproject", "version": "39" }, { "model": "mac os x", "scope": "gte", "trust": 1.0, "vendor": "apple", "version": "10.6.8" }, { "model": "gluster storage server for on-premise", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "2.0" }, { "model": "mac os x", "scope": "gte", "trust": 1.0, "vendor": "apple", "version": "10.8.0" }, { "model": "linux enterprise server", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "10" }, { "model": "fedora", "scope": "eq", "trust": 1.0, "vendor": "fedoraproject", "version": "40" }, { "model": "storage for public cloud", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "2.0" }, { "model": "enterprise linux eus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "6.1" }, { "model": "enterprise linux eus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "6.2" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "5.0" }, { "model": "application stack", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "2.0" }, { "model": "enterprise linux eus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "5.6" }, { "model": "php", "scope": "gte", "trust": 1.0, "vendor": "php", "version": "5.4.0" }, { "model": "php", "scope": "lt", "trust": 1.0, "vendor": "php", "version": "5.3.12" }, { "model": "linux enterprise server", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "11" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "6.0" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "6.0" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "5.6" }, { "model": "php", "scope": "eq", "trust": 0.9, "vendor": "php", "version": "5.3.1" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "parallels holdings", "version": null }, { "model": "php", "scope": "lt", "trust": 0.8, "vendor": "the php group", "version": "version 5.3.12 earlier" }, { "model": "php", "scope": "lt", "trust": 0.8, "vendor": "the php group", "version": "version 5.4.2 earlier" }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.6.8" }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.7 to v10.7.4" }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.8 and v10.8.1" }, { "model": "mac os x server", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.6.8" }, { "model": "mac os x server", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.7 to v10.7.4" }, { "model": "garoon", "scope": "eq", "trust": 0.8, "vendor": "cybozu", "version": "3.1.0 to 3.1.3" }, { "model": "garoon", "scope": "eq", "trust": 0.8, "vendor": "cybozu", "version": "3.5.0 to 3.5.1" }, { "model": "php", "scope": "eq", "trust": 0.6, "vendor": "php", "version": "5.2.16" }, { "model": "php", "scope": "eq", "trust": 0.6, "vendor": "php", "version": "5.3.0" }, { "model": "php", "scope": "eq", "trust": 0.6, "vendor": "php", "version": "5.2.15" }, { "model": "php", "scope": "eq", "trust": 0.6, "vendor": "php", "version": "5.2.8" }, { "model": "php", "scope": "eq", "trust": 0.6, "vendor": "php", "version": "5.2.13" }, { "model": "php", "scope": "eq", "trust": 0.6, "vendor": "php", "version": "5.2.17" }, { "model": "php", "scope": "eq", "trust": 0.6, "vendor": "php", "version": "5.2.14" }, { "model": "php", "scope": "eq", "trust": 0.6, "vendor": "php", "version": "5.2.11" }, { "model": "php", "scope": "eq", "trust": 0.6, "vendor": "php", "version": "5.2.12" }, { "model": "plesk panel", "scope": "eq", "trust": 0.3, "vendor": "parallels", "version": "9.5.4" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.10" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.2" }, { "model": "enterprise linux hpc node optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "ip office application server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "8.1" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "6.2" }, { "model": "voice portal sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.3.8" }, { "model": "linux enterprise sdk sp1", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11" }, { "model": "voice portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "linux enterprise server sp3 ltss", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "5" }, { "model": "enterprise linux server eus 6.1.z", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "enterprise linux server optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "enterprise linux long life server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5.3" }, { "model": "appliance server", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "3.0" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.3" }, { "model": "enterprise server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "5" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.3.10" }, { "model": "voice portal sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7" }, { "model": "ctpview", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "4.6" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.10" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.0" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.1" }, { "model": "aura communication manager utility services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "linux lts amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2011" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.8" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.5" }, { "model": "linux lts powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "ctpview", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "4.3" }, { "model": "aura messaging", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.3" }, { "model": "linux enterprise sdk sp4", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.4" }, { "model": "ctpview", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "4.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.8" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "11.4" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.04" }, { "model": "enterprise linux workstation optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "voice portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.8.1" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "aura communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "plesk panel", "scope": "eq", "trust": 0.3, "vendor": "parallels", "version": "9.3" }, { "model": "linux lts sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "ctpview 7.0r1", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "lotus foundations start 1.2.2b", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.3.9" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.1" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.1" }, { "model": "aura messaging", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "linux lts i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.04" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.2" }, { "model": "enterprise linux eus 5.6.z server", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.2" }, { "model": "system management homepage", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "7.2.1" }, { "model": "linux enterprise server sp1", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11" }, { "model": "aura session manager sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.4.2" }, { "model": "linux enterprise server sp4", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "ip office application server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "6" }, { "model": "lotus foundations start 1.2.2a", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "mac os", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "x10.7.5" }, { "model": "ctpview", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "4.5" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.1" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "enterprise linux desktop optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "aura communication manager utility services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2010.1" }, { "model": "voice portal sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.3.3" }, { "model": "linux enterprise server sp2", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11" }, { "model": "voice portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1.2" }, { "model": "ip office application server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.0" }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": "linux enterprise sdk sp2", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "enterprise linux server optional eus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6.1" }, { "model": "linux lts i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "12.04" }, { "model": "enterprise linux hpc node", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.3.6" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.3.5" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "aura communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.1" }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "110" }, { "model": "voice portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "ip office application server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "8.0" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.3.4" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2011" }, { "model": "linux lts lpia", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.04" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.3.12" }, { "model": "ctpview", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "4.4" }, { "model": "enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "linux lts amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "12.04" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.3.7" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.04" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.0" }, { "model": "aura messaging", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.8" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.3" }, { "model": "linux enterprise server for vmware sp1", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.1.2" }, { "model": "mac os", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "x10.8.2" }, { "model": "linux enterprise server for vmware sp2", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11" }, { "model": "hp-ux b.11.31", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "aura communication manager utility services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "appliance server", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "3.0x64" }, { "model": "enterprise linux desktop workstation client", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "plesk panel", "scope": "eq", "trust": 0.3, "vendor": "parallels", "version": "9.