var-201205-0312
Vulnerability from variot

sapi/cgi/cgi_main.c in PHP before 5.3.13 and 5.4.x before 5.4.3, when configured as a CGI script (aka php-cgi), does not properly handle query strings that lack an = (equals sign) character, which allows remote attackers to cause a denial of service (resource consumption) by placing command-line options in the query string, related to lack of skipping a certain php_getopt for the 'T' case. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-1823. This vulnerability CVE-2012-1823 Vulnerability due to insufficient fix for.Service operation disruption by placing command line options in query strings by a third party ( Resource consumption ) There is a possibility of being put into a state. PHP is prone to an information-disclosure vulnerability. Exploiting this issue allows remote attackers to view the source code of files in the context of the server process. This may allow the attacker to obtain sensitive information and to run arbitrary PHP code on the affected computer; other attacks are also possible. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201209-03


                                        http://security.gentoo.org/

Severity: High Title: PHP: Multiple vulnerabilities Date: September 24, 2012 Bugs: #384301, #396311, #396533, #399247, #399567, #399573, #401997, #410957, #414553, #421489, #427354, #429630 ID: 201209-03


Synopsis

Multiple vulnerabilities were found in PHP, the worst of which lead to remote execution of arbitrary code.

Background

PHP is a widely-used general-purpose scripting language that is especially suited for Web development and can be embedded into HTML.

Affected packages

-------------------------------------------------------------------
 Package              /     Vulnerable     /            Unaffected
-------------------------------------------------------------------

1 dev-lang/php < 5.3.15 >= 5.3.15 < 5.4.5 >= 5.4.5 ------------------------------------------------------------------- # Package 1 only applies to users of these architectures: arm

Description

Multiple vulnerabilities have been discovered in PHP. Please review the CVE identifiers referenced below for details.

Workaround

There is no known workaround at this time.

Resolution

All PHP users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=dev-lang/php-5.3.15"

All PHP users on ARM should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=dev-lang/php-5.4.5"

References

[ 1 ] CVE-2011-1398 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1398 [ 2 ] CVE-2011-3379 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3379 [ 3 ] CVE-2011-4566 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4566 [ 4 ] CVE-2011-4885 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4885 [ 5 ] CVE-2012-0057 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0057 [ 6 ] CVE-2012-0788 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0788 [ 7 ] CVE-2012-0789 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0789 [ 8 ] CVE-2012-0830 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0830 [ 9 ] CVE-2012-0831 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0831 [ 10 ] CVE-2012-1172 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1172 [ 11 ] CVE-2012-1823 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1823 [ 12 ] CVE-2012-2143 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2143 [ 13 ] CVE-2012-2311 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2311 [ 14 ] CVE-2012-2335 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2335 [ 15 ] CVE-2012-2336 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2336 [ 16 ] CVE-2012-2386 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2386 [ 17 ] CVE-2012-2688 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2688 [ 18 ] CVE-2012-3365 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3365 [ 19 ] CVE-2012-3450 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3450

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

http://security.gentoo.org/glsa/glsa-201209-03.xml

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.

License

Copyright 2012 Gentoo Foundation, Inc; referenced text belongs to its owner(s).

The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5 . Please refer to the following Mandriva advisories for further information: MDVA-2012:004, MDVSA-2011:165, MDVSA-2011:166, MDVSA-2011:180, MDVSA-2011:197, MDVSA-2012:065, MDVSA-2012:068, MDVSA-2012:068-1.


References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1148 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1657 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1938 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2202 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2483 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3182 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3267 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3268 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3379 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2483 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4566 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4885 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0788 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0807 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0830 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0831 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1172 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1823 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1823 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2335 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2336 http://www.mandriva.com/security/advisories?name=MDVA-2012:004 http://www.mandriva.com/security/advisories?name=MDVSA-2011:165 http://www.mandriva.com/security/advisories?name=MDVSA-2011:166 http://www.mandriva.com/security/advisories?name=MDVSA-2011:180 http://www.mandriva.com/security/advisories?name=MDVSA-2011:197 http://www.mandriva.com/security/advisories?name=MDVSA-2012:065 http://www.mandriva.com/security/advisories?name=MDVSA-2012:068 http://www.mandriva.com/security/advisories?name=MDVSA-2012:068-1


Updated Packages:

Mandriva Enterprise Server 5: 7361d218b400b6601eef5465f0c132f1 mes5/i586/apache-mod_php-5.3.13-0.1mdvmes5.2.i586.rpm 23194f266a0a18c9d49fa7760f6d75f7 mes5/i586/lemon-3.7.4-0.1mdvmes5.2.i586.rpm ee51be362aff5c90c587650c52e5d874 mes5/i586/libmbfl1-1.1.0-0.1mdvmes5.2.i586.rpm 0cd89098cc20b5ce8acb14d6f6ddc748 mes5/i586/libmbfl-devel-1.1.0-0.1mdvmes5.2.i586.rpm dedab7019ea9edfeb929fa521191fe09 mes5/i586/libming1-0.4.4-0.1mdvmes5.2.i586.rpm 881df3313a40b7113d0b2c4d39349c4a mes5/i586/libming-devel-0.4.4-0.1mdvmes5.2.i586.rpm a09e59b16f2c4fe4a583b65689f0f308 mes5/i586/libmonetra7-7.0.4-0.1mdvmes5.2.i586.rpm 1cdd454b9561c94253a4d885a1f34370 mes5/i586/libmonetra-devel-7.0.4-0.1mdvmes5.2.i586.rpm 90dcdd87fb687327fd687e490be5fc7b mes5/i586/libphp5_common5-5.3.13-0.1mdvmes5.2.i586.rpm cc8e259df098747e849797194711dff1 mes5/i586/libsphinxclient0-0.9.9-0.1mdvmes5.2.i586.rpm 716d1d5539c4a4eaac5996c70578107d mes5/i586/libsphinxclient-devel-0.9.9-0.1mdvmes5.2.i586.rpm b271fe2d863cb99d46f99a20c0cab5d3 mes5/i586/libstemmer0-0-5.1mdvmes5.2.i586.rpm f08df937c8cbc104c32a0b42f77a2b2d mes5/i586/libstemmer-devel-0-5.1mdvmes5.2.i586.rpm fc04b1140795dafb3a280100a34e1698 mes5/i586/libxmlrpc-epi0-0.54-0.1mdvmes5.2.i586.rpm ed22bcef35a1b90090a01d5bdf5c2861 mes5/i586/libxmlrpc-epi-devel-0.54-0.1mdvmes5.2.i586.rpm 3c70ce8653099b8bede16e1d4b1c854c mes5/i586/libyaz3-3.0.48-0.1mdvmes5.2.i586.rpm d73a3220c42f40c085c1caa3a1797b9a mes5/i586/libyaz-devel-3.0.48-0.1mdvmes5.2.i586.rpm 8cd9158f64b8d1345e47485ab28b8f87 mes5/i586/ming-utils-0.4.4-0.1mdvmes5.2.i586.rpm ec6c990e242c299eb3f250a273298534 mes5/i586/perl-SWF-0.4.4-0.1mdvmes5.2.i586.rpm c199e39972b4633c025cdb4497f866d5 mes5/i586/php-apc-3.1.10-0.1mdvmes5.2.i586.rpm 4d7b2a7efea30875044fa27ab621855f mes5/i586/php-apc-admin-3.1.10-0.1mdvmes5.2.i586.rpm b86186ed13e27f5dde58b58e799f9145 mes5/i586/php-bcmath-5.3.13-0.1mdvmes5.2.i586.rpm 364fb5e17d6f35aeb212e374f8408236 mes5/i586/php-bz2-5.3.13-0.1mdvmes5.2.i586.rpm 64367f635bddcdb8f799f30bd56db615 mes5/i586/php-calendar-5.3.13-0.1mdvmes5.2.i586.rpm 040288301616bfb16436f2e5a341ff9f mes5/i586/php-cgi-5.3.13-0.1mdvmes5.2.i586.rpm 3c265959950263674c5017eda963117e mes5/i586/php-cli-5.3.13-0.1mdvmes5.2.i586.rpm 42876a7aead3c2ba20de3b237502d317 mes5/i586/php-ctype-5.3.13-0.1mdvmes5.2.i586.rpm 9ae84a482bced4724fc5b2719a5f7e74 mes5/i586/php-curl-5.3.13-0.1mdvmes5.2.i586.rpm fb39ca8bc9b3e70dca9eabeb43f1b5a3 mes5/i586/php-dba-5.3.13-0.1mdvmes5.2.i586.rpm eb9cd33f04b6b8ce9631dbee6ffdfa1c mes5/i586/php-dbx-1.1.0-30.2mdvmes5.2.i586.rpm 4a289a7a64702fc7bf9167125f172274 mes5/i586/php-devel-5.3.13-0.1mdvmes5.2.i586.rpm fc09a56f707392c32ef3aeec9a1bb242 mes5/i586/php-dio-0.0.5-0.1mdvmes5.2.i586.rpm 521e2447d98a8d37aa7fb2fa35787ef2 