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.1" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.4.1" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "client", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "2008" }, { "model": "plesk panel", "scope": "eq", "trust": 0.3, "vendor": "parallels", "version": "8.6" }, { "model": "plesk panel", "scope": "eq", "trust": 0.3, "vendor": "parallels", "version": "9.0" }, { "model": "ip office application server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.3" }, { "model": "lotus foundations start", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.2" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.1.1" }, { "model": "enterprise server x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "5" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.1" }, { "model": "enterprise linux server eus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6.0" }, { "model": "aura session manager sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "11x64" }, { "model": "system management homepage", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "7.1.1" }, { "model": "enterprise linux server optional eus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6.0" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "12.1" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.3.2" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.2" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2010.1" }, { "model": "php", "scope": "ne", "trust": 0.3, "vendor": "php", "version": "5.3.13" } ], "sources": [ { "db": "CERT/CC", "id": "VU#673343" }, { "db": "BID", "id": "53388" }, { "db": "JVNDB", "id": "JVNDB-2012-002235" }, { "db": "CNNVD", "id": "CNNVD-201205-108" }, { "db": "NVD", "id": "CVE-2012-1823" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:php:php", "vulnerable": true }, { "cpe22Uri": "cpe:/o:apple:mac_os_x", "vulnerable": true }, { "cpe22Uri": "cpe:/o:apple:mac_os_x_server", "vulnerable": true }, { "cpe22Uri": "cpe:/a:cybozu:garoon", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-002235" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Red Hat", "sources": [ { "db": "PACKETSTORM", "id": "112631" }, { "db": "PACKETSTORM", "id": "112606" }, { "db": "PACKETSTORM", "id": "112507" }, { "db": "PACKETSTORM", "id": "112605" } ], "trust": 0.4 }, "cve": "CVE-2012-1823", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2012-1823", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "availabilityRequirement": "NOT DEFINED", "baseScore": 7.5, "collateralDamagePotential": "NOT DEFINED", "confidentialityImpact": "PARTIAL", "confidentialityRequirement": "NOT DEFINED", "enviromentalScore": 4.9, "exploitability": "HIGH", "exploitabilityScore": 10.0, "id": "CVE-2012-1823", "impactScore": 6.4, "integrityImpact": "PARTIAL", "integrityRequirement": "NOT DEFINED", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "remediationLevel": "OFFICIAL FIX", "reportConfidence": "CONFIRMED", "severity": "HIGH", "targetDistribution": "MEDIUM", "trust": 0.8, "userInteractionRequired": null, "vector_string": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2012-1823", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2012-1823", "trust": 1.6, "value": "HIGH" }, { "author": "nvd@nist.gov", "id": "CVE-2012-1823", "trust": 1.0, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-201205-108", "trust": 0.6, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2012-1823", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#673343" }, { "db": "VULMON", "id": "CVE-2012-1823" }, { "db": "JVNDB", "id": "JVNDB-2012-002235" }, { "db": "CNNVD", "id": "CNNVD-201205-108" }, { "db": "NVD", "id": "CVE-2012-1823" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "sapi/cgi/cgi_main.c in PHP before 5.3.12 and 5.4.x before 5.4.2, when configured as a CGI script (aka php-cgi), does not properly handle query strings that lack an = (equals sign) character, which allows remote attackers to execute arbitrary code by placing command-line options in the query string, related to lack of skipping a certain php_getopt for the \u0027d\u0027 case. Parallels Plesk Panel versions 9.0 - 9.2.3 on Linux platforms are vulnerable to remote code execution. PHP is prone to an information-disclosure vulnerability. \nExploiting this issue allows remote attackers to view the source code of files in the context of the server process. This may allow the attacker to obtain sensitive information and to run arbitrary PHP code on the affected computer; other attacks are also possible. ----------------------------------------------------------------------\n\nBecome a PSI 3.0 beta tester!\nTest-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. \nDownload it here!\nhttp://secunia.com/psi_30_beta_launch\n\n----------------------------------------------------------------------\n\nTITLE:\nUbuntu update for php\n\nSECUNIA ADVISORY ID:\nSA49097\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/49097/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=49097\n\nRELEASE DATE:\n2012-05-07\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/49097/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/49097/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=49097\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nUbuntu has issued an update for php. This fixes a vulnerability,\nwhich can be exploited by malicious people to disclose certain\nsensitive information or compromise a vulnerable system. \n\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nORIGINAL ADVISORY:\nUSN-1437-1:\nhttp://www.ubuntu.com/usn/usn-1437-1/\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. \nHP System Management Homepage (SMH) before v7.1.1 running on Linux, Windows\nand VMware ESX. \n\nAdditionally, this update fixes insufficient validation of upload\nname which lead to corrupted $_FILES indices. \n\nFor the stable distribution (squeeze), this problem has been fixed in\nversion 5.3.3-7+squeeze9. \n\nThe testing distribution (wheezy) will be fixed soon. \n\nFor the unstable distribution (sid), this problem has been fixed in\nversion 5.4.3-1. \n\nWe recommend that you upgrade your php5 packages. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nNote: the current version of the following document is available here:\nhttps://h20566.www2.hp.com/portal/site/hpsc/public/kb/\ndocDisplay?docId=emr_na-c03368475\n\nSUPPORT COMMUNICATION - SECURITY BULLETIN\n\nDocument ID: c03368475\nVersion: 1\n\nHPSBUX02791 SSRT100856 rev.1 - HP-UX Apache Web Server running PHP, Remote\nExecution of Arbitrary Code, Privilege Elevation, Denial of Service (DoS)\n\nNOTICE: The information in this Security Bulletin should be acted upon as\nsoon as possible. \n\nRelease Date: 2012-06-14\nLast Updated: 2012-06-14\n\nPotential Security Impact: Remote execution of arbitrary code, privilege\nelevation, or Denial of Service (DoS). \n\nSource: Hewlett-Packard Company, HP Software Security Response Team\n\nVULNERABILITY SUMMARY\nPotential security vulnerabilities have been identified with HP-UX Apache Web\nServer running PHP. These vulnerabilities could be exploited remotely to\nexecute arbitrary code, elevate privileges, or create a Denial of Service\n(DoS). \n\nReferences: CVE-2011-4153, CVE-2012-0830, CVE-2012-0883, CVE-2012-1172,\nCVE-2012-1823, CVE-2012-2311\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \nHP-UX B.11.23, B.11.31 running HP-UX Apache Web Server Suite v3.24 or earlier\n\nBACKGROUND\nFor a PGP signed\n\nCVSS 2.0 Base Metrics\n===========================================================\n Reference Base Vector Base Score\nCVE-2011-4153 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0\nCVE-2012-0830 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5\nCVE-2012-0883 (AV:L/AC:M/Au:N/C:C/I:C/A:C) 6.9\nCVE-2012-1172 (AV:N/AC:M/Au:N/C:N/I:P/A:P) 5.8\nCVE-2012-1823 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5\nCVE-2012-2311 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5\n===========================================================\n Information on CVSS is documented\n in HP Customer Notice: HPSN-2008-002\n\nRESOLUTION\n\nHP has provided the following software updates to resolve the\nvulnerabilities. \nThe updates are available for download from http://software.hp.com\n\nHP-UX Web Server Suite v.3.24 containing Apache v2.2.15.13 and PHP v5.2.17\nHP-UX 11i Release\n Apache Depot name\n\nB.11.23 (32-bit)\n HPUXWS22ATW-B324-32\n\nB.11.23 (64-bit)\n HPUXWS22ATW-B324-64\n\nB.11.31 (32-bit)\n HPUXWS22ATW-B324-32\n\nB.11.31 (64-bit)\n HPUXWS22ATW-B324-64\n\nMANUAL ACTIONS: Yes - Update\nInstall HP-UX Web Server Suite v3.24 or subsequent. \n\nPRODUCT SPECIFIC INFORMATION\n\nHP-UX Software Assistant: HP-UX Software Assistant is an enhanced application\nthat replaces HP-UX Security Patch Check. It analyzes all Security Bulletins\nissued by HP and lists recommended actions that may apply to a specific HP-UX\nsystem. It can also download patches and create a depot automatically. For\nmore information see https://www.hp.com/go/swa\n\nThe following text is for use by the HP-UX Software Assistant. \nHP-UX Web Server Suite v3.24\nAFFECTED VERSIONS\n\nHP-UX B.11.23\n==============\nhpuxws22APCH32.APACHE\nhpuxws22APCH32.APACHE2\nhpuxws22APCH32.AUTH_LDAP\nhpuxws22APCH32.AUTH_LDAP2\nhpuxws22APCH32.MOD_JK\nhpuxws22APCH32.MOD_JK2\nhpuxws22APCH32.MOD_PERL\nhpuxws22APCH32.MOD_PERL2\nhpuxws22APCH32.PHP\nhpuxws22APCH32.PHP2\nhpuxws22APCH32.WEBPROXY\nhpuxws22APCH32.WEBPROXY2\nhpuxws22APACHE.APACHE\nhpuxws22APACHE.APACHE2\nhpuxws22APACHE.AUTH_LDAP\nhpuxws22APACHE.AUTH_LDAP2\nhpuxws22APACHE.MOD_JK\nhpuxws22APACHE.MOD_JK2\nhpuxws22APACHE.MOD_PERL\nhpuxws22APACHE.MOD_PERL2\nhpuxws22APACHE.PHP\nhpuxws22APACHE.PHP2\nhpuxws22APACHE.WEBPROXY\nhpuxws22APACHE.WEBPROXY2\naction: install revision B.2.2.15.13 or subsequent\n\nHP-UX B.11.31\n==================\nhpuxws22APCH32.APACHE\nhpuxws22APCH32.APACHE2\nhpuxws22APCH32.AUTH_LDAP\nhpuxws22APCH32.AUTH_LDAP2\nhpuxws22APCH32.MOD_JK\nhpuxws22APCH32.MOD_JK2\nhpuxws22APCH32.MOD_PERL\nhpuxws22APCH32.MOD_PERL2\nhpuxws22APCH32.PHP\nhpuxws22APCH32.PHP2\nhpuxws22APCH32.WEBPROXY\nhpuxws22APCH32.WEBPROXY2\nhpuxws22APACHE.APACHE\nhpuxws22APACHE.APACHE2\nhpuxws22APACHE.AUTH_LDAP\nhpuxws22APACHE.AUTH_LDAP2\nhpuxws22APACHE.MOD_JK\nhpuxws22APACHE.MOD_JK2\nhpuxws22APACHE.MOD_PERL\nhpuxws22APACHE.MOD_PERL2\nhpuxws22APACHE.PHP\nhpuxws22APACHE.PHP2\nhpuxws22APACHE.WEBPROXY\nhpuxws22APACHE.WEBPROXY2\n\naction: install revision B.2.2.15.13 or subsequent\n\nEND AFFECTED VERSIONS\n\nHISTORY\nVersion:1 (rev.1) - 14 June 2012 Initial release\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running HP software products should be applied in\naccordance with the customer\u0027s patch management policy. \n\nSupport: For issues about implementing the recommendations of this Security\nBulletin, contact normal HP Services support channel. For other issues about\nthe content of this Security Bulletin, send e-mail to security-alert@hp.com. \n\nReport: To report a potential security vulnerability with any HP supported\nproduct, send Email to: security-alert@hp.com\n\nSubscribe: To initiate a subscription to receive future HP Security Bulletin\nalerts via Email:\nhttp://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins\n\nSecurity Bulletin List: A list of HP Security Bulletins, updated\nperiodically, is contained in HP Security Notice HPSN-2011-001:\nhttps://h20566.www2.hp.com/portal/site/hpsc/public/kb/\ndocDisplay?docId=emr_na-c02964430\n\nSecurity Bulletin Archive: A list of recently released Security Bulletins is\navailable here:\nhttp://h20566.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/\n\nSoftware Product Category: The Software Product Category is represented in\nthe title by the two characters following HPSB. \n\n3C = 3COM\n3P = 3rd Party Software\nGN = HP General Software\nHF = HP Hardware and Firmware\nMP = MPE/iX\nMU = Multi-Platform Software\nNS = NonStop Servers\nOV = OpenVMS\nPI = Printing and Imaging\nPV = ProCurve\nST = Storage Software\nTU = Tru64 UNIX\nUX = HP-UX\n\nCopyright 2012 Hewlett-Packard Development Company, L.P. \nHewlett-Packard Company shall not be liable for technical or editorial errors\nor omissions contained herein. The information provided is provided \"as is\"\nwithout warranty of any kind. To the extent permitted by law, neither HP or\nits affiliates, subcontractors or suppliers will be liable for\nincidental,special or consequential damages including downtime cost; lost\nprofits;damages relating to the procurement of substitute products or\nservices; or damages for loss of data, or software restoration. The\ninformation in this document is subject to change without notice. \nHewlett-Packard Company and the names of Hewlett-Packard products referenced\nherein are trademarks of Hewlett-Packard Company in the United States and\nother countries. Other product and company names mentioned herein may be\ntrademarks of their respective owners. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n Red Hat Security Advisory\n\nSynopsis: Critical: php security update\nAdvisory ID: RHSA-2012:0546-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://rhn.redhat.com/errata/RHSA-2012-0546.html\nIssue date: 2012-05-07\nCVE Names: CVE-2012-1823 \n=====================================================================\n\n1. Summary:\n\nUpdated php packages that fix one security issue are now available for\nRed Hat Enterprise Linux 5 and 6. \n\nThe Red Hat Security Response Team has rated this update as having critical\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section. \n\n2. Relevant releases/architectures:\n\nRHEL Desktop Workstation (v. 5 client) - i386, x86_64\nRed Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64\nRed Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64\nRed Hat Enterprise Linux HPC Node (v. 6) - x86_64\nRed Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64\nRed Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Workstation (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64\n\n3. Description:\n\nPHP is an HTML-embedded scripting language commonly used with the Apache\nHTTP Server. \n\nA flaw was found in the way the php-cgi executable processed command line\narguments when running in CGI mode. This\ncould lead to the disclosure of the script\u0027s source code or arbitrary code\nexecution with the privileges of the PHP interpreter. (CVE-2012-1823)\n\nRed Hat is aware that a public exploit for this issue is available that\nallows remote code execution in affected PHP CGI configurations. This flaw\ndoes not affect the default configuration in Red Hat Enterprise Linux 5 and\n6 using the PHP module for Apache httpd to handle PHP scripts. \n\nAll php users should upgrade to these updated packages, which contain a\nbackported patch to resolve this issue. After installing the updated\npackages, the httpd daemon must be restarted for the update to take effect. \n\n4. Solution:\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied. \n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258\n\n5. Bugs fixed (http://bugzilla.redhat.com/):\n\n818607 - CVE-2012-1823 php: command line arguments injection when run in CGI mode (VU#520827)\n\n6. Package List:\n\nRHEL Desktop Workstation (v. 5 client):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/php-5.1.6-34.el5_8.src.rpm\n\ni386:\nphp-5.1.6-34.el5_8.i386.rpm\nphp-bcmath-5.1.6-34.el5_8.i386.rpm\nphp-cli-5.1.6-34.el5_8.i386.rpm\nphp-common-5.1.6-34.el5_8.i386.rpm\nphp-dba-5.1.6-34.el5_8.i386.rpm\nphp-debuginfo-5.1.6-34.el5_8.i386.rpm\nphp-devel-5.1.6-34.el5_8.i386.rpm\nphp-gd-5.1.6-34.el5_8.i386.rpm\nphp-imap-5.1.6-34.el5_8.i386.rpm\nphp-ldap-5.1.6-34.el5_8.i386.rpm\nphp-mbstring-5.1.6-34.el5_8.i386.rpm\nphp-mysql-5.1.6-34.el5_8.i386.rpm\nphp-ncurses-5.1.6-34.el5_8.i386.rpm\nphp-odbc-5.1.6-34.el5_8.i386.rpm\nphp-pdo-5.1.6-34.el5_8.i386.rpm\nphp-pgsql-5.1.6-34.el5_8.i386.rpm\nphp-snmp-5.1.6-34.el5_8.i386.rpm\nphp-soap-5.1.6-34.el5_8.i386.rpm\nphp-xml-5.1.6-34.el5_8.i386.rpm\nphp-xmlrpc-5.1.6-34.el5_8.i386.rpm\n\nx86_64:\nphp-5.1.6-34.el5_8.x86_64.rpm\nphp-bcmath-5.1.6-34.el5_8.x86_64.rpm\nphp-cli-5.1.6-34.el5_8.x86_64.rpm\nphp-common-5.1.6-34.el5_8.x86_64.rpm\nphp-dba-5.1.6-34.el5_8.x86_64.rpm\nphp-debuginfo-5.1.6-34.el5_8.x86_64.rpm\nphp-devel-5.1.6-34.el5_8.x86_64.rpm\nphp-gd-5.1.6-34.el5_8.x86_64.rpm\nphp-imap-5.1.6-34.el5_8.x86_64.rpm\nphp-ldap-5.1.6-34.el5_8.x86_64.rpm\nphp-mbstring-5.1.6-34.el5_8.x86_64.rpm\nphp-mysql-5.1.6-34.el5_8.x86_64.rpm\nphp-ncurses-5.1.6-34.el5_8.x86_64.rpm\nphp-odbc-5.1.6-34.el5_8.x86_64.rpm\nphp-pdo-5.1.6-34.el5_8.x86_64.rpm\nphp-pgsql-5.1.6-34.el5_8.x86_64.rpm\nphp-snmp-5.1.6-34.el5_8.x86_64.rpm\nphp-soap-5.1.6-34.el5_8.x86_64.rpm\nphp-xml-5.1.6-34.el5_8.x86_64.rpm\nphp-xmlrpc-5.1.6-34.el5_8.x86_64.rpm\n\nRed Hat Enterprise Linux (v. 5 server):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/php-5.1.6-34.el5_8.src.rpm\n\ni386:\nphp-5.1.6-34.el5_8.i386.rpm\nphp-bcmath-5.1.6-34.el5_8.i386.rpm\nphp-cli-5.1.6-34.el5_8.i386.rpm\nphp-common-5.1.6-34.el5_8.i386.rpm\nphp-dba-5.1.6-34.el5_8.i386.rpm\nphp-debuginfo-5.1.6-34.el5_8.i386.rpm\nphp-devel-5.1.6-34.el5_8.i386.rpm\nphp-gd-5.1.6-34.el5_8.i386.rpm\nphp-imap-5.1.6-34.el5_8.i386.rpm\nphp-ldap-5.1.6-34.el5_8.i386.rpm\nphp-mbstring-5.1.6-34.el5_8.i386.rpm\nphp-mysql-5.1.6-34.el5_8.i386.rpm\nphp-ncurses-5.1.6-34.el5_8.i386.rpm\nphp-odbc-5.1.6-34.el5_8.i386.rpm\nphp-pdo-5.1.6-34.el5_8.i386.rpm\nphp-pgsql-5.1.6-34.el5_8.i386.rpm\nphp-snmp-5.1.6-34.el5_8.i386.rpm\nphp-soap-5.1.6-34.el5_8.i386.rpm\nphp-xml-5.1.6-34.el5_8.i386.rpm\nphp-xmlrpc-5.1.6-34.el5_8.i386.rpm\n\nia64:\nphp-5.1.6-34.el5_8.ia64.rpm\nphp-bcmath-5.1.6-34.el5_8.ia64.rpm\nphp-cli-5.1.6-34.el5_8.ia64.rpm\nphp-common-5.1.6-34.el5_8.ia64.rpm\nphp-dba-5.1.6-34.el5_8.ia64.rpm\nphp-debuginfo-5.1.6-34.el5_8.ia64.rpm\nphp-devel-5.1.6-34.el5_8.ia64.rpm\nphp-gd-5.1.6-34.el5_8.ia64.rpm\nphp-imap-5.1.6-34.el5_8.ia64.rpm\nphp-ldap-5.1.6-34.el5_8.ia64.rpm\nphp-mbstring-5.1.6-34.el5_8.ia64.rpm\nphp-mysql-5.1.6-34.el5_8.ia64.rpm\nphp-ncurses-5.1.6-34.el5_8.ia64.rpm\nphp-odbc-5.1.6-34.el5_8.ia64.rpm\nphp-pdo-5.1.6-34.el5_8.ia64.rpm\nphp-pgsql-5.1.6-34.el5_8.ia64.rpm\nphp-snmp-5.1.6-34.el5_8.ia64.rpm\nphp-soap-5.1.6-34.el5_8.ia64.rpm\nphp-xml-5.1.6-34.el5_8.ia64.rpm\nphp-xmlrpc-5.1.6-34.el5_8.ia64.rpm\n\nppc:\nphp-5.1.6-34.el5_8.ppc.rpm\nphp-bcmath-5.1.6-34.el5_8.ppc.rpm\nphp-cli-5.1.6-34.el5_8.ppc.rpm\nphp-common-5.1.6-34.el5_8.ppc.rpm\nphp-dba-5.1.6-34.el5_8.ppc.rpm\nphp-debuginfo-5.1.6-34.el5_8.ppc.rpm\nphp-devel-5.1.6-34.el5_8.ppc.rpm\nphp-gd-5.1.6-34.el5_8.ppc.rpm\nphp-imap-5.1.6-34.el5_8.ppc.rpm\nphp-ldap-5.1.6-34.el5_8.ppc.rpm\nphp-mbstring-5.1.6-34.el5_8.ppc.rpm\nphp-mysql-5.1.6-34.el5_8.ppc.rpm\nphp-ncurses-5.1.6-34.el5_8.ppc.rpm\nphp-odbc-5.1.6-34.el5_8.ppc.rpm\nphp-pdo-5.1.6-34.el5_8.ppc.rpm\nphp-pgsql-5.1.6-34.el5_8.ppc.rpm\nphp-snmp-5.1.6-34.el5_8.ppc.rpm\nphp-soap-5.1.6-34.el5_8.ppc.rpm\nphp-xml-5.1.6-34.el5_8.ppc.rpm\nphp-xmlrpc-5.1.6-34.el5_8.ppc.rpm\n\ns390x:\nphp-5.1.6-34.el5_8.s390x.rpm\nphp-bcmath-5.1.6-34.el5_8.s390x.rpm\nphp-cli-5.1.6-34.el5_8.s390x.rpm\nphp-common-5.1.6-34.el5_8.s390x.rpm\nphp-dba-5.1.6-34.el5_8.s390x.rpm\nphp-debuginfo-5.1.6-34.el5_8.s390x.rpm\nphp-devel-5.1.6-34.el5_8.s390x.rpm\nphp-gd-5.1.6-34.el5_8.s390x.rpm\nphp-imap-5.1.6-34.el5_8.s390x.rpm\nphp-ldap-5.1.6-34.el5_8.s390x.rpm\nphp-mbstring-5.1.6-34.el5_8.s390x.rpm\nphp-mysql-5.1.6-34.el5_8.s390x.rpm\nphp-ncurses-5.1.6-34.el5_8.s390x.rpm\nphp-odbc-5.1.6-34.el5_8.s390x.rpm\nphp-pdo-5.1.6-34.el5_8.s390x.rpm\nphp-pgsql-5.1.6-34.el5_8.s390x.rpm\nphp-snmp-5.1.6-34.el5_8.s390x.rpm\nphp-soap-5.1.6-34.el5_8.s390x.rpm\nphp-xml-5.1.6-34.el5_8.s390x.rpm\nphp-xmlrpc-5.1.6-34.el5_8.s390x.rpm\n\nx86_64:\nphp-5.1.6-34.el5_8.x86_64.rpm\nphp-bcmath-5.1.6-34.el5_8.x86_64.rpm\nphp-cli-5.1.6-34.el5_8.x86_64.rpm\nphp-common-5.1.6-34.el5_8.x86_64.rpm\nphp-dba-5.1.6-34.el5_8.x86_64.rpm\nphp-debuginfo-5.1.6-34.el5_8.x86_64.rpm\nphp-devel-5.1.6-34.el5_8.x86_64.rpm\nphp-gd-5.1.6-34.el5_8.x86_64.rpm\nphp-imap-5.1.6-34.el5_8.x86_64.rpm\nphp-ldap-5.1.6-34.el5_8.x86_64.rpm\nphp-mbstring-5.1.6-34.el5_8.x86_64.rpm\nphp-mysql-5.1.6-34.el5_8.x86_64.rpm\nphp-ncurses-5.1.6-34.el5_8.x86_64.rpm\nphp-odbc-5.1.6-34.el5_8.x86_64.rpm\nphp-pdo-5.1.6-34.el5_8.x86_64.rpm\nphp-pgsql-5.1.6-34.el5_8.x86_64.rpm\nphp-snmp-5.1.6-34.el5_8.x86_64.rpm\nphp-soap-5.1.6-34.el5_8.x86_64.rpm\nphp-xml-5.1.6-34.el5_8.x86_64.rpm\nphp-xmlrpc-5.1.6-34.el5_8.x86_64.rpm\n\nRed Hat Enterprise Linux Desktop Optional (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/php-5.3.3-3.el6_2.8.src.rpm\n\ni386:\nphp-5.3.3-3.el6_2.8.i686.rpm\nphp-bcmath-5.3.3-3.el6_2.8.i686.rpm\nphp-cli-5.3.3-3.el6_2.8.i686.rpm\nphp-common-5.3.3-3.el6_2.8.i686.rpm\nphp-dba-5.3.3-3.el6_2.8.i686.rpm\nphp-debuginfo-5.3.3-3.el6_2.8.i686.rpm\nphp-devel-5.3.3-3.el6_2.8.i686.rpm\nphp-embedded-5.3.3-3.el6_2.8.i686.rpm\nphp-enchant-5.3.3-3.el6_2.8.i686.rpm\nphp-gd-5.3.3-3.el6_2.8.i686.rpm\nphp-imap-5.3.3-3.el6_2.8.i686.rpm\nphp-intl-5.3.3-3.el6_2.8.i686.rpm\nphp-ldap-5.3.3-3.el6_2.8.i686.rpm\nphp-mbstring-5.3.3-3.el6_2.8.i686.rpm\nphp-mysql-5.3.3-3.el6_2.8.i686.rpm\nphp-odbc-5.3.3-3.el6_2.8.i686.rpm\nphp-pdo-5.3.3-3.el6_2.8.i686.rpm\nphp-pgsql-5.3.3-3.el6_2.8.i686.rpm\nphp-process-5.3.3-3.el6_2.8.i686.rpm\nphp-pspell-5.3.3-3.el6_2.8.i686.rpm\nphp-recode-5.3.3-3.el6_2.8.i686.rpm\nphp-snmp-5.3.3-3.el6_2.8.i686.rpm\nphp-soap-5.3.3-3.el6_2.8.i686.rpm\nphp-tidy-5.3.3-3.el6_2.8.i686.rpm\nphp-xml-5.3.3-3.el6_2.8.i686.rpm\nphp-xmlrpc-5.3.3-3.el6_2.8.i686.rpm\nphp-zts-5.3.3-3.el6_2.8.i686.rpm\n\nx86_64:\nphp-5.3.3-3.el6_2.8.x86_64.rpm\nphp-bcmath-5.3.3-3.el6_2.8.x86_64.rpm\nphp-cli-5.3.3-3.el6_2.8.x86_64.rpm\nphp-common-5.3.3-3.el6_2.8.x86_64.rpm\nphp-dba-5.3.3-3.el6_2.8.x86_64.rpm\nphp-debuginfo-5.3.3-3.el6_2.8.x86_64.rpm\nphp-devel-5.3.3-3.el6_2.8.x86_64.rpm\nphp-embedded-5.3.3-3.el6_2.8.x86_64.rpm\nphp-enchant-5.3.3-3.el6_2.8.x86_64.rpm\nphp-gd-5.3.3-3.el6_2.8.x86_64.rpm\nphp-imap-5.3.3-3.el6_2.8.x86_64.rpm\nphp-intl-5.3.3-3.el6_2.8.x86_64.rpm\nphp-ldap-5.3.3-3.el6_2.8.x86_64.rpm\nphp-mbstring-5.3.3-3.el6_2.8.x86_64.rpm\nphp-mysql-5.3.3-3.el6_2.8.x86_64.rpm\nphp-odbc-5.3.3-3.el6_2.8.x86_64.rpm\nphp-pdo-5.3.3-3.el6_2.8.x86_64.rpm\nphp-pgsql-5.3.3-3.el6_2.8.x86_64.rpm\nphp-process-5.3.3-3.el6_2.8.x86_64.rpm\nphp-pspell-5.3.3-3.el6_2.8.x86_64.rpm\nphp-recode-5.3.3-3.el6_2.8.x86_64.rpm\nphp-snmp-5.3.3-3.el6_2.8.x86_64.rpm\nphp-soap-5.3.3-3.el6_2.8.x86_64.rpm\nphp-tidy-5.3.3-3.el6_2.8.x86_64.rpm\nphp-xml-5.3.3-3.el6_2.8.x86_64.rpm\nphp-xmlrpc-5.3.3-3.el6_2.8.x86_64.rpm\nphp-zts-5.3.3-3.el6_2.8.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/php-5.3.3-3.el6_2.8.src.rpm\n\nx86_64:\nphp-cli-5.3.3-3.el6_2.8.x86_64.rpm\nphp-common-5.3.3-3.el6_2.8.x86_64.rpm\nphp-debuginfo-5.3.3-3.el6_2.8.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node Optional (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/php-5.3.3-3.el6_2.8.src.rpm\n\nx86_64:\nphp-5.3.3-3.el6_2.8.x86_64.rpm\nphp-bcmath-5.3.3-3.el6_2.8.x86_64.rpm\nphp-dba-5.3.3-3.el6_2.8.x86_64.rpm\nphp-debuginfo-5.3.3-3.el6_2.8.x86_64.rpm\nphp-devel-5.3.3-3.el6_2.8.x86_64.rpm\nphp-embedded-5.3.3-3.el6_2.8.x86_64.rpm\nphp-enchant-5.3.3-3.el6_2.8.x86_64.rpm\nphp-gd-5.3.3-3.el6_2.8.x86_64.rpm\nphp-imap-5.3.3-3.el6_2.8.x86_64.rpm\nphp-intl-5.3.3-3.el6_2.8.x86_64.rpm\nphp-ldap-5.3.3-3.el6_2.8.x86_64.rpm\nphp-mbstring-5.3.3-3.el6_2.8.x86_64.rpm\nphp-mysql-5.3.3-3.el6_2.8.x86_64.rpm\nphp-odbc-5.3.3-3.el6_2.8.x86_64.rpm\nphp-pdo-5.3.3-3.el6_2.8.x86_64.rpm\nphp-pgsql-5.3.3-3.el6_2.8.x86_64.rpm\nphp-process-5.3.3-3.el6_2.8.x86_64.rpm\nphp-pspell-5.3.3-3.el6_2.8.x86_64.rpm\nphp-recode-5.3.3-3.el6_2.8.x86_64.rpm\nphp-snmp-5.3.3-3.el6_2.8.x86_64.rpm\nphp-soap-5.3.3-3.el6_2.8.x86_64.rpm\nphp-tidy-5.3.3-3.el6_2.8.x86_64.rpm\nphp-xml-5.3.3-3.el6_2.8.x86_64.rpm\nphp-xmlrpc-5.3.3-3.el6_2.8.x86_64.rpm\nphp-zts-5.3.3-3.el6_2.8.