mes5/i586/php-doc-5.3.13-0.1mdvmes5.2.i586.rpm 6e0fed6e1c0b5ee5a11645e4956d345c mes5/i586/php-dom-5.3.13-0.1mdvmes5.2.i586.rpm 5e9298f4d04acef2d164c52697e911eb mes5/i586/php-eaccelerator-0.9.6.1-0.6mdvmes5.2.i586.rpm 688d1e19c4955521d7a217bd64b1a3aa mes5/i586/php-eaccelerator-admin-0.9.6.1-0.6mdvmes5.2.i586.rpm c7ba6857a141dbac85afa4f05cdb65ca mes5/i586/php-enchant-5.3.13-0.1mdvmes5.2.i586.rpm 0c179177f51deb368800f0c08cedc599 mes5/i586/php-exif-5.3.13-0.1mdvmes5.2.i586.rpm 39f6318d1367c28e8c0365098e7750e4 mes5/i586/php-fam-5.0.1-3.6mdvmes5.2.i586.rpm 1ef9b6263948c34f46b5fd29321d911c mes5/i586/php-fileinfo-5.3.13-0.1mdvmes5.2.i586.rpm aad86d693bbe62bba0942b370f6ca246 mes5/i586/php-filepro-5.1.6-13.6mdvmes5.2.i586.rpm 3868021d3e61c00b8ae6809bb7c0900b mes5/i586/php-filter-5.3.13-0.1mdvmes5.2.i586.rpm 48b88e31e42379400dc7766ad2c62e5a mes5/i586/php-fpm-5.3.13-0.1mdvmes5.2.i586.rpm f8cd704030d7d70ea8ebe8346f9f0e0f mes5/i586/php-ftp-5.3.13-0.1mdvmes5.2.i586.rpm 7c32f002b04ac8072df7aa7fa8b7a8e6 mes5/i586/php-gd-5.3.13-0.1mdvmes5.2.i586.rpm df5a2a2b26101a778494b26af67766a2 mes5/i586/php-gettext-5.3.13-0.1mdvmes5.2.i586.rpm 8327f44ffa0b41841ff9b71039017d52 mes5/i586/php-gmp-5.3.13-0.1mdvmes5.2.i586.rpm 811259cfad20fd63253a7123b7fd27dc mes5/i586/php-gtk2-2.0.1-2.2mdvmes5.2.i586.rpm be58ace4d69b596b57afd068f7cf3c49 mes5/i586/php-hash-5.3.13-0.1mdvmes5.2.i586.rpm a17c44ceea8b3f5a0bc55a3af3474af3 mes5/i586/php-iconv-5.3.13-0.1mdvmes5.2.i586.rpm c89f28160eaf77c3655965bfbed6c3b1 mes5/i586/php-imagick-3.0.1-0.2mdvmes5.2.i586.rpm 73fa2e549e58fd68ad8a9109c77a7369 mes5/i586/php-imap-5.3.13-0.1mdvmes5.2.i586.rpm b3c413082301b0a8f4a25f176a87a45e mes5/i586/php-ini-5.3.13-0.1mdvmes5.2.i586.rpm 6c775dd0ca5396b0ebb70e602db834b6 mes5/i586/php-intl-5.3.13-0.1mdvmes5.2.i586.rpm 5902f72d9bc4f0c025618cd49e5f8e79 mes5/i586/php-json-5.3.13-0.1mdvmes5.2.i586.rpm 877dc6caffd8bbe76c654ac4a9d18daa mes5/i586/php-ldap-5.3.13-0.1mdvmes5.2.i586.rpm abe1393ef623af8944406dadd8064c89 mes5/i586/php-mailparse-2.1.6-0.1mdvmes5.2.i586.rpm 0f498f237e44a451224929ecd24b315c mes5/i586/php-mbstring-5.3.13-0.1mdvmes5.2.i586.rpm 35eceb3b8e39847fa00a91409afe9407 mes5/i586/php-mcal-0.6-23.6mdvmes5.2.i586.rpm 385e71ffb5612c05a701ed557e556c62 mes5/i586/php-mcrypt-5.3.13-0.1mdvmes5.2.i586.rpm 18e3385588deda52c3516375d6d803d0 mes5/i586/php-mcve-7.0.3-0.2mdvmes5.2.i586.rpm daf72900f0a90864046a67a2d71e6caa mes5/i586/php-mdbtools-1.0.0-4.2mdvmes5.2.i586.rpm d0905f31f721643a572bf6b005262bf6 mes5/i586/php-memcache-3.0.6-0.2mdvmes5.2.i586.rpm 6b5378f95fb1022c83d34c9db1422d8e mes5/i586/php-ming-5.2.10-0.2mdvmes5.2.i586.rpm 8e6e4f7017a0febfef7cdf155ecc4962 mes5/i586/php-mssql-5.3.13-0.1mdvmes5.2.i586.rpm 