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/php-5.3.3-3.el6_2.8.src.rpm\n\ni386:\nphp-5.3.3-3.el6_2.8.i686.rpm\nphp-cli-5.3.3-3.el6_2.8.i686.rpm\nphp-common-5.3.3-3.el6_2.8.i686.rpm\nphp-debuginfo-5.3.3-3.el6_2.8.i686.rpm\nphp-gd-5.3.3-3.el6_2.8.i686.rpm\nphp-ldap-5.3.3-3.el6_2.8.i686.rpm\nphp-mysql-5.3.3-3.el6_2.8.i686.rpm\nphp-odbc-5.3.3-3.el6_2.8.i686.rpm\nphp-pdo-5.3.3-3.el6_2.8.i686.rpm\nphp-pgsql-5.3.3-3.el6_2.8.i686.rpm\nphp-soap-5.3.3-3.el6_2.8.i686.rpm\nphp-xml-5.3.3-3.el6_2.8.i686.rpm\nphp-xmlrpc-5.3.3-3.el6_2.8.i686.rpm\n\nppc64:\nphp-5.3.3-3.el6_2.8.ppc64.rpm\nphp-cli-5.3.3-3.el6_2.8.ppc64.rpm\nphp-common-5.3.3-3.el6_2.8.ppc64.rpm\nphp-debuginfo-5.3.3-3.el6_2.8.ppc64.rpm\nphp-gd-5.3.3-3.el6_2.8.ppc64.rpm\nphp-ldap-5.3.3-3.el6_2.8.ppc64.rpm\nphp-mysql-5.3.3-3.el6_2.8.ppc64.rpm\nphp-odbc-5.3.3-3.el6_2.8.ppc64.rpm\nphp-pdo-5.3.3-3.el6_2.8.ppc64.rpm\nphp-pgsql-5.3.3-3.el6_2.8.ppc64.rpm\nphp-soap-5.3.3-3.el6_2.8.ppc64.rpm\nphp-xml-5.3.3-3.el6_2.8.ppc64.rpm\nphp-xmlrpc-5.3.3-3.el6_2.8.ppc64.rpm\n\ns390x:\nphp-5.3.3-3.el6_2.8.s390x.rpm\nphp-cli-5.3.3-3.el6_2.8.s390x.rpm\nphp-common-5.3.3-3.el6_2.8.s390x.rpm\nphp-debuginfo-5.3.3-3.el6_2.8.s390x.rpm\nphp-gd-5.3.3-3.el6_2.8.s390x.rpm\nphp-ldap-5.3.3-3.el6_2.8.s390x.rpm\nphp-mysql-5.3.3-3.el6_2.8.s390x.rpm\nphp-odbc-5.3.3-3.el6_2.8.s390x.rpm\nphp-pdo-5.3.3-3.el6_2.8.s390x.rpm\nphp-pgsql-5.3.3-3.el6_2.8.s390x.rpm\nphp-soap-5.3.3-3.el6_2.8.s390x.rpm\nphp-xml-5.3.3-3.el6_2.8.s390x.rpm\nphp-xmlrpc-5.3.3-3.el6_2.8.s390x.rpm\n\nx86_64:\nphp-5.3.3-3.el6_2.8.x86_64.rpm\nphp-cli-5.3.3-3.el6_2.8.x86_64.rpm\nphp-common-5.3.3-3.el6_2.8.x86_64.rpm\nphp-debuginfo-5.3.3-3.el6_2.8.x86_64.rpm\nphp-gd-5.3.3-3.el6_2.8.x86_64.rpm\nphp-ldap-5.3.3-3.el6_2.8.x86_64.rpm\nphp-mysql-5.3.3-3.el6_2.8.x86_64.rpm\nphp-odbc-5.3.3-3.el6_2.8.x86_64.rpm\nphp-pdo-5.3.3-3.el6_2.8.x86_64.rpm\nphp-pgsql-5.3.3-3.el6_2.8.x86_64.rpm\nphp-soap-5.3.3-3.el6_2.8.x86_64.rpm\nphp-xml-5.3.3-3.el6_2.8.x86_64.rpm\nphp-xmlrpc-5.3.3-3.el6_2.8.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/php-5.3.3-3.el6_2.8.src.rpm\n\ni386:\nphp-bcmath-5.3.3-3.el6_2.8.i686.rpm\nphp-dba-5.3.3-3.el6_2.8.i686.rpm\nphp-debuginfo-5.3.3-3.el6_2.8.i686.rpm\nphp-devel-5.3.3-3.el6_2.8.i686.rpm\nphp-embedded-5.3.3-3.el6_2.8.i686.rpm\nphp-enchant-5.3.3-3.el6_2.8.i686.rpm\nphp-imap-5.3.3-3.el6_2.8.i686.rpm\nphp-intl-5.3.3-3.el6_2.8.i686.rpm\nphp-mbstring-5.3.3-3.el6_2.8.i686.rpm\nphp-process-5.3.3-3.el6_2.8.i686.rpm\nphp-pspell-5.3.3-3.el6_2.8.i686.rpm\nphp-recode-5.3.3-3.el6_2.8.i686.rpm\nphp-snmp-5.3.3-3.el6_2.8.i686.rpm\nphp-tidy-5.3.3-3.el6_2.8.i686.rpm\nphp-zts-5.3.3-3.el6_2.8.i686.rpm\n\nppc64:\nphp-bcmath-5.3.3-3.el6_2.8.ppc64.rpm\nphp-dba-5.3.3-3.el6_2.8.ppc64.rpm\nphp-debuginfo-5.3.3-3.el6_2.8.ppc64.rpm\nphp-devel-5.3.3-3.el6_2.8.ppc64.rpm\nphp-embedded-5.3.3-3.el6_2.8.ppc64.rpm\nphp-enchant-5.3.3-3.el6_2.8.ppc64.rpm\nphp-imap-5.3.3-3.el6_2.8.ppc64.rpm\nphp-intl-5.3.3-3.el6_2.8.ppc64.rpm\nphp-mbstring-5.3.3-3.el6_2.8.ppc64.rpm\nphp-process-5.3.3-3.el6_2.8.ppc64.rpm\nphp-pspell-5.3.3-3.el6_2.8.ppc64.rpm\nphp-recode-5.3.3-3.el6_2.8.ppc64.rpm\nphp-snmp-5.3.3-3.el6_2.8.ppc64.rpm\nphp-tidy-5.3.3-3.el6_2.8.ppc64.rpm\nphp-zts-5.3.3-3.el6_2.8.ppc64.rpm\n\ns390x:\nphp-bcmath-5.3.3-3.el6_2.8.s390x.rpm\nphp-dba-5.3.3-3.el6_2.8.s390x.rpm\nphp-debuginfo-5.3.3-3.el6_2.8.s390x.rpm\nphp-devel-5.3.3-3.el6_2.8.s390x.rpm\nphp-embedded-5.3.3-3.el6_2.8.s390x.rpm\nphp-enchant-5.3.3-3.el6_2.8.s390x.rpm\nphp-imap-5.3.3-3.el6_2.8.s390x.rpm\nphp-intl-5.3.3-3.el6_2.8.s390x.rpm\nphp-mbstring-5.3.3-3.el6_2.8.s390x.rpm\nphp-process-5.3.3-3.el6_2.8.s390x.rpm\nphp-pspell-5.3.3-3.el6_2.8.s390x.rpm\nphp-recode-5.3.3-3.el6_2.8.s390x.rpm\nphp-snmp-5.3.3-3.el6_2.8.s390x.rpm\nphp-tidy-5.3.3-3.el6_2.8.s390x.rpm\nphp-zts-5.3.3-3.el6_2.8.s390x.rpm\n\nx86_64:\nphp-bcmath-5.3.3-3.el6_2.8.x86_64.rpm\nphp-dba-5.3.3-3.el6_2.8.x86_64.rpm\nphp-debuginfo-5.3.3-3.el6_2.8.x86_64.rpm\nphp-devel-5.3.3-3.el6_2.8.x86_64.rpm\nphp-embedded-5.3.3-3.el6_2.8.x86_64.rpm\nphp-enchant-5.3.3-3.el6_2.8.x86_64.rpm\nphp-imap-5.3.3-3.el6_2.8.x86_64.rpm\nphp-intl-5.3.3-3.el6_2.8.x86_64.rpm\nphp-mbstring-5.3.3-3.el6_2.8.x86_64.rpm\nphp-process-5.3.3-3.el6_2.8.x86_64.rpm\nphp-pspell-5.3.3-3.el6_2.8.x86_64.rpm\nphp-recode-5.3.3-3.el6_2.8.x86_64.rpm\nphp-snmp-5.3.3-3.el6_2.8.x86_64.rpm\nphp-tidy-5.3.3-3.el6_2.8.x86_64.rpm\nphp-zts-5.3.3-3.el6_2.8.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/php-5.3.3-3.el6_2.8.src.rpm\n\ni386:\nphp-5.3.3-3.el6_2.8.i686.rpm\nphp-cli-5.3.3-3.el6_2.8.i686.rpm\nphp-common-5.3.3-3.el6_2.8.i686.rpm\nphp-debuginfo-5.3.3-3.el6_2.8.i686.rpm\nphp-gd-5.3.3-3.el6_2.8.i686.rpm\nphp-ldap-5.3.3-3.el6_2.8.i686.rpm\nphp-mysql-5.3.3-3.el6_2.8.i686.rpm\nphp-odbc-5.3.3-3.el6_2.8.i686.rpm\nphp-pdo-5.3.3-3.el6_2.8.i686.rpm\nphp-pgsql-5.3.3-3.el6_2.8.i686.rpm\nphp-soap-5.3.3-3.el6_2.8.i686.rpm\nphp-xml-5.3.3-3.el6_2.8.i686.rpm\nphp-xmlrpc-5.3.3-3.el6_2.8.i686.rpm\n\nx86_64:\nphp-5.3.3-3.el6_2.8.x86_64.rpm\nphp-cli-5.3.3-3.el6_2.8.x86_64.rpm\nphp-common-5.3.3-3.el6_2.8.x86_64.rpm\nphp-debuginfo-5.3.3-3.el6_2.8.x86_64.rpm\nphp-gd-5.3.3-3.el6_2.8.x86_64.rpm\nphp-ldap-5.3.3-3.el6_2.8.x86_64.rpm\nphp-mysql-5.3.3-3.el6_2.8.x86_64.rpm\nphp-odbc-5.3.3-3.el6_2.8.x86_64.rpm\nphp-pdo-5.3.3-3.el6_2.8.x86_64.rpm\nphp-pgsql-5.3.3-3.el6_2.8.x86_64.rpm\nphp-soap-5.3.3-3.el6_2.8.x86_64.rpm\nphp-xml-5.3.3-3.el6_2.8.x86_64.rpm\nphp-xmlrpc-5.3.3-3.el6_2.8.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/php-5.3.3-3.el6_2.8.src.rpm\n\ni386:\nphp-bcmath-5.3.3-3.el6_2.8.i686.rpm\nphp-dba-5.3.3-3.el6_2.8.i686.rpm\nphp-debuginfo-5.3.3-3.el6_2.8.i686.rpm\nphp-devel-5.3.3-3.el6_2.8.i686.rpm\nphp-embedded-5.3.3-3.el6_2.8.i686.rpm\nphp-enchant-5.3.3-3.el6_2.8.i686.rpm\nphp-imap-5.3.3-3.el6_2.8.i686.rpm\nphp-intl-5.3.3-3.el6_2.8.i686.rpm\nphp-mbstring-5.3.3-3.el6_2.8.i686.rpm\nphp-process-5.3.3-3.el6_2.8.i686.rpm\nphp-pspell-5.3.3-3.el6_2.8.i686.rpm\nphp-recode-5.3.3-3.el6_2.8.i686.rpm\nphp-snmp-5.3.3-3.el6_2.8.i686.rpm\nphp-tidy-5.3.3-3.el6_2.8.i686.rpm\nphp-zts-5.3.3-3.el6_2.8.i686.rpm\n\nx86_64:\nphp-bcmath-5.3.3-3.el6_2.8.x86_64.rpm\nphp-dba-5.3.3-3.el6_2.8.x86_64.rpm\nphp-debuginfo-5.3.3-3.el6_2.8.x86_64.rpm\nphp-devel-5.3.3-3.el6_2.8.x86_64.rpm\nphp-embedded-5.3.3-3.el6_2.8.x86_64.rpm\nphp-enchant-5.3.3-3.el6_2.8.x86_64.rpm\nphp-imap-5.3.3-3.el6_2.8.x86_64.rpm\nphp-intl-5.3.3-3.el6_2.8.x86_64.rpm\nphp-mbstring-5.3.3-3.el6_2.8.x86_64.rpm\nphp-process-5.3.3-3.el6_2.8.x86_64.rpm\nphp-pspell-5.3.3-3.el6_2.8.x86_64.rpm\nphp-recode-5.3.3-3.el6_2.8.x86_64.rpm\nphp-snmp-5.3.3-3.el6_2.8.x86_64.rpm\nphp-tidy-5.3.3-3.el6_2.8.x86_64.rpm\nphp-zts-5.3.3-3.el6_2.8.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/#package\n\n7. References:\n\nhttps://www.redhat.com/security/data/cve/CVE-2012-1823.html\nhttps://access.redhat.com/security/updates/classification/#critical\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2012 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.4 (GNU/Linux)\n\niD8DBQFPqBidXlSAg2UNWIIRAtuSAJwIgGRkPkW5/AUENoUr0jScjBiojQCeLkVK\nWUs1dQ+935LKCja022LRegM=\n=dMtA\n-----END PGP SIGNATURE-----\n\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. \n _______________________________________________________________________\n\n Problem Description:\n\n A vulnerability has been found and corrected in php(-cgi):\n \n PHP-CGI-based setups contain a vulnerability when parsing query string\n parameters from php files. \n\n Update:\n\n It was discovered that the previous fix for the CVE-2012-1823\n vulnerability was incomplete (CVE-2012-2335, CVE-2012-2336). The\n updated packages provides the latest version (5.3.13) which provides\n a solution to this flaw. \n _______________________________________________________________________\n\n References:\n\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1823\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2335\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2336\n https://bugs.php.net/bug.php?id=61910\n http://eindbazen.net/2012/05/php-cgi-advisory-cve-2012-1823/\n http://www.openwall.com/lists/oss-security/2012/05/09/9\n _______________________________________________________________________\n\n Updated Packages:\n\n Mandriva Linux 2010.1:\n 140d36ed5578274826846a0ff7ca05a9 2010.1/i586/apache-mod_php-5.3.13-0.1mdv2010.2.i586.rpm\n 24775050f82b736c2133fc30f93e809e 2010.1/i586/libphp5_common5-5.3.13-0.1mdv2010.2.i586.rpm\n f3fb19456fe4b8fd41f4306c007e85fb 2010.1/i586/php-bcmath-5.3.13-0.1mdv2010.2.i586.rpm\n 99a812ad5970bc37414909de5ef578fa 2010.1/i586/php-bz2-5.3.13-0.1mdv2010.2.i586.rpm\n 634f717747ee4db7cdd19a93ffd2d5ef 2010.1/i586/php-calendar-5.3.13-0.1mdv2010.2.i586.rpm\n 3429fa2b956f67b8602489e4b7d3757a 2010.1/i586/php-cgi-5.3.13-0.1mdv2010.2.i586.rpm\n 51a1d975e31b445ef71901cd04d8fd3a 2010.1/i586/php-cli-5.3.13-0.1mdv2010.2.i586.rpm\n ba763fffd3798434cb0cde5c8f7a8891 2010.1/i586/php-ctype-5.3.13-0.1mdv2010.2.i586.rpm\n ebf996e845619b26515e6f3e828c8fbf 2010.1/i586/php-curl-5.3.13-0.1mdv2010.2.i586.rpm\n ec57b30c43f5678b8cd822fd85df5e34 2010.1/i586/php-dba-5.3.13-0.1mdv2010.2.i586.rpm\n 85799e72a9511c0f54ff2435fba0aaab 2010.1/i586/php-devel-5.3.13-0.1mdv2010.2.i586.rpm\n 823c9544385c894e4c5edd1b52bf4e92 2010.1/i586/php-doc-5.3.13-0.1mdv2010.2.i586.rpm\n 5d753655d5615e92db188468903b8d16 2010.1/i586/php-dom-5.3.13-0.1mdv2010.2.i586.rpm\n 705fbff48501d08bae719a2d7841d8c2 2010.1/i586/php-enchant-5.3.13-0.1mdv2010.2.i586.rpm\n 4f78075bddc8fa173a7384e545e3cd5c 2010.1/i586/php-exif-5.3.13-0.1mdv2010.2.i586.rpm\n e8fefd604fd5006361419135c9059076 2010.1/i586/php-fileinfo-5.3.13-0.1mdv2010.2.i586.rpm\n bc65e927149d5277ad634b0bad8a868a 2010.1/i586/php-filter-5.3.13-0.1mdv2010.2.i586.rpm\n ea6a6fd721db888225dfea83a0ad99d9 2010.1/i586/php-fpm-5.3.13-0.1mdv2010.2.i586.rpm\n 7fb6a2914e72a63ec9401c9662f9bc2b 2010.1/i586/php-ftp-5.3.13-0.1mdv2010.2.i586.rpm\n 0df19020817d838aba51f052c29f6532 2010.1/i586/php-gd-5.3.13-0.1mdv2010.2.i586.rpm\n 5ce28c873da3fc5e0feda8e3cad2247a 2010.1/i586/php-gettext-5.3.13-0.1mdv2010.2.i586.rpm\n acbe524bfc8e156906c70124496a3161 2010.1/i586/php-gmp-5.3.13-0.1mdv2010.2.i586.rpm\n d03bc0f91411297408ac3dbbd5c426b3 2010.1/i586/php-hash-5.3.13-0.1mdv2010.2.i586.rpm\n 19bc92bd8b1a4ea4b86b497f5f48933c 2010.1/i586/php-iconv-5.3.13-0.1mdv2010.2.i586.rpm\n a891fe8d9bcbbfc4458fb31a23720338 2010.1/i586/php-imap-5.3.13-0.1mdv2010.2.i586.rpm\n edec73af34ecb6b42ed0a14dadb8949d 2010.1/i586/php-ini-5.3.13-0.1mdv2010.2.i586.rpm\n 529135563f982966be228d0e7055a97d 2010.1/i586/php-intl-5.3.13-0.1mdv2010.2.i586.rpm\n 2de32f3e7d7da5e06a83f9bf8eac6318 2010.1/i586/php-json-5.3.13-0.1mdv2010.2.i586.rpm\n 2b4f232c6bd026de886d8199dba4c2f2 2010.1/i586/php-ldap-5.3.13-0.1mdv2010.2.i586.rpm\n c14fe2ed7cfeb5320fed29676af9e682 2010.1/i586/php-mbstring-5.3.13-0.1mdv2010.2.i586.rpm\n 606e65e002f946dcf9fa8f7f3950f81d 2010.1/i586/php-mcrypt-5.3.13-0.1mdv2010.2.i586.rpm\n 84e35a42b7861251869a439b0031f225 2010.1/i586/php-mssql-5.3.13-0.1mdv2010.2.i586.rpm\n 95caf9f4d272fdeae006851e482a2461 2010.1/i586/php-mysql-5.3.13-0.1mdv2010.2.i586.rpm\n 5bb6f61f906e8572f66cbbcb0a3a667b 2010.1/i586/php-mysqli-5.3.13-0.1mdv2010.2.i586.rpm\n 28e5bdd198862a80dfea2ab9e86b9678 2010.1/i586/php-mysqlnd-5.3.13-0.1mdv2010.2.i586.rpm\n 802e12a27b7256dbba5b9029e7bbb00b 2010.1/i586/php-odbc-5.3.13-0.1mdv2010.2.i586.rpm\n f3f2b22190a0180e4adddd36ac43b808 2010.1/i586/php-openssl-5.3.13-0.1mdv2010.2.i586.rpm\n 850ed2a02899e7ef950368f1e6936e7b 2010.1/i586/php-pcntl-5.3.13-0.1mdv2010.2.i586.rpm\n 128bc6c67ee8960e29c893a0a210f967 2010.1/i586/php-pdo-5.3.13-0.1mdv2010.2.i586.rpm\n 31d3d8d11a8ec860ff748b4491ed637d 2010.1/i586/php-pdo_dblib-5.3.13-0.1mdv2010.2.i586.rpm\n 840fd711e567a690f46a5aa686a47019 2010.1/i586/php-pdo_mysql-5.3.13-0.1mdv2010.2.i586.rpm\n 6b979eef99f357fc4e283c98c5ef96ea 2010.1/i586/php-pdo_odbc-5.3.13-0.1mdv2010.2.i586.rpm\n 9b5d0ca325bbfcf6b87f74748caceb76 2010.1/i586/php-pdo_pgsql-5.3.13-0.1mdv2010.2.i586.rpm\n 70c688be75e34b79a9a35462570a2ada 2010.1/i586/php-pdo_sqlite-5.3.13-0.1mdv2010.2.i586.rpm\n e67f4f8ded56378452b8a548b126266b 2010.1/i586/php-pgsql-5.3.13-0.1mdv2010.2.i586.rpm\n 4d26258bb774b1d9aff74d3fdc1e3c2c 2010.1/i586/php-phar-5.3.13-0.1mdv2010.2.i586.rpm\n 74bc08429969529762425997772f8a5d 2010.1/i586/php-posix-5.3.13-0.1mdv2010.2.i586.rpm\n e697d56093f50bbde693541d67b7566c 2010.1/i586/php-pspell-5.3.13-0.1mdv2010.2.i586.rpm\n 0fc94be46e664a52fbc9111958cd4146 2010.1/i586/php-readline-5.3.13-0.1mdv2010.2.i586.rpm\n af7e1bb5a2722063cc52af223dc90787 2010.1/i586/php-recode-5.3.13-0.1mdv2010.2.i586.rpm\n fee14325fb3a764988c4e2a69c7938b4 2010.1/i586/php-session-5.3.13-0.1mdv2010.2.i586.rpm\n e89aba4b7dec345be125261046d31b92 2010.1/i586/php-shmop-5.3.13-0.1mdv2010.2.i586.rpm\n 69f2a66fef9892c0405d3a03c72096b2 2010.1/i586/php-snmp-5.3.13-0.1mdv2010.2.i586.rpm\n 4db2b4b3d7670603b5922a122dc975aa 2010.1/i586/php-soap-5.3.13-0.1mdv2010.2.i586.rpm\n e02779584cc1c588d75346f6995ad5a6 2010.1/i586/php-sockets-5.3.13-0.1mdv2010.2.i586.rpm\n aae3b1c32441f481c49f7f38c1c96294 2010.1/i586/php-sqlite3-5.3.13-0.1mdv2010.2.i586.rpm\n b4255e1825f289410b71b6a210229b8e 2010.1/i586/php-sqlite-5.3.13-0.1mdv2010.2.i586.rpm\n dd54ede221fd579f1ebd81be6930010b 2010.1/i586/php-sybase_ct-5.3.13-0.1mdv2010.2.i586.rpm\n 4bdebc41d1b654e904d39c8f89be51a2 2010.1/i586/php-sysvmsg-5.3.13-0.1mdv2010.2.i586.rpm\n 3d485895eca51f5f801323baf1f0f8bf 2010.1/i586/php-sysvsem-5.3.13-0.1mdv2010.2.i586.rpm\n a5c65e02a46da5f9a1be3235565926a3 2010.1/i586/php-sysvshm-5.3.13-0.1mdv2010.2.i586.rpm\n 1a1e6a0a91388e7113f2774bb0f16c01 2010.1/i586/php-tidy-5.3.13-0.1mdv2010.2.i586.rpm\n cf565e35c341273ed2b4378c9f0980c8 2010.1/i586/php-tokenizer-5.3.13-0.1mdv2010.2.i586.rpm\n b1fd12591b6500464a97eb2ae47b2f60 2010.1/i586/php-wddx-5.3.13-0.1mdv2010.2.i586.rpm\n f0f801ce893ad8eb55bb21d010af641a 2010.1/i586/php-xml-5.3.13-0.1mdv2010.2.i586.rpm\n 055873d10551544750bd05555cc63155 2010.1/i586/php-xmlreader-5.3.13-0.1mdv2010.2.i586.rpm\n 69a6e3930ed1b2d1ddac5df5719bc6d6 2010.1/i586/php-xmlrpc-5.3.13-0.1mdv2010.2.i586.rpm\n de7f360c56f74b036ea924d9f7c76b59 2010.1/i586/php-xmlwriter-5.3.13-0.1mdv2010.2.i586.rpm\n 4cbd130cf269dd2769dd084322eaf77a 2010.1/i586/php-xsl-5.3.13-0.1mdv2010.2.i586.rpm\n 1d32b52e968a2bd7c4ff6b640f38ae36 2010.1/i586/php-zip-5.3.13-0.1mdv2010.2.i586.rpm\n 9508241b048c6acc033c16494f797289 2010.1/i586/php-zlib-5.3.13-0.1mdv2010.2.i586.rpm \n cd0e0682df60061148366ab6b10394d2 2010.1/SRPMS/apache-mod_php-5.3.13-0.1mdv2010.2.src.rpm\n f454d177e9bd631df2a4eeca3d33fe38 2010.1/SRPMS/php-5.3.13-0.1mdv2010.2.src.rpm\n 281be8fe2bb8cd404ade445f64c616da 2010.1/SRPMS/php-ini-5.3.13-0.1mdv2010.2.src.rpm\n\n Mandriva Linux 2010.1/X86_64:\n 5c32f90215090901240e661f8e2224a9 2010.1/x86_64/apache-mod_php-5.3.13-0.1mdv2010.2.x86_64.rpm\n c21032781b826fe3a8202eff5b7ef8b5 2010.1/x86_64/lib64php5_common5-5.3.13-0.1mdv2010.2.x86_64.rpm\n a2d0b2b43aa856d5872679d455e56a1e 2010.1/x86_64/php-bcmath-5.3.13-0.1mdv2010.2.x86_64.rpm\n 5421084c1b946cb2c5eeebfed07ac829 2010.1/x86_64/php-bz2-5.3.13-0.1mdv2010.2.x86_64.rpm\n 48aa03dcba36a09689dc6c7f2497741c 2010.1/x86_64/php-calendar-5.3.13-0.1mdv2010.2.x86_64.rpm\n c503b930c9d60cbd4d4ea58d8a6deda7 2010.1/x86_64/php-cgi-5.3.13-0.1mdv2010.2.x86_64.rpm\n 228b72cbf197c817d866d1fe3c7ed6b2 2010.1/x86_64/php-cli-5.3.13-0.1mdv2010.2.x86_64.rpm\n c9435be90a6e5fae1a980109c9bc9aca 2010.1/x86_64/php-ctype-5.3.13-0.1mdv2010.2.x86_64.rpm\n 0eb2e95722b4af3006f560c8441d687f 2010.1/x86_64/php-curl-5.3.13-0.1mdv2010.2.x86_64.rpm\n ccebc661c63d1028540c1212de90bbae 2010.1/x86_64/php-dba-5.3.13-0.1mdv2010.2.x86_64.rpm\n 2edc5f5c47a0ee2bbf001fae9024849f 2010.1/x86_64/php-devel-5.3.13-0.1mdv2010.2.x86_64.rpm\n 3b3eeb211bf45ede0abaae347d8bc745 2010.1/x86_64/php-doc-5.3.13-0.1mdv2010.2.x86_64.rpm\n 29f9a4fcee784caeaa54d88ae6f1fda9 2010.1/x86_64/php-dom-5.3.13-0.1mdv2010.2.x86_64.rpm\n eda0d150731e178912024b0ff6665835 2010.1/x86_64/php-enchant-5.3.13-0.1mdv2010.2.x86_64.rpm\n cf52bd1d68b75ba6841fe6258b9a1f69 2010.1/x86_64/php-exif-5.3.13-0.1mdv2010.2.x86_64.rpm\n 0243226aa4bf036a4054b48966f80cf3 2010.1/x86_64/php-fileinfo-5.3.13-0.1mdv2010.2.x86_64.rpm\n a5bca21277b5c72133340ea059cf0df0 2010.1/x86_64/php-filter-5.3.13-0.1mdv2010.2.x86_64.rpm\n 3c7007006b1d93d8c96e86dcf27ea38b 2010.1/x86_64/php-fpm-5.3.13-0.1mdv2010.2.x86_64.rpm\n f9549d4ed2973e5c1519546e971fd81a 2010.1/x86_64/php-ftp-5.3.13-0.1mdv2010.2.x86_64.rpm\n c7231a7117abab68e8c4d1a3f6a80ccb 2010.1/x86_64/php-gd-5.3.13-0.1mdv2010.2.x86_64.rpm\n 0ca2c9679c082508a4c2b007ec5a8c46 2010.1/x86_64/php-gettext-5.3.13-0.1mdv2010.2.x86_64.rpm\n 7d0de98a757251e874aff11ab76db12b 2010.1/x86_64/php-gmp-5.3.13-0.1mdv2010.2.x86_64.rpm\n 8757a89019988ab9b689c282ae06cf01 2010.1/x86_64/php-hash-5.3.13-0.1mdv2010.2.x86_64.rpm\n 996f5bcb88fc855db3cc4c779897a9ad 2010.1/x86_64/php-iconv-5.3.13-0.1mdv2010.2.x86_64.rpm\n 1580fd0ebb4ff0bd0e3c2a6e8925fc8a 2010.1/x86_64/php-imap-5.3.13-0.1mdv2010.2.x86_64.rpm\n 89a3915683d63a757fa29e53fadf0e1d 2010.1/x86_64/php-ini-5.3.13-0.1mdv2010.2.x86_64.rpm\n 38115fadfb51fdfd10ea14def4d9143d 2010.1/x86_64/php-intl-5.3.13-0.1mdv2010.2.x86_64.rpm\n 06aaaa6c43d85283ba31e079f9e1e0e0 2010.1/x86_64/php-json-5.3.13-0.1mdv2010.2.x86_64.rpm\n b9f6e00a0ac3916b91442ed6c62ad440 2010.1/x86_64/php-ldap-5.3.13-0.1mdv2010.2.x86_64.rpm\n 9b634f67d80ba028247dafe559276859 2010.1/x86_64/php-mbstring-5.3.13-0.1mdv2010.2.x86_64.rpm\n bd39ac4808035578dec2e24a98457b03 2010.1/x86_64/php-mcrypt-5.3.13-0.1mdv2010.2.x86_64.rpm\n 4acc008044469403769de09af155f0d5 2010.1/x86_64/php-mssql-5.3.13-0.1mdv2010.2.x86_64.rpm\n 8d5826fa6ba3dcaf214839a654e74659 2010.1/x86_64/php-mysql-5.3.13-0.1mdv2010.2.x86_64.rpm\n ea0e352e2900b493b9d355257ec99a4e 2010.1/x86_64/php-mysqli-5.3.13-0.1mdv2010.2.x86_64.rpm\n 40b23996dd377b3699ca230f30451e09 2010.1/x86_64/php-mysqlnd-5.3.13-0.1mdv2010.2.x86_64.rpm\n 4a49bad04937598951093dbf1e57eb19 2010.1/x86_64/php-odbc-5.3.13-0.1mdv2010.2.x86_64.rpm\n ef337452c999c609f38511b30424aa95 2010.1/x86_64/php-openssl-5.3.13-0.1mdv2010.2.x86_64.rpm\n 8adda9b3ac67749c4cbbca498fe97042 2010.1/x86_64/php-pcntl-5.3.13-0.1mdv2010.2.x86_64.rpm\n aab08edd87702937cc87e3eea9683e04 2010.1/x86_64/php-pdo-5.3.13-0.1mdv2010.2.x86_64.rpm\n b769d4729112be42057acbecc42784fd 2010.1/x86_64/php-pdo_dblib-5.3.13-0.1mdv2010.2.x86_64.rpm\n 51f45520e81ae006da36c27e9ff23d29 2010.1/x86_64/php-pdo_mysql-5.3.13-0.1mdv2010.2.x86_64.rpm\n 337fef4ac991f694fbc52f1b51292f0e 2010.1/x86_64/php-pdo_odbc-5.3.13-0.1mdv2010.2.x86_64.rpm\n ee046601f134c275c1c5394156868176 2010.1/x86_64/php-pdo_pgsql-5.3.13-0.1mdv2010.2.x86_64.rpm\n f1b25be0d7a2e6948dd6d95776da6f27 2010.1/x86_64/php-pdo_sqlite-5.3.13-0.1mdv2010.2.x86_64.rpm\n c61a1bc81075ebfc94e820984597774b 2010.1/x86_64/php-pgsql-5.3.13-0.1mdv2010.2.x86_64.rpm\n 11bed7992443f01305ad4ce8304e9f07 2010.1/x86_64/php-phar-5.3.13-0.1mdv2010.2.x86_64.rpm\n dd6008750a431325112944e3a5783d0c 2010.1/x86_64/php-posix-5.3.13-0.1mdv2010.2.x86_64.rpm\n f5531db71580b0c17c5796cfd79f4020 2010.1/x86_64/php-pspell-5.3.13-0.1mdv2010.2.x86_64.rpm\n 80c9841836ea5246babb676ce79adb9d 2010.1/x86_64/php-readline-5.3.13-0.1mdv2010.2.x86_64.rpm\n 6271ebd8132c7d94513646d0bbfedf15 2010.1/x86_64/php-recode-5.3.13-0.1mdv2010.2.x86_64.rpm\n 77e395b19c6068c941cc1ee1c89e15c6 2010.1/x86_64/php-session-5.3.13-0.1mdv2010.2.x86_64.rpm\n b310511e16b059f753cef3fbe39a35b0 2010.1/x86_64/php-shmop-5.3.13-0.1mdv2010.2.x86_64.rpm\n 70b99d0120ea8c6018a327996314ab49 2010.1/x86_64/php-snmp-5.3.13-0.1mdv2010.2.x86_64.rpm\n 33f829a30afaeab74203389d8a48a2d9 2010.1/x86_64/php-soap-5.3.13-0.1mdv2010.2.x86_64.rpm\n 64295e56e1c81c3322aa49bd1bf2d838 2010.1/x86_64/php-sockets-5.3.13-0.1mdv2010.2.x86_64.rpm\n 9afd6ba7da1e9ffa58a33c822eeb6a9d 2010.1/x86_64/php-sqlite3-5.3.13-0.1mdv2010.2.x86_64.rpm\n 8f8e7ee68199f5fdb8867b10d8cede5a 2010.1/x86_64/php-sqlite-5.3.13-0.1mdv2010.2.x86_64.rpm\n 84d824d25bcd058301b8a8cac4eece97 2010.1/x86_64/php-sybase_ct-5.3.13-0.1mdv2010.2.x86_64.rpm\n cdd27855aa2b685fba70fea949d0f8f5 2010.1/x86_64/php-sysvmsg-5.3.13-0.1mdv2010.2.x86_64.rpm\n 47714ed1a09513b0fa4016fed1faf374 2010.1/x86_64/php-sysvsem-5.3.13-0.1mdv2010.2.x86_64.rpm\n 878cc21a21bcb9120f0c60d0dc3c848d 2010.1/x86_64/php-sysvshm-5.3.13-0.1mdv2010.2.x86_64.rpm\n ed7017d81df4e68da01f9d790c5e9e75 2010.1/x86_64/php-tidy-5.3.13-0.1mdv2010.2.x86_64.rpm\n e2dbcbefd496f408e56c5072938f62d6 2010.1/x86_64/php-tokenizer-5.3.13-0.1mdv2010.2.x86_64.rpm\n c629479463912ae1d91c4399e5b05f67 2010.1/x86_64/php-wddx-5.3.13-0.1mdv2010.2.x86_64.rpm\n 5a71b4a2a66aa994585f3372f13ad969 2010.1/x86_64/php-xml-5.3.13-0.1mdv2010.2.x86_64.rpm\n 9e99f81386d263bf395a4462ce3333f8 2010.1/x86_64/php-xmlreader-5.3.13-0.1mdv2010.2.x86_64.rpm\n 76c565d3fdcba0133b6c25a914a4fed3 2010.1/x86_64/php-xmlrpc-5.3.13-0.1mdv2010.2.x86_64.rpm\n af3b32c6d60342fb5c7a7c455f647f34 2010.1/x86_64/php-xmlwriter-5.3.13-0.1mdv2010.2.x86_64.rpm\n 31a1efcba8488b85ec31054bea181262 2010.1/x86_64/php-xsl-5.3.13-0.1mdv2010.2.x86_64.rpm\n d3b08c3d48baefa3ee14632b876100fb 2010.1/x86_64/php-zip-5.3.13-0.1mdv2010.2.x86_64.rpm\n a6a3b117484b1bb2e7d449c08fa49b46 2010.1/x86_64/php-zlib-5.3.13-0.1mdv2010.2.x86_64.rpm \n cd0e0682df60061148366ab6b10394d2 2010.1/SRPMS/apache-mod_php-5.3.13-0.1mdv2010.2.src.rpm\n f454d177e9bd631df2a4eeca3d33fe38 2010.1/SRPMS/php-5.3.13-0.1mdv2010.2.src.rpm\n 281be8fe2bb8cd404ade445f64c616da 2010.1/SRPMS/php-ini-5.3.13-0.1mdv2010.2.src.rpm\n\n Mandriva Linux 2011:\n 35cdd956ce62db7548d2626d8a8f7ae8 2011/i586/apache-mod_php-5.3.13-0.1-mdv2011.0.i586.rpm\n dd02a276ddca3ae7ad754e19a41e8ff8 2011/i586/libphp5_common5-5.3.13-0.1-mdv2011.0.i586.rpm\n 7a8feff11aa910f94074c57b54a124d6 2011/i586/php-bcmath-5.3.13-0.1-mdv2011.0.i586.rpm\n 3c70edc391c1c8fb7845f81f3b3f5bac 2011/i586/php-bz2-5.3.13-0.1-mdv2011.0.i586.rpm\n d8020203023aaf02a30b22559d5a67c7 2011/i586/php-calendar-5.3.13-0.1-mdv2011.0.i586.rpm\n e0f010a7d61cf27e13a486ff6e5d6ce4 2011/i586/php-cgi-5.3.13-0.1-mdv2011.0.i586.rpm\n 345ee6e60bc1973f0049ab25f7dc3557 2011/i586/php-cli-5.3.13-0.1-mdv2011.0.i586.rpm\n c4e851c0260ad96797ca56deb2b6f3c7 2011/i586/php-ctype-5.3.13-0.1-mdv2011.0.i586.rpm\n 073d81d6531862861015cf7f53173045 2011/i586/php-curl-5.3.13-0.1-mdv2011.0.i586.rpm\n 1330fd10a3bdd3787913db7795054819 2011/i586/php-dba-5.3.13-0.1-mdv2011.0.i586.rpm\n b6d0fefa9206b7cd3f4c73744c324906 2011/i586/php-devel-5.3.13-0.1-mdv2011.0.i586.rpm\n 32a9567d7a61d6f35654e8d33baec58a 2011/i586/php-doc-5.3.13-0.1-mdv2011.0.i586.rpm\n 149566d373265e732f1ec3140d11cac2 2011/i586/php-dom-5.3.13-0.1-mdv2011.0.i586.rpm\n 6f4b1fe24a35809c93e9489347c448bb 2011/i586/php-enchant-5.3.13-0.1-mdv2011.0.i586.rpm\n 44f27021f7ff8202f5f34a8b0720be5b 2011/i586/php-exif-5.3.13-0.1-mdv2011.0.i586.rpm\n 5d32e3e7dc217fd69b6dc99dffb747f7 2011/i586/php-fileinfo-5.3.13-0.1-mdv2011.0.i586.rpm\n 043c17fad24c3113600799c63c5dde18 2011/i586/php-filter-5.3.13-0.1-mdv2011.0.i586.rpm\n 08c16e8ec2f1c821df8090c38c43809b 2011/i586/php-fpm-5.3.13-0.1-mdv2011.0.i586.rpm\n 