0411daf7561b179eb5a8e484d36f4ad3 mes5/i586/php-mysql-5.3.13-0.1mdvmes5.2.i586.rpm ff31716a2c412fba2e9d013c56965cf7 mes5/i586/php-mysqli-5.3.13-0.1mdvmes5.2.i586.rpm 993a888b1c2713a00565e45282b23148 mes5/i586/php-mysqlnd-5.3.13-0.1mdvmes5.2.i586.rpm 08fbe9fae6d67c0637041c80f07eba12 mes5/i586/php-odbc-5.3.13-0.1mdvmes5.2.i586.rpm 7a29e566a7751e1821a623a4f0018a6f mes5/i586/php-openssl-5.3.13-0.1mdvmes5.2.i586.rpm f441f06ada4ee980d501e2b6576f2806 mes5/i586/php-optimizer-0.1-0.alpha2.0.2mdvmes5.2.i586.rpm b8da69bd634b1daa981efbc2ed95a648 mes5/i586/php-pcntl-5.3.13-0.1mdvmes5.2.i586.rpm 95089b116c79922e497d4fd7854df544 mes5/i586/php-pdo-5.3.13-0.1mdvmes5.2.i586.rpm 2f2196f900c6b802cf7fea375c9eeb91 mes5/i586/php-pdo_dblib-5.3.13-0.1mdvmes5.2.i586.rpm 25c438a18c01c09b60e7c7b2fe13671f mes5/i586/php-pdo_mysql-5.3.13-0.1mdvmes5.2.i586.rpm 91f1fee5243ed4ae8398a75e9114adac mes5/i586/php-pdo_odbc-5.3.13-0.1mdvmes5.2.i586.rpm bfff4547a91207f42302cd9fc184f86f mes5/i586/php-pdo_pgsql-5.3.13-0.1mdvmes5.2.i586.rpm 8d460754542459d816d1b3dff39c872b mes5/i586/php-pdo_sqlite-5.3.13-0.1mdvmes5.2.i586.rpm 9ff947c66182403b9888b265832c9161 mes5/i586/php-perl-1.0.0-32.2mdvmes5.2.i586.rpm cb1bca793338e4e792ab6c8792293617 mes5/i586/php-pgsql-5.3.13-0.1mdvmes5.2.i586.rpm 1ef789ec5d683fef4934fc57101456b1 mes5/i586/php-phar-5.3.13-0.1mdvmes5.2.i586.rpm 52145842d6faa93fa073fa17cb3b0763 mes5/i586/php-posix-5.3.13-0.1mdvmes5.2.i586.rpm aed79d1522b7507df309ddd682a99b4d mes5/i586/php-pspell-5.3.13-0.1mdvmes5.2.i586.rpm 7cf0cf423041e29370ec6df0da70d21e mes5/i586/php-radius-1.2.5-7.2mdvmes5.2.i586.rpm f53c0be9c38ddf42a8c6820a312eaa06 mes5/i586/php-readline-5.3.13-0.1mdvmes5.2.i586.rpm 29ee9c49f78cb11e83f9a251bd02b7e9 mes5/i586/php-recode-5.3.13-0.1mdvmes5.2.i586.rpm 2c8c33fd81fc8468d0ddb774c2814264 mes5/i586/php-sasl-0.1.0-21.6mdvmes5.2.i586.rpm 8c2471fa96a43e94edabd4b9668724ef mes5/i586/php-session-5.3.13-0.1mdvmes5.2.i586.rpm 3ca8b754f64883be1924fa8e95e799d3 mes5/i586/php-shmop-5.3.13-0.1mdvmes5.2.i586.rpm faa1b493b705f393754abcc2174857b5 mes5/i586/php-snmp-5.3.13-0.1mdvmes5.2.i586.rpm c393eb8db265798b1beff2541d13ee25 mes5/i586/php-soap-5.3.13-0.1mdvmes5.2.i586.rpm c23958451e7f49cb90e18f0d58fde045 mes5/i586/php-sockets-5.3.13-0.1mdvmes5.2.i586.rpm 419a7ecf0f1d44a08795cc21c88f3b17 mes5/i586/php-sphinx-1.2.0-0.1mdvmes5.2.i586.rpm b42c41d30364c4bb308146ab5087fabf mes5/i586/php-sqlite3-5.3.13-0.1mdvmes5.2.i586.rpm 6e9609d6fd4724426a63e3e520341051 mes5/i586/php-sqlite-5.3.13-0.1mdvmes5.2.i586.rpm e0b0e03c3ba4746805a70f3749784af7 mes5/i586/php-ssh2-0.11.3-0.1mdvmes5.2.i586.rpm f3be55d6857f3c36f063a418ff780c01 mes5/i586/php-suhosin-0.9.33-0.1mdvmes5.2.i586.rpm 49ab75a66171482bc0c92da727b42790 mes5/i586/php-sybase_ct-5.3.13-0.1mdvmes5.2.i586.rpm