209b4baf966b45cb48790e7a020b1aa9 2011/i586/php-ftp-5.3.13-0.1-mdv2011.0.i586.rpm\n eac85767ff89fcf822b2c2cf408b2aca 2011/i586/php-gd-5.3.13-0.1-mdv2011.0.i586.rpm\n 7c7c5ab6370c934b727dac2ad1c9bd33 2011/i586/php-gettext-5.3.13-0.1-mdv2011.0.i586.rpm\n babb1410dd897504ec526243789fd749 2011/i586/php-gmp-5.3.13-0.1-mdv2011.0.i586.rpm\n 63feb83eda18663f3ae28fee522a79c8 2011/i586/php-hash-5.3.13-0.1-mdv2011.0.i586.rpm\n a8aad04e3c20f9223832632f412c4c69 2011/i586/php-iconv-5.3.13-0.1-mdv2011.0.i586.rpm\n 22f5f2b807af8ea7445e8682f6718ab2 2011/i586/php-imap-5.3.13-0.1-mdv2011.0.i586.rpm\n ff780d80135cc18647edecdde6b77e16 2011/i586/php-ini-5.3.13-0.1-mdv2011.0.i586.rpm\n 10475ddafeeb384ae3afb7f5d2d1afa8 2011/i586/php-intl-5.3.13-0.1-mdv2011.0.i586.rpm\n e3261da452695aed46718ec06a1f17ed 2011/i586/php-json-5.3.13-0.1-mdv2011.0.i586.rpm\n f6238f4f4566582418666333eb797994 2011/i586/php-ldap-5.3.13-0.1-mdv2011.0.i586.rpm\n 9ae1d9fc8320fa272fa56484f425e7d8 2011/i586/php-mbstring-5.3.13-0.1-mdv2011.0.i586.rpm\n 86710277f0bca955ced6610b199fcf16 2011/i586/php-mcrypt-5.3.13-0.1-mdv2011.0.i586.rpm\n a9dad85e7658b897bcd9a3c088a71168 2011/i586/php-mssql-5.3.13-0.1-mdv2011.0.i586.rpm\n 66063a764c3a2b90143c5653c0f1dd2c 2011/i586/php-mysql-5.3.13-0.1-mdv2011.0.i586.rpm\n c7993bdf0b9ceaf4f2fa86dbc558ddfb 2011/i586/php-mysqli-5.3.13-0.1-mdv2011.0.i586.rpm\n afcd3e1e62498bffaa9432c5d5c505f5 2011/i586/php-mysqlnd-5.3.13-0.1-mdv2011.0.i586.rpm\n 21a837c5413d3e89b7747b70b343ff39 2011/i586/php-odbc-5.3.13-0.1-mdv2011.0.i586.rpm\n 9653980157e82a7cc1fcb428e6a11831 2011/i586/php-openssl-5.3.13-0.1-mdv2011.0.i586.rpm\n 2a7283323df15b449a0911147e4e120a 2011/i586/php-pcntl-5.3.13-0.1-mdv2011.0.i586.rpm\n 5943398e22f4b3aab9fb741e7b6a8014 2011/i586/php-pdo-5.3.13-0.1-mdv2011.0.i586.rpm\n 4a8632f0605a849c61148479c3dce11c 2011/i586/php-pdo_dblib-5.3.13-0.1-mdv2011.0.i586.rpm\n 90bfc85fce2cf88d5cc7e9d383bac674 2011/i586/php-pdo_mysql-5.3.13-0.1-mdv2011.0.i586.rpm\n 13a2e35fe9389ceff1bd86915d4fbb45 2011/i586/php-pdo_odbc-5.3.13-0.1-mdv2011.0.i586.rpm\n bd5ac6d3de510f5648e0796262ee0284 2011/i586/php-pdo_pgsql-5.3.13-0.1-mdv2011.0.i586.rpm\n c8a144f194b2e263d30d42549ef72df7 2011/i586/php-pdo_sqlite-5.3.13-0.1-mdv2011.0.i586.rpm\n 9fc72c845adc2c8b526ccda1045e95cb 2011/i586/php-pgsql-5.3.13-0.1-mdv2011.0.i586.rpm\n ceed9de56ba7babbb1103c0505360ae8 2011/i586/php-phar-5.3.13-0.1-mdv2011.0.i586.rpm\n 99df22a88e7ec65277c5f1d67946b674 2011/i586/php-posix-5.3.13-0.1-mdv2011.0.i586.rpm\n 2a7c90e39eaed912fd8ef49d5edcf3b0 2011/i586/php-pspell-5.3.13-0.1-mdv2011.0.i586.rpm\n b4f54f67b9372e1bef78b6a40a756d31 2011/i586/php-readline-5.3.13-0.1-mdv2011.0.i586.rpm\n c3ab166b9fc83521a75c13dff80f3a56 2011/i586/php-recode-5.3.13-0.1-mdv2011.0.i586.rpm\n a6c67fe24586ad45656a0e11906e7bb3 2011/i586/php-session-5.3.13-0.1-mdv2011.0.i586.rpm\n 39dd1f3c8218f0537aad8f03aa96b833 2011/i586/php-shmop-5.3.13-0.1-mdv2011.0.i586.rpm\n 7d516b28e8f45f06883657d93d152c31 2011/i586/php-snmp-5.3.13-0.1-mdv2011.0.i586.rpm\n 511c2eadd6584227584704adf97150e9 2011/i586/php-soap-5.3.13-0.1-mdv2011.0.i586.rpm\n d2bb4858eb41257b9e3c72b385b55fed 2011/i586/php-sockets-5.3.13-0.1-mdv2011.0.i586.rpm\n ef20af5ac9def94fc4db18e4e9ef80f3 2011/i586/php-sqlite3-5.3.13-0.1-mdv2011.0.i586.rpm\n d87d2f151f37050dd9f3d1fb66cc5be6 2011/i586/php-sqlite-5.3.13-0.1-mdv2011.0.i586.rpm\n 1214cb4bc37c7fb285dd6c2f00411904 2011/i586/php-sybase_ct-5.3.13-0.1-mdv2011.0.i586.rpm\n 1bd2a3a7f3408e7e304190e4145cec7f 2011/i586/php-sysvmsg-5.3.13-0.1-mdv2011.0.i586.rpm\n 602e9fbc2dd26d526709da1fbb5f43a3 2011/i586/php-sysvsem-5.3.13-0.1-mdv2011.0.i586.rpm\n 1f4d61a55c51175890bf3fe8da58178b 2011/i586/php-sysvshm-5.3.13-0.1-mdv2011.0.i586.rpm\n 7f81e3126928fd1e48e61a04e978e549 2011/i586/php-tidy-5.3.13-0.1-mdv2011.0.i586.rpm\n a2ea94863a07932b8cc8adfaf9984801 2011/i586/php-tokenizer-5.3.13-0.1-mdv2011.0.i586.rpm\n 7ca9553c6d0280546bc198cf7e349fd0 2011/i586/php-wddx-5.3.13-0.1-mdv2011.0.i586.rpm\n 2657cd50ab3d1ed89c40dd022b18a78a 2011/i586/php-xml-5.3.13-0.1-mdv2011.0.i586.rpm\n 4484a28aa070a5507ca51b7b6ccd9c4f 2011/i586/php-xmlreader-5.3.13-0.1-mdv2011.0.i586.rpm\n fb655f70ba8fd02cb283c685fb32198d 2011/i586/php-xmlrpc-5.3.13-0.1-mdv2011.0.i586.rpm\n 595eb1d07062b9ea1cbfa4db0c858b24 2011/i586/php-xmlwriter-5.3.13-0.1-mdv2011.0.i586.rpm\n 13c04bf3f0134e29372d595589f59193 2011/i586/php-xsl-5.3.13-0.1-mdv2011.0.i586.rpm\n 0a98ea3d088772271f96eeb7a5f23ba2 2011/i586/php-zip-5.3.13-0.1-mdv2011.0.i586.rpm\n e5242f7e29696cf3f9a80eb65ac97184 2011/i586/php-zlib-5.3.13-0.1-mdv2011.0.i586.rpm \n 43577b68968398f3e83bbb150c2ba4dd 2011/SRPMS/apache-mod_php-5.3.13-0.1.src.rpm\n 75c0847b9bfff7a4ecf5f5097e39b5e0 2011/SRPMS/php-5.3.13-0.1.src.rpm\n daa6819e438adce22445ffb6f25c10f0 2011/SRPMS/php-ini-5.3.13-0.1.src.rpm\n\n Mandriva Linux 2011/X86_64:\n 6f1b882d07cd219f673c90396542719e 2011/x86_64/apache-mod_php-5.3.13-0.1-mdv2011.0.x86_64.rpm\n 11c80f46a5669769a85ef8f391d07a70 2011/x86_64/lib64php5_common5-5.3.13-0.1-mdv2011.0.x86_64.rpm\n 7e4e71c5b17031412c13ea2d9b2477c5 2011/x86_64/php-bcmath-5.3.13-0.1-mdv2011.0.x86_64.rpm\n 528be2af28cf1a4843850e1b565c3898 2011/x86_64/php-bz2-5.3.13-0.1-mdv2011.0.x86_64.rpm\n 39b482e7037283b454056f4882d5917b 2011/x86_64/php-calendar-5.3.13-0.1-mdv2011.0.x86_64.rpm\n 9829b1d862405439321b3ecbfb4c7ea1 2011/x86_64/php-cgi-5.3.13-0.1-mdv2011.0.x86_64.rpm\n 5e705973df7b6c201fabeb2c75d3a74a 2011/x86_64/php-cli-5.3.13-0.1-mdv2011.0.x86_64.rpm\n eb3b69da40fb3992024aa0a9fea15a8d 2011/x86_64/php-ctype-5.3.13-0.1-mdv2011.0.x86_64.rpm\n a7fd1763425d19677b6adc88a835770f 2011/x86_64/php-curl-5.3.13-0.1-mdv2011.0.x86_64.rpm\n 0a4712efbe6fd4e1d2590842f620982c 2011/x86_64/php-dba-5.3.13-0.1-mdv2011.0.x86_64.rpm\n ca749d3257f0bb0595a6495816d17c29 2011/x86_64/php-devel-5.3.13-0.1-mdv2011.0.x86_64.rpm\n 56a0d712c402bcddcaba739f35ea07a6 2011/x86_64/php-doc-5.3.13-0.1-mdv2011.0.x86_64.rpm\n 2a6cf45b3a94ae3e571e3dbcbbc08804 2011/x86_64/php-dom-5.3.13-0.1-mdv2011.0.x86_64.rpm\n 0f109c681babe75db077f8d9af926f85 2011/x86_64/php-enchant-5.3.13-0.1-mdv2011.0.x86_64.rpm\n 7d419c4fd0f8180bb777b4b198dbf192 2011/x86_64/php-exif-5.3.13-0.1-mdv2011.0.x86_64.rpm\n befa5de9e5e4a3a2ab04a4899a0c654e 2011/x86_64/php-fileinfo-5.3.13-0.1-mdv2011.0.x86_64.rpm\n ef19b2adb8544747b6dbc673d5b758cd 2011/x86_64/php-filter-5.3.13-0.1-mdv2011.0.x86_64.rpm\n 42952a220d307fab9e88012a0db43ecd 2011/x86_64/php-fpm-5.3.13-0.1-mdv2011.0.x86_64.rpm\n 40c04426bafdec1b7ac6efd7e80112e3 2011/x86_64/php-ftp-5.3.13-0.1-mdv2011.0.x86_64.rpm\n 4fb018ed2383c082d45e4b75a346d588 2011/x86_64/php-gd-5.3.13-0.1-mdv2011.0.x86_64.rpm\n 7237c26a2db73c6a115fc4e035ecb0f2 2011/x86_64/php-gettext-5.3.13-0.1-mdv2011.0.x86_64.rpm\n 1a474b43b899509ba9516fa042fe1ddd 2011/x86_64/php-gmp-5.3.13-0.1-mdv2011.0.x86_64.rpm\n 28e8e4748273a5ccaeb65b54d666402f 2011/x86_64/php-hash-5.3.13-0.1-mdv2011.0.x86_64.rpm\n d3f5e9dfc04ce0ad319884c2501529c4 2011/x86_64/php-iconv-5.3.13-0.1-mdv2011.0.x86_64.rpm\n c166f30d0bab63ab66c91fdc7f23109e 2011/x86_64/php-imap-5.3.13-0.1-mdv2011.0.x86_64.rpm\n c2a6c0df9bdb831fa633b00afe1656ca 2011/x86_64/php-ini-5.3.13-0.1-mdv2011.0.x86_64.rpm\n 8ef06e0d3bc50c6af030273db341f33f 2011/x86_64/php-intl-5.3.13-0.1-mdv2011.0.x86_64.rpm\n 5e59fb195dd577622ba638e6f61301ce 2011/x86_64/php-json-5.3.13-0.1-mdv2011.0.x86_64.rpm\n 51d4d134118097c396fd9ae22658fd95 2011/x86_64/php-ldap-5.3.13-0.1-mdv2011.0.x86_64.rpm\n 43089444e735a7fb955f4b2073a89b8e 2011/x86_64/php-mbstring-5.3.13-0.1-mdv2011.0.x86_64.rpm\n 67cb0bb2abf2ac499616a9f6b67e42a4 2011/x86_64/php-mcrypt-5.3.13-0.1-mdv2011.0.x86_64.rpm\n 6167541236c972e1b3ca07ab4e3aa435 2011/x86_64/php-mssql-5.3.13-0.1-mdv2011.0.x86_64.rpm\n 8169e0c8a9121ed5b088e50f729a08f2 2011/x86_64/php-mysql-5.3.13-0.1-mdv2011.0.x86_64.rpm\n a9f88ce7ae03e6c9614bbbe77badd211 2011/x86_64/php-mysqli-5.3.13-0.1-mdv2011.0.x86_64.rpm\n 09ffa27ee341ea0f316c001302dc6b4f 2011/x86_64/php-mysqlnd-5.3.13-0.1-mdv2011.0.x86_64.rpm\n 52eca2dca4ad432fdb9ca2a42f8af637 2011/x86_64/php-odbc-5.3.13-0.1-mdv2011.0.x86_64.rpm\n f6e46b6f5ad8a961cbfde8b8e767054a 2011/x86_64/php-openssl-5.3.13-0.1-mdv2011.0.x86_64.rpm\n 3dd5efd7a83830669edf081f84a6ddd0 2011/x86_64/php-pcntl-5.3.13-0.1-mdv2011.0.x86_64.rpm\n f000fb58640165fa93eb8939c88f51b9 2011/x86_64/php-pdo-5.3.13-0.1-mdv2011.0.x86_64.rpm\n e91e95bb78ee4ccc6edc8a676cf83331 2011/x86_64/php-pdo_dblib-5.3.13-0.1-mdv2011.0.x86_64.rpm\n 82ca0b0fa4daa2d13d351f57cac4b1ad 2011/x86_64/php-pdo_mysql-5.3.13-0.1-mdv2011.0.x86_64.rpm\n 2a2e4cf2e7b3d6c718072e34bbf1f4d5 2011/x86_64/php-pdo_odbc-5.3.13-0.1-mdv2011.0.x86_64.rpm\n bae3bd360ca8da31e3444555b1ba5984 2011/x86_64/php-pdo_pgsql-5.3.13-0.1-mdv2011.0.x86_64.rpm\n 265ffe4fec20f1a276a4ae598f897097 2011/x86_64/php-pdo_sqlite-5.3.13-0.1-mdv2011.0.x86_64.rpm\n de5791ef4c4f09caf289efcc2946bd40 2011/x86_64/php-pgsql-5.3.13-0.1-mdv2011.0.x86_64.rpm\n 3e5a5c8d71d73d792f6a9c5d1d1ff0e0 2011/x86_64/php-phar-5.3.13-0.1-mdv2011.0.x86_64.rpm\n 1b106b0000d8cf09217a8c6066a08abe 2011/x86_64/php-posix-5.3.13-0.1-mdv2011.0.x86_64.rpm\n 4142e252a6e80033b49966678333d4fc 2011/x86_64/php-pspell-5.3.13-0.1-mdv2011.0.x86_64.rpm\n 2eaa627598b484e870a745dfce89561c 2011/x86_64/php-readline-5.3.13-0.1-mdv2011.0.x86_64.rpm\n 16aa5e0d0038dad164fd251584267b25 2011/x86_64/php-recode-5.3.13-0.1-mdv2011.0.x86_64.rpm\n 1f2221028312e63a8fe0153b0f37268d 2011/x86_64/php-session-5.3.13-0.1-mdv2011.0.x86_64.rpm\n 08339bda25dfc15853d8f4f3093906b5 2011/x86_64/php-shmop-5.3.13-0.1-mdv2011.0.x86_64.rpm\n af74d89511d56956fd18f47588c8134a 2011/x86_64/php-snmp-5.3.13-0.1-mdv2011.0.x86_64.rpm\n a60760ee2c728bcd933f7f129918e20f 2011/x86_64/php-soap-5.3.13-0.1-mdv2011.0.x86_64.rpm\n 23edc8e373f493137a741d3f5b8a776f 2011/x86_64/php-sockets-5.3.13-0.1-mdv2011.0.x86_64.rpm\n 0ee3559a3748ba690ee5c4f99a324b1e 2011/x86_64/php-sqlite3-5.3.13-0.1-mdv2011.0.x86_64.rpm\n a4b3e977bffee9f122cb6e9582edb3f1 2011/x86_64/php-sqlite-5.3.13-0.1-mdv2011.0.x86_64.rpm\n edcf9dd12733f50cc808a336b26e0fe2 2011/x86_64/php-sybase_ct-5.3.13-0.1-mdv2011.0.x86_64.rpm\n d6cd75e157f0b6b026444a1407cf90a7 2011/x86_64/php-sysvmsg-5.3.13-0.1-mdv2011.0.x86_64.rpm\n 0c283bd1ae67f256a6e776f35e36b30c 2011/x86_64/php-sysvsem-5.3.13-0.1-mdv2011.0.x86_64.rpm\n 85f7cb718011e2ff913ce142a12a6343 2011/x86_64/php-sysvshm-5.3.13-0.1-mdv2011.0.x86_64.rpm\n 63b205689a9cb3929379ce8c6415fecc 2011/x86_64/php-tidy-5.3.13-0.1-mdv2011.0.x86_64.rpm\n addd08fffff1581bfa703aeba53c5566 2011/x86_64/php-tokenizer-5.3.13-0.1-mdv2011.0.x86_64.rpm\n 138500dc24f46346ae847fc2f56ca7a7 2011/x86_64/php-wddx-5.3.13-0.1-mdv2011.0.x86_64.rpm\n 27801c8421becc9030eb1e2e06342efe 2011/x86_64/php-xml-5.3.13-0.1-mdv2011.0.x86_64.rpm\n 1fefd162d7a627212ccca1ecda6ccdf2 2011/x86_64/php-xmlreader-5.3.13-0.1-mdv2011.0.x86_64.rpm\n 2e6d1bbc2319425bfe20b189f4fe4b79 2011/x86_64/php-xmlrpc-5.3.13-0.1-mdv2011.0.x86_64.rpm\n 421888369bc51fcfcb7a0fcedb23e3e4 2011/x86_64/php-xmlwriter-5.3.13-0.1-mdv2011.0.x86_64.rpm\n f5d79e3adf80fadf2f185db98ec3b142 2011/x86_64/php-xsl-5.3.13-0.1-mdv2011.0.x86_64.rpm\n e126fa1b8d8f0a7c18bae56a00345299 2011/x86_64/php-zip-5.3.13-0.1-mdv2011.0.x86_64.rpm\n a8492adb1cc9cd92d2771d151161ac2e 2011/x86_64/php-zlib-5.3.13-0.1-mdv2011.0.x86_64.rpm \n 43577b68968398f3e83bbb150c2ba4dd 2011/SRPMS/apache-mod_php-5.3.13-0.1.src.rpm\n 75c0847b9bfff7a4ecf5f5097e39b5e0 2011/SRPMS/php-5.3.13-0.1.src.rpm\n daa6819e438adce22445ffb6f25c10f0 2011/SRPMS/php-ini-5.3.13-0.1.src.rpm\n _______________________________________________________________________\n\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\n