a49fe633e4d2eb4acb1fcd9ded4afff6 mes5/i586/php-sysvmsg-5.3.13-0.1mdvmes5.2.i586.rpm e548f18c2ccd5522376387fb9895e605 mes5/i586/php-sysvsem-5.3.13-0.1mdvmes5.2.i586.rpm 079ffcc8e9bbcf02d70b39aed0e37510 mes5/i586/php-sysvshm-5.3.13-0.1mdvmes5.2.i586.rpm a0bfac8555bfaefec8cdab4a8fe8f759 mes5/i586/php-tclink-3.4.5-0.2mdvmes5.2.i586.rpm c3bb9c496c70fa477b65a326f10f1f13 mes5/i586/php-tidy-5.3.13-0.1mdvmes5.2.i586.rpm 92fa5b22a77b38c94e1e81cee27e94e5 mes5/i586/php-timezonedb-2012.3-0.1mdvmes5.2.i586.rpm c69e34969e6be01c229701cb3bd381f3 mes5/i586/php-tokenizer-5.3.13-0.1mdvmes5.2.i586.rpm 86d0fa4af4c00f2a996ee86c7480eaec mes5/i586/php-translit-0.6.1-0.1mdvmes5.2.i586.rpm 11aa119fde6b2c43e93259784d78b72a mes5/i586/php-vld-0.11.1-0.1mdvmes5.2.i586.rpm f48532222388b41b6f5abbeffa704cf9 mes5/i586/php-wddx-5.3.13-0.1mdvmes5.2.i586.rpm 1770351942d2fb1c5685afe0609d22ea mes5/i586/php-xattr-1.1.0-2.6mdvmes5.2.i586.rpm 09300dd1170f00c70d05a21017d05448 mes5/i586/php-xcache-1.3.2-0.1mdvmes5.2.i586.rpm 508c5edb557c8bc20d7084b314278944 mes5/i586/php-xcache-admin-1.3.2-0.1mdvmes5.2.i586.rpm 41e91f88a9fdaf1fa0420ae01dc46ade mes5/i586/php-xdebug-2.1.4-0.1mdvmes5.2.i586.rpm c8d6da8bdb753cf7a2a6db3d3e2e46bf mes5/i586/php-xml-5.3.13-0.1mdvmes5.2.i586.rpm 50aed2d093b83fdaa77dc407da9b861a mes5/i586/php-xmlreader-5.3.13-0.1mdvmes5.2.i586.rpm fe32252d37699afb0c51f60f9722adcb mes5/i586/php-xmlrpc-5.3.13-0.1mdvmes5.2.i586.rpm a1a2181cb93d31acf2c6b6e246b9db0d mes5/i586/php-xmlwriter-5.3.13-0.1mdvmes5.2.i586.rpm f87097cce5a501146df0e7120211c4bd mes5/i586/php-xsl-5.3.13-0.1mdvmes5.2.i586.rpm 9d5c99b04a85caea9bce01f4c662372c mes5/i586/php-yaz-1.1.1-0.1mdvmes5.2.i586.rpm d38eb4445d09878793e8506f1b649236 mes5/i586/php-zip-5.3.13-0.1mdvmes5.2.i586.rpm ec0cbe2b90c8fb0db9939d10e62fef02 mes5/i586/php-zlib-5.3.13-0.1mdvmes5.2.i586.rpm e2fe6c46edade8b149063316fb6e9268 mes5/i586/python-SWF-0.4.4-0.1mdvmes5.2.i586.rpm aef4719c148c3f6edf549f236a08868e mes5/i586/sphinx-0.9.9-0.1mdvmes5.2.i586.rpm 48b1928235704dd977b9fdc25f1e2933 mes5/i586/stemwords-0-5.1mdvmes5.2.i586.rpm 1b7636ca4c1ec6eac492041c6e9c95e2 mes5/i586/yaz-3.0.48-0.1mdvmes5.2.i586.rpm 2bac0388ad669fc836a910cb6919733e mes5/SRPMS/apache-mod_php-5.3.13-0.1mdvmes5.2.src.rpm 0dd8c597a6a39e17b504408fa4f894d1 mes5/SRPMS/lemon-3.7.4-0.1mdvmes5.2.src.rpm 04a50458044ddef8dca4acbecd0555d1 mes5/SRPMS/libmbfl-1.1.0-0.1mdvmes5.2.src.rpm d9e473396af964f01dd6310844925396 mes5/SRPMS/libmonetra-7.0.4-0.1mdvmes5.2.src.rpm 0fafe53fccc11afa4b75c66dc49261cd mes5/SRPMS/libstemmer-0-5.1mdvmes5.2.src.rpm 6de1878b7ff4fbc0b63e381618e966ba mes5/SRPMS/ming-0.4.4-0.1mdvmes5.2.src.rpm c4041cade9aaf6c4c67f046e4bfbaa74 mes5/SRPMS/php-5.3.13-0.1mdvmes5.2.src.rpm c0a1c69bca172f69a034505cfd6b37fc mes5/SRPMS/php-apc-3.1.10-0.1mdvmes5.2.src.rpm df8c3520a450cb4209179f60cf8828cd mes5/SRPMS/php-dbx-1.1.0-30.2mdvmes5.2.src.rpm 7705d28806c6a73a9e588d174203ec11 mes5/SRPMS/php-dio-0.0.5-0.1mdvmes5.2.src.rpm cb9fd58d04a1db3ceec2f9b15c5ddac0 mes5/SRPMS/php-eaccelerator-0.9.6.1-0.6mdvmes5.2.src.rpm d1e7c7da449372f62c27a0cd3eeb8a8d mes5/SRPMS/php-fam-5.0.1-3.6mdvmes5.2.src.rpm 4c10d297abc9ea2a4dfe2cc441be619c mes5/SRPMS/php-filepro-5.1.6-13.6mdvmes5.2.src.rpm 7c30fe50ac1dc23870c64660300e78f8 mes5/SRPMS/php-gtk2-2.0.1-2.2mdvmes5.2.src.rpm ecdbedc8c745921ab7e8c97850c7e976 mes5/SRPMS/php-imagick-3.0.1-0.2mdvmes5.2.src.rpm c31069ae710a67783a81adf905f72842 mes5/SRPMS/php-ini-5.3.13-0.1mdvmes5.2.src.rpm 7bba5d67278539bbfe8980f4619fc443 mes5/SRPMS/php-mailparse-2.1.6-0.1mdvmes5.2.src.rpm c064fa5008b99634cf43dd8cfcfc38a8 mes5/SRPMS/php-mcal-0.6-23.6mdvmes5.2.src.rpm 4dc1c969e13503b5b84e4cc2a62fcafa mes5/SRPMS/php-mcve-7.0.3-0.2mdvmes5.2.src.rpm 8a0b00a7eb45735c7f1b84db2124a02a mes5/SRPMS/php-mdbtools-1.0.0-4.2mdvmes5.2.src.rpm 50514e567296ef853fc9c040b27fde14 mes5/SRPMS/php-memcache-3.0.6-0.2mdvmes5.2.src.rpm 3d68803bc8d4d5db837d034e31b559ab mes5/SRPMS/php-ming-5.2.10-0.2mdvmes5.2.src.rpm 3788a033464659c7697271fe3e11cb6b mes5/SRPMS/php-optimizer-0.1-0.alpha2.0.2mdvmes5.2.src.rpm 4e41590da9fd097f6ecb0cf362bf99f9 mes5/SRPMS/php-perl-1.0.0-32.2mdvmes5.2.src.rpm 8227db814a6322c4a1c72717965be834 mes5/SRPMS/php-radius-1.2.5-7.2mdvmes5.2.src.rpm b6eea216f82a274151c12bb38e50793c mes5/SRPMS/php-sasl-0.1.0-21.6mdvmes5.2.src.rpm aefb4d8a934bd9ecf18f10cf94508b21 mes5/SRPMS/php-sphinx-1.2.0-0.1mdvmes5.2.src.rpm 27acc20ae9792b5ee79127428c76d019 mes5/SRPMS/php-ssh2-0.11.3-0.1mdvmes5.2.src.rpm 8561139b4f53146b52d0d881c93bd884 mes5/SRPMS/php-suhosin-0.9.33-0.1mdvmes5.2.src.rpm 9decd2138202b8f51428b69f8d089679 mes5/SRPMS/php-tclink-3.4.5-0.2mdvmes5.2.src.rpm a331ac0e06665fb2b1696eeb35ddd67b mes5/SRPMS/php-timezonedb-2012.3-0.1mdvmes5.2.src.rpm 79c414525991c894f01d9e597cda78f6 mes5/SRPMS/php-translit-0.6.1-0.1mdvmes5.2.src.rpm 93897f5b7d60138c9e12474dc8388954 mes5/SRPMS/php-vld-0.11.1-0.1mdvmes5.2.src.rpm 9f2b8c72495c63762e02a4792b321463 mes5/SRPMS/php-xattr-1.1.0-2.6mdvmes5.2.src.rpm bec964b1764e87c0ba2d78ec3c33f662 mes5/SRPMS/php-xcache-1.3.2-0.1mdvmes5.2.src.rpm 6e3b637199e13bd895401f2cadbf25c5 mes5/SRPMS/php-xdebug-2.1.4-0.1mdvmes5.2.src.rpm 7b1f065bc086533fa01adba07235c4fe mes5/SRPMS/php-yaz-1.1.1-0.1mdvmes5.2.src.rpm 51586ceaba69e3a61e4171c1b33821ad mes5/SRPMS/sphinx-0.9.9-0.1mdvmes5.2.src.rpm fb8632c3872b5f62b8fdc070565d21b6 mes5/SRPMS/xmlrpc-epi-0.54-0.1mdvmes5.2.src.rpm 7737d7193bce052e26930d49ee7e841f mes5/SRPMS/yaz-3.0.48-0.1mdvmes5.2.src.rpm