of md5 checksums and GPG signatures is performed automatically for you. \n\n All packages are signed by Mandriva for security. You can obtain the\n GPG public key of the Mandriva Security Team by executing:\n\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\n\n You can view other update advisories for Mandriva Linux at:\n\n http://www.mandriva.com/security/advisories\n\n If you want to report vulnerabilities, please contact\n\n security_(at)_mandriva.com\n _______________________________________________________________________\n\n Type Bits/KeyID Date User ID\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\n \u003csecurity*mandriva.com\u003e\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.11 (GNU/Linux)\n\niD8DBQFPq4WAmqjQ0CJFipgRAihWAKCc3667vbSD/ihxb7LB9g9x2C+bnQCg89XH\nJTVUFGYH3hR84ZM7EV65I9g=\n=hQaF\n-----END PGP SIGNATURE-----\n\n_______________________________________________\nFull-Disclosure - We believe in it. \nCharter: http://lists.grok.org.uk/full-disclosure-charter.html\nHosted and sponsored by Secunia - http://secunia.com/\n", "sources": [ { "db": "NVD", "id": "CVE-2012-1823" }, { "db": "CERT/CC", "id": "VU#673343" }, { "db": "JVNDB", "id": "JVNDB-2012-002235" }, { "db": "BID", "id": "53388" }, { "db": "VULMON", "id": "CVE-2012-1823" }, { "db": "PACKETSTORM", "id": "112631" }, { "db": "PACKETSTORM", "id": "112515" }, { "db": "PACKETSTORM", "id": "121573" }, { "db": "PACKETSTORM", "id": "112580" }, { "db": "PACKETSTORM", "id": "113905" }, { "db": "PACKETSTORM", "id": "112606" }, { "db": "PACKETSTORM", "id": "112507" }, { "db": "PACKETSTORM", "id": "112597" }, { "db": "PACKETSTORM", "id": "112605" } ], "trust": 3.51 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.kb.cert.org/vuls/id/673343", "trust": 0.8, "type": "unknown" }, { "reference": "https://vulmon.com/exploitdetails?qidtp=exploitdb\u0026qid=18836", "trust": 0.4, "type": "exploit" } ], "sources": [ { "db": "CERT/CC", "id": "VU#673343" }, { "db": "VULMON", "id": "CVE-2012-1823" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2012-1823", "trust": 4.4 }, { "db": "CERT/CC", "id": "VU#520827", "trust": 2.8 }, { "db": "CERT/CC", "id": "VU#673343", "trust": 2.2 }, { "db": "SECUNIA", "id": "49014", "trust": 1.7 }, { "db": "SECUNIA", "id": "49065", "trust": 1.7 }, { "db": "SECUNIA", "id": "49085", "trust": 1.7 }, { "db": "SECUNIA", "id": "49087", "trust": 1.7 }, { "db": "SECTRACK", "id": "1027022", "trust": 1.1 }, { "db": "OPENWALL", "id": "OSS-SECURITY/2024/06/07/1", "trust": 1.0 }, { "db": "JVNDB", "id": "JVNDB-2012-002235", "trust": 0.8 }, { "db": "SECUNIA", "id": "49097", "trust": 0.7 }, { "db": "SECUNIA", "id": "49053", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201205-108", "trust": 0.6 }, { "db": "JUNIPER", "id": "JSA10658", "trust": 0.3 }, { "db": "BID", "id": "53388", "trust": 0.3 }, { "db": "EXPLOIT-DB", "id": "18836", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2012-1823", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "112631", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "112515", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "121573", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "112580", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "113905", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "112606", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "112507", "trust": 0.1 }, { "db": "OPENWALL", "id": "OSS-SECURITY/2012/05/09/9", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "112597", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "112605", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#673343" }, { "db": "VULMON", "id": "CVE-2012-1823" }, { "db": "BID", "id": "53388" }, { "db": "JVNDB", "id": "JVNDB-2012-002235" }, { "db": "PACKETSTORM", "id": "112631" }, { "db": "PACKETSTORM", "id": "112515" }, { "db": "PACKETSTORM", "id": "121573" }, { "db": "PACKETSTORM", "id": "112580" }, { "db": "PACKETSTORM", "id": "113905" }, { "db": "PACKETSTORM", "id": "112606" }, { "db": "PACKETSTORM", "id": "112507" }, { "db": "PACKETSTORM", "id": "112597" }, { "db": "PACKETSTORM", "id": "112605" }, { "db": "CNNVD", "id": "CNNVD-201205-108" }, { "db": "NVD", "id": "CVE-2012-1823" } ] }, "id": "VAR-201205-0305", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.47077376 }, "last_update_date": "2024-11-28T22:01:01.669000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HT5501", "trust": 0.8, "url": "http://support.apple.com/kb/HT5501" }, { "title": "HT5501", "trust": 0.8, "url": "http://support.apple.com/kb/HT5501?viewlocale=ja_JP" }, { "title": "PHP-CGI \u306e query string \u306e\u51e6\u7406\u306b\u8106\u5f31\u6027\u3010CY12-06-001\u3011", "trust": 0.8, "url": "http://cs.cybozu.co.jp/information/20120606up02.php" }, { "title": "HPSBMU02786 SSRT100877", "trust": 0.8, "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041" }, { "title": "HPSBUX02791 SSRT100856", "trust": 0.8, "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03368475" }, { "title": "1621015", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21621015" }, { "title": "1620314", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21620314" }, { "title": "#61910", "trust": 0.8, "url": "https://bugs.php.net/bug.php?id=61910" }, { "title": "RHSA-2012:0546", "trust": 0.8, "url": "http://rhn.redhat.com/errata/RHSA-2012-0546.html" }, { "title": "RHSA-2012:0568", "trust": 0.8, "url": "http://rhn.redhat.com/errata/RHSA-2012-0568.html" }, { "title": "RHSA-2012:0547", "trust": 0.8, "url": "http://rhn.redhat.com/errata/RHSA-2012-0547.html" }, { "title": "PHP 5.3.12 and PHP 5.4.2 Released!", "trust": 0.8, "url": "http://www.php.net/archive/2012.php#id2012-05-03-1" }, { "title": "PHP: CGI \u30d0\u30a4\u30ca\u30ea\u3068\u3057\u3066\u30a4\u30f3\u30b9\u30c8\u30fc\u30eb - Manual", "trust": 0.8, "url": "http://www.php.net/manual/ja/security.cgi-bin.php" }, { "title": "PHP 5 ChangeLog - Version 5.4.2", "trust": 0.8, "url": "http://www.php.net/ChangeLog-5.php#5.4.2" }, { "title": "PHP 5.4.3 and PHP 5.3.13 Released!", "trust": 0.8, "url": "http://www.php.net/archive/2012.php#id2012-05-08-1" }, { "title": "Patch cgi.diff for CGI/CLI related Bug #61910", "trust": 0.8, "url": "https://bugs.php.net/patch-display.php?bug_id=61910\u0026patch=cgi.diff\u0026revision=1335984315\u0026display=1" }, { "title": "PHP 5.3.12 and 5.4.2 releases about CGI flaw (CVE-2012-1823)", "trust": 0.8, "url": "http://www.php.net/archive/2012.php#id2012-05-06-1" }, { "title": "001-005900", "trust": 0.8, "url": "https://support.cybozu.com/ja-jp/article/5900" }, { "title": "PHP 5.4.3", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=43186" }, { "title": "PHP 5.4.3", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=43185" }, { "title": "Red Hat: Critical: php53 security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20120569 - Security Advisory" }, { "title": "Red Hat: Critical: php security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20120568 - Security Advisory" }, { "title": "Red Hat: Critical: php security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20120546 - Security Advisory" }, { "title": "Red Hat: Critical: php53 security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20120547 - Security Advisory" }, { "title": "Debian CVElist Bug Report Logs: php5: PHP-CGI query string parameter vulnerability (CVE-2012-1823 / CVE-2012-2311, CERT VU#520827)", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=369fec60ba7ae134a5d768faf3cb2f6b" }, { "title": "Ubuntu Security Notice: php5 vulnerability", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-1437-1" }, { "title": "Amazon Linux AMI: ALAS-2012-077", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=ALAS-2012-077" }, { "title": "Debian Security Advisories: DSA-2465-1 php5 -- several vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=db88513c75df4c41339c6c90dcb69831" }, { "title": "Red Hat: Moderate: php security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20121045 - Security Advisory" }, { "title": "Red Hat: Moderate: php53 security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20121047 - Security Advisory" }, { "title": "Red Hat: Moderate: php security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20121046 - Security Advisory" }, { "title": "HacktivityCon_CTF_2020", "trust": 0.1, "url": "https://github.com/W3rni0/HacktivityCon_CTF_2020 " }, { "title": "exploits", "trust": 0.1, "url": "https://github.com/infodox/exploits " }, { "title": "webappurls", "trust": 0.1, "url": "https://github.com/pwnwiki/webappurls " }, { "title": "CVE-2012-1823", "trust": 0.1, "url": "https://github.com/drone789/CVE-2012-1823 " }, { "title": "Covid-v2-Botnet", "trust": 0.1, "url": "https://github.com/SniperX-D/Covid-v2-Botnet " }, { "title": "covid", "trust": 0.1, "url": "https://github.com/MrScytheLULZ/covid " }, { "title": "python-pySecurity", "trust": 0.1, "url": "https://github.com/CyberSavvy/python-pySecurity " }, { "title": "pySecurity", "trust": 0.1, "url": "https://github.com/smartFlash/pySecurity " }, { "title": "AutoSploit", "trust": 0.1, "url": "https://github.com/RootUp/AutoSploit " }, { "title": "Python", "trust": 0.1, "url": "https://github.com/BCyberSavvy/Python " }, { "title": "awesome-infosec", "trust": 0.1, "url": "https://github.com/onlurking/awesome-infosec " }, { "title": "awesome-infosec", "trust": 0.1, "url": "https://github.com/eric-erki/awesome-infosec " }, { "title": "Intrusion_Detection_System-Python", "trust": 0.1, "url": "https://github.com/marcocastro100/Intrusion_Detection_System-Python " }, { "title": "deepdig", "trust": 0.1, "url": "https://github.com/cyberdeception/deepdig " }, { "title": "Boot2root-CTFs-Writeups", "trust": 0.1, "url": "https://github.com/Jean-Francois-C/Boot2root-CTFs " }, { "title": "Boot2root-CTFs-Writeups", "trust": 0.1, "url": "https://github.com/Jean-Francois-C/Boot2root-CTFs-Writeups " }, { "title": "CDL", "trust": 0.1, "url": "https://github.com/NCSU-DANCE-Research-Group/CDL " }, { "title": "Classified-Distributed-Learning-for-Detecting-Security-Attacks-in-Containerized-Applications", "trust": 0.1, "url": "https://github.com/yuhang-lin/Classified-Distributed-Learning-for-Detecting-Security-Attacks-in-Containerized-Applications " }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/new-exploits-arrive-for-old-php-vulnerability/104881/" }, { "title": "Securelist", "trust": 0.1, "url": "https://securelist.com/it-threat-evolution-q2-2013/37163/" }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/php-group-set-release-another-patch-cve-2012-1823-flaw-050812/76537/" }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/php-group-releases-new-versions-patch-doesnt-fix-cve-2012-1823-bug-050412/76524/" } ], "sources": [ { "db": "VULMON", "id": "CVE-2012-1823" }, { "db": "JVNDB", "id": "JVNDB-2012-002235" }, { "db": "CNNVD", "id": "CNNVD-201205-108" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "CWE-20", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-002235" }, { "db": "NVD", "id": "CVE-2012-1823" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.8, "url": "http://www.php.net/archive/2012.php#id2012-05-03-1" }, { "trust": 2.8, "url": "http://www.kb.cert.org/vuls/id/520827" }, { "trust": 2.1, "url": "http://eindbazen.net/2012/05/php-cgi-advisory-cve-2012-1823/" }, { "trust": 1.8, "url": "https://bugs.php.net/bug.php?id=61910" }, { "trust": 1.7, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-1823" }, { "trust": 1.7, "url": "http://www.php.net/changelog-5.php#5.4.2" }, { "trust": 1.7, "url": "https://bugs.php.net/patch-display.php?bug_id=61910\u0026patch=cgi.diff\u0026revision=1335984315\u0026display=1" }, { "trust": 1.7, "url": "http://secunia.com/advisories/49014" }, { "trust": 1.7, "url": "http://secunia.com/advisories/49087" }, { "trust": 1.7, "url": "http://secunia.com/advisories/49065" }, { "trust": 1.7, "url": "http://secunia.com/advisories/49085" }, { "trust": 1.5, "url": "http://www.kb.cert.org/vuls/id/673343" }, { "trust": 1.4, "url": "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?objectid=c03360041" }, { "trust": 1.2, "url": "http://rhn.redhat.com/errata/rhsa-2012-0568.html" }, { "trust": 1.2, "url": "http://rhn.redhat.com/errata/rhsa-2012-0546.html" }, { "trust": 1.2, "url": "http://rhn.redhat.com/errata/rhsa-2012-0570.html" }, { "trust": 1.2, "url": "http://rhn.redhat.com/errata/rhsa-2012-0569.html" }, { "trust": 1.1, "url": "http://kb.parallels.com/en/113818" }, { "trust": 1.1, "url": "http://seclists.org/fulldisclosure/2013/jun/21" }, { "trust": 1.1, "url": "http://rhn.redhat.com/errata/rhsa-2012-0547.html" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=134012830914727\u0026w=2" }, { "trust": 1.1, "url": "http://lists.apple.com/archives/security-announce/2012/sep/msg00004.html" }, { "trust": 1.1, "url": "http://support.apple.com/kb/ht5501" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id?1027022" }, { "trust": 1.1, "url": "http://www.mandriva.com/security/advisories?name=mdvsa-2012:068" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00002.html" }, { "trust": 1.1, "url": "http://www.debian.org/security/2012/dsa-2465" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00011.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00007.html" }, { "trust": 1.0, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/w45dboh56nqdrtom2dn2lna2fzimc3pk/" }, { "trust": 1.0, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/pkgtquoa2ntz3rxn22csaujpiruyrb4b/" }, { "trust": 1.0, "url": "http://www.openwall.com/lists/oss-security/2024/06/07/1" }, { "trust": 0.8, "url": "http://kb.parallels.com/116241" }, { "trust": 0.8, "url": "http://www.parallels.com/products/plesk/lifecycle" }, { "trust": 0.8, "url": "http://blogs.cisco.com/security/plesk-0-day-targets-web-servers/" }, { "trust": 0.8, "url": "http://kb.parallels.com/en/113814" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu520827" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu381963/index.html" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-1823" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1823" }, { "trust": 0.6, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c03839862" }, { "trust": 0.6, "url": "http://secunia.com/advisories/49053" }, { "trust": 0.6, "url": "http://secunia.com/advisories/49097" }, { "trust": 0.4, "url": "https://www.redhat.com/security/data/cve/cve-2012-1823.html" }, { "trust": 0.4, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.4, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.4, "url": "https://access.redhat.com/security/team/key/#package" }, { "trust": 0.4, "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "trust": 0.4, "url": "http://bugzilla.redhat.com/):" }, { "trust": 0.4, "url": "https://access.redhat.com/knowledge/articles/11258" }, { "trust": 0.3, "url": "http://alerts.hp.com/r?2.1.3kt.2zr.xg7ek.hmj%2asm..t.a4jy.6o9k.bw89mq%5f%5fdmtsfto0" }, { "trust": 0.3, "url": "http://www-01.ibm.com/software/lotus/products/foundations/start/" }, { "trust": 0.3, "url": "kb.parallels.com/en/116241" }, { "trust": 0.3, "url": "https://community.rapid7.com/thread/5174" }, { "trust": 0.3, "url": "http://www.php.net/" }, { "trust": 0.3, "url": "http://ompldr.org/vzgxxaq" }, { "trust": 0.3, "url": "http://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10658\u0026cat=sirt_1\u0026actp=list" }, { "trust": 0.3, "url": "https://downloads.avaya.com/css/p8/documents/100162699" }, { "trust": 0.3, "url": "https://downloads.avaya.com/css/p8/documents/100165255" }, { "trust": 0.3, "url": "http://www.h-online.com/security/news/item/critical-open-hole-in-php-creates-risks-update-1567532.html" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21620314" }, { "trust": 0.3, "url": "http://www.turbolinux.co.jp/security-e/2012/tlsa-2012-14.txt" }, { "trust": 0.2, "url": "http://h20566.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/" }, { "trust": 0.2, "url": "http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0830" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-4153" }, { "trust": 0.2, "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/" }, { "trust": 0.2, "url": "http://secunia.com/" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-2311" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1172" }, { "trust": 0.2, "url": "http://lists.grok.org.uk/full-disclosure-charter.html" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/20.html" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2012:0569" }, { "trust": 0.1, "url": "https://github.com/infodox/exploits" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://www.exploit-db.com/exploits/18836/" }, { "trust": 0.1, "url": "http://www.ubuntu.com/usn/usn-1437-1/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/49097/#comments" }, { "trust": 0.1, "url": "http://secunia.com/psi_30_beta_launch" }, { "trust": 0.1, "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=49097" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_intelligence/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/49097/" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_scanning/personal/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/advisories/about_secunia_advisories/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0036" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-2016" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0057" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-4078" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0031" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1165" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-4885" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2834" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-4317" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1944" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-2014" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-4108" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-2013" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-4415" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-4577" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3607" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-4619" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0021" }, { "trust": 0.1, "url": "http://www.hp.com/swpublishing/mtx-ac3d1f80b8dd48b792bfc01a08" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0027" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0053" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-2012" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-2015" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3379" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-4576" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2821" }, { "trust": 0.1, "url": "http://www.debian.org/security/faq" }, { "trust": 0.1, "url": "http://www.debian.org/security/" }, { "trust": 0.1, "url": "http://software.hp.com" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0883" }, { "trust": 0.1, "url": "https://www.hp.com/go/swa" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-2335" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-2336" }, { "trust": 0.1, "url": "http://www.mandriva.com/security/" }, { "trust": 0.1, "url": "http://www.openwall.com/lists/oss-security/2012/05/09/9" }, { "trust": 0.1, "url": "http://www.mandriva.com/security/advisories" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-2335" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-2336" } ], "sources": [ { "db": "CERT/CC", "id": "VU#673343" }, { "db": "VULMON", "id": "CVE-2012-1823" }, { "db": "BID", "id": "53388" }, { "db": "JVNDB", "id": "JVNDB-2012-002235" }, { "db": "PACKETSTORM", "id": "112631" }, { "db": "PACKETSTORM", "id": "112515" }, { "db": "PACKETSTORM", "id": "121573" }, { "db": "PACKETSTORM", "id": "112580" }, { "db": "PACKETSTORM", "id": "113905" }, { "db": "PACKETSTORM", "id": "112606" }, { "db": "PACKETSTORM", "id": "112507" }, { "db": "PACKETSTORM", "id": "112597" }, { "db": "PACKETSTORM", "id": "112605" }, { "db": "CNNVD", "id": "CNNVD-201205-108" }, { "db": "NVD", "id": "CVE-2012-1823" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#673343" }, { "db": "VULMON", "id": "CVE-2012-1823" }, { "db": "BID", "id": "53388" }, { "db": "JVNDB", "id": "JVNDB-2012-002235" }, { "db": "PACKETSTORM", "id": "112631" }, { "db": "PACKETSTORM", "id": "112515" }, { "db": "PACKETSTORM", "id": "121573" }, { "db": "PACKETSTORM", "id": "112580" }, { "db": "PACKETSTORM", "id": "113905" }, { "db": "PACKETSTORM", "id": "112606" }, { "db": "PACKETSTORM", "id": "112507" }, { "db": "PACKETSTORM", "id": "112597" }, { "db": "PACKETSTORM", "id": "112605" }, { "db": "CNNVD", "id": "CNNVD-201205-108" }, { "db": "NVD", "id": "CVE-2012-1823" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-06-07T00:00:00", "db": "CERT/CC", "id": "VU#673343" }, { "date": "2012-05-11T00:00:00", "db": "VULMON", "id": "CVE-2012-1823" }, { "date": "2012-05-04T00:00:00", "db": "BID", "id": "53388" }, { "date": "2012-05-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-002235" }, { "date": "2012-05-11T21:47:37", "db": "PACKETSTORM", "id": "112631" }, { "date": "2012-05-08T04:16:46", "db": "PACKETSTORM", "id": "112515" }, { "date": "2013-05-09T14:44:00", "db": "PACKETSTORM", "id": "121573" }, { "date": "2012-05-10T03:59:25", "db": "PACKETSTORM", "id": "112580" }, { "date": "2012-06-19T18:22:00", "db": "PACKETSTORM", "id": "113905" }, { "date": "2012-05-10T21:02:26", "db": "PACKETSTORM", "id": "112606" }, { "date": "2012-05-07T20:04:24", "db": "PACKETSTORM", "id": "112507" }, { "date": "2012-05-10T15:26:54", "db": "PACKETSTORM", "id": "112597" }, { "date": "2012-05-10T21:02:10", "db": "PACKETSTORM", "id": "112605" }, { "date": "2012-05-08T00:00:00", "db": "CNNVD", "id": "CNNVD-201205-108" }, { "date": "2012-05-11T10:15:48.043000", "db": "NVD", "id": "CVE-2012-1823" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-06-07T00:00:00", "db": "CERT/CC", "id": "VU#673343" }, { "date": "2018-01-18T00:00:00", "db": "VULMON", "id": "CVE-2012-1823" }, { "date": "2015-04-13T22:15:00", "db": "BID", "id": "53388" }, { "date": "2013-05-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-002235" }, { "date": "2012-05-08T00:00:00", "db": "CNNVD", "id": "CNNVD-201205-108" }, { "date": "2024-11-21T01:37:50.887000", "db": "NVD", "id": "CVE-2012-1823" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "112631" }, { "db": "PACKETSTORM", "id": "112606" }, { "db": "PACKETSTORM", "id": "112507" }, { "db": "PACKETSTORM", "id": "112597" }, { "db": "PACKETSTORM", "id": "112605" }, { "db": "CNNVD", "id": "CNNVD-201205-108" } ], "trust": 1.1 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Parallels Plesk Panel phppath/php vulnerability", "sources": [ { "db": "CERT/CC", "id": "VU#673343" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation", "sources": [ { "db": "CNNVD", "id": "CNNVD-201205-108" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.