Mandriva Enterprise Server 5/X86_64: 96b2d5df095de56795b5e402b5615e5a mes5/x86_64/apache-mod_php-5.3.13-0.1mdvmes5.2.x86_64.rpm 03641ff5a502b304b0cbdeff4161f07a mes5/x86_64/lemon-3.7.4-0.1mdvmes5.2.x86_64.rpm 16d5aee91aab749c674b146725679edf mes5/x86_64/lib64mbfl1-1.1.0-0.1mdvmes5.2.x86_64.rpm 211cf3c8c54d7135c1c59d37df63dbd9 mes5/x86_64/lib64mbfl-devel-1.1.0-0.1mdvmes5.2.x86_64.rpm ff17fd8f9ad24289e558636ce26d6e17 mes5/x86_64/lib64ming1-0.4.4-0.1mdvmes5.2.x86_64.rpm 84acf50087747dcb4f34a5aa2ea1ce0a mes5/x86_64/lib64ming-devel-0.4.4-0.1mdvmes5.2.x86_64.rpm db2510f25a007023647f235013ec6e74 mes5/x86_64/lib64monetra7-7.0.4-0.1mdvmes5.2.x86_64.rpm e449abc214208571c14827a9319c0ec3 mes5/x86_64/lib64monetra-devel-7.0.4-0.1mdvmes5.2.x86_64.rpm 7a418a728839573bca2187e8c5468fe2 mes5/x86_64/lib64php5_common5-5.3.13-0.1mdvmes5.2.x86_64.rpm 4060a9ea3f85ea3df9260575783e7a17 mes5/x86_64/lib64sphinxclient0-0.9.9-0.1mdvmes5.2.x86_64.rpm f6ca93737988ebae403ef0ed8ab41359 mes5/x86_64/lib64sphinxclient-devel-0.9.9-0.1mdvmes5.2.x86_64.rpm 4a7ef9bd46d3c4e8e36f08868319244d mes5/x86_64/lib64stemmer0-0-5.1mdvmes5.2.x86_64.rpm b15fe53cc1c6ea59fdd82c04eae8e7fd mes5/x86_64/lib64stemmer-devel-0-5.1mdvmes5.2.x86_64.rpm c673964b2561e44781a98cb86a9e3187 mes5/x86_64/lib64xmlrpc-epi0-0.54-0.1mdvmes5.2.x86_64.rpm e66b903dc4310d0d3849689529146ec3 mes5/x86_64/lib64xmlrpc-epi-devel-0.54-0.1mdvmes5.2.x86_64.rpm 49cbe05c0d48ad378bd129ebd036ba26 mes5/x86_64/lib64yaz3-3.0.48-0.1mdvmes5.2.x86_64.rpm 2afb044886e1c96c3db29bdf0bb7dc9b mes5/x86_64/lib64yaz-devel-3.0.48-0.1mdvmes5.2.x86_64.rpm 2f4b0caff3c9e97839df3aa1ad6ca732 mes5/x86_64/ming-utils-0.4.4-0.1mdvmes5.2.x86_64.rpm f288571bd192a5e5802a40cd7d4e3118 mes5/x86_64/perl-SWF-0.4.4-0.1mdvmes5.2.x86_64.rpm b059dbc18e76476659494969ef5e4947 mes5/x86_64/php-apc-3.1.10-0.1mdvmes5.2.x86_64.rpm 68149e7e29a2e2ea3f7d7e3573bd193b mes5/x86_64/php-apc-admin-3.1.10-0.1mdvmes5.2.x86_64.rpm e38d895cf490704f5e6f8b1ecdca7e61 mes5/x86_64/php-bcmath-5.3.13-0.1mdvmes5.2.x86_64.rpm 711815bad3794350d9177d52bac8d95b mes5/x86_64/php-bz2-5.3.13-0.1mdvmes5.2.x86_64.rpm 3e8c4f72f0211a797a172c7092966a46 mes5/x86_64/php-calendar-5.3.13-0.1mdvmes5.2.x86_64.rpm 51026f5c6c789d4fe07bb64f5c2a4559 mes5/x86_64/php-cgi-5.3.13-0.1mdvmes5.2.x86_64.rpm a5c4c236c80e4219e0a8e29eac78b440 mes5/x86_64/php-cli-5.3.13-0.1mdvmes5.2.x86_64.rpm f7d68cdc91a5d1aca630bf5d2cc027a8 mes5/x86_64/php-ctype-5.3.13-0.1mdvmes5.2.x86_64.rpm 1e82cf4c1d05409239f773c27f25e148 mes5/x86_64/php-curl-5.3.13-0.1mdvmes5.2.x86_64.rpm 4414697431b4f9d8347d368406a74792 mes5/x86_64/php-dba-5.3.13-0.1mdvmes5.2.x86_64.rpm 78a159ea14c942e6b1484d7f7a02430f mes5/x86_64/php-dbx-1.1.0-30.2mdvmes5.2.x86_64.rpm afce38f700de1511605177aaac2a4b0c mes5/x86_64/php-devel-5.3.13-0.1mdvmes5.2.x86_64.rpm 24c2440bccc5cdceb6d9c6eb6fbd8fb6 mes5/x86_64/php-dio-0.0.5-0.1mdvmes5.2.x86_64.rpm e304390a900576e6344b831935fca984 mes5/x86_64/php-doc-5.3.13-0.1mdvmes5.2.x86_64.rpm 41d2f61596375aa03dcd64462432b8ad mes5/x86_64/php-dom-5.3.13-0.1mdvmes5.2.x86_64.rpm 84eead8c2a272ed05ef0a8f3b6672f56 mes5/x86_64/php-eaccelerator-0.9.6.1-0.6mdvmes5.2.x86_64.rpm d72cfcdee8d186ad859b3b99fd70bdd0 mes5/x86_64/php-eaccelerator-admin-0.9.6.1-0.6mdvmes5.2.x86_64.rpm e3b9b291bbc15d61895e27372b8b1925 mes5/x86_64/php-enchant-5.3.13-0.1mdvmes5.2.x86_64.rpm 558cd9c98631858a661a6aa4ccdf882b mes5/x86_64/php-exif-5.3.13-0.1mdvmes5.2.x86_64.rpm 3553939609e3fef1652ee999d37fd530 mes5/x86_64/php-fam-5.0.1-3.6mdvmes5.2.x86_64.rpm 5a19e0b3fc58299ccdb1b12f5ca69200 mes5/x86_64/php-fileinfo-5.3.13-0.1mdvmes5.2.x86_64.rpm 8a23bbc3e8c9ef45a339563075668d59 mes5/x86_64/php-filepro-5.1.6-13.6mdvmes5.2.x86_64.rpm 78be28f1fee69306797aa83a91bee75b mes5/x86_64/php-filter-5.3.13-0.1mdvmes5.2.x86_64.rpm f8339f10b4664c2130f1159f89c0b244 mes5/x86_64/php-fpm-5.3.13-0.1mdvmes5.2.x86_64.rpm d3b287afef7b1f6207082e97ae77b349 mes5/x86_64/php-ftp-5.3.13-0.1mdvmes5.2.x86_64.rpm 98f68dcc439e4252d72be221fe1e9b98 mes5/x86_64/php-gd-5.3.13-0.1mdvmes5.2.x86_64.rpm 0d04cfba60b215c27a87d77a363a51e9 mes5/x86_64/php-gettext-5.3.13-0.1mdvmes5.2.x86_64.rpm f95a838116143b396aedeeb01c534584 mes5/x86_64/php-gmp-5.3.13-0.1mdvmes5.2.x86_64.rpm e84018d144e7f94e436132420d51440d mes5/x86_64/php-gtk2-2.0.1-2.2mdvmes5.2.x86_64.rpm 7e02ce03f990c677fd39095d094bf5fc mes5/x86_64/php-hash-5.3.13-0.1mdvmes5.2.x86_64.rpm 9e3ae7e6d67397fc15a81d3b3e7d30c8 mes5/x86_64/php-iconv-5.3.13-0.1mdvmes5.2.x86_64.rpm 76155d4adcfb84852c193a6a9183a701 mes5/x86_64/php-imagick-3.0.1-0.2mdvmes5.2.x86_64.rpm 6c1aa64a78fef0ba6b12de5c7fdf227e mes5/x86_64/php-imap-5.3.13-0.1mdvmes5.2.x86_64.rpm e9dbcfb8b6330f52ea6f83630e0b96db mes5/x86_64/php-ini-5.3.13-0.1mdvmes5.2.x86_64.rpm a99ae1adc279e1446501374b396e9194 mes5/x86_64/php-intl-5.3.13-0.1mdvmes5.2.x86_64.rpm c4856a889eb1fabe4cfb4e7e0541a208 mes5/x86_64/php-json-5.3.13-0.1mdvmes5.2.x86_64.rpm 1e6ed1c6f514d3bed9271e192d6b8c79 mes5/x86_64/php-ldap-5.3.13-0.1mdvmes5.2.x86_64.rpm 23d141eeb5ec49b7bd14931e313efe61 mes5/x86_64/php-mailparse-2.1.6-0.1mdvmes5.2.x86_64.rpm 67df3a26f6e25258bb28b9d70ebdc7b9 mes5/x86_64/php-mbstring-5.3.13-0.1mdvmes5.2.x86_64.rpm ce6ec0bd9bf2c6bbea51b670566cf125 mes5/x86_64/php-mcal-0.6-23.6mdvmes5.2.x86_64.rpm 3af3a06df5a30d2324b42ce38b0170c7 mes5/x86_64/php-mcrypt-5.3.13-0.1mdvmes5.2.x86_64.rpm 898c0ff97086e4003f34c5af21a1209b mes5/x86_64/php-mcve-7.0.3-0.2mdvmes5.2.x86_64.rpm ea3c678599dd676b1596cf9b38bac5fa mes5/x86_64/php-mdbtools-1.0.0-4.2mdvmes5.2.x86_64.rpm f42a0499caae118ccb02a404fe853e8d mes5/x86_64/php-memcache-3.0.6-0.2mdvmes5.2.x86_64.rpm d656bf501e02bf270c74e621655e0f79 mes5/x86_64/php-ming-5.2.10-0.2mdvmes5.2.x86_64.rpm 67182e137d6799e21d1eb95f8e8a09a6 mes5/x86_64/php-mssql-5.3.13-0.1mdvmes5.2.x86_64.rpm 13b16b807e73dc799f820ec360b4c4c4 mes5/x86_64/php-mysql-5.3.13-0.1mdvmes5.2.x86_64.rpm 401bf41f8ae42e1c5cbae844b5859310 mes5/x86_64/php-mysqli-5.3.13-0.1mdvmes5.2.x86_64.rpm a3d71aca0b59a479be67aa5f7e2dadac mes5/x86_64/php-mysqlnd-5.3.13-0.1mdvmes5.2.x86_64.rpm 299a5af759216cc02b72c73e1aedb898 mes5/x86_64/php-odbc-5.3.13-0.1mdvmes5.2.x86_64.rpm 1b9afd33db663c3c0376e9e366a1d7e9 mes5/x86_64/php-openssl-5.3.13-0.1mdvmes5.2.x86_64.rpm 1bfa8188adf02eefd1fee6980bf8a637 mes5/x86_64/php-optimizer-0.1-0.alpha2.0.2mdvmes5.2.x86_64.rpm 4ea6deefc1d6c98165a39bf0cbbb1e68 mes5/x86_64/php-pcntl-5.3.13-0.1mdvmes5.2.x86_64.rpm e8edc47c4535c7185c648fe2cdd62fd3 mes5/x86_64/php-pdo-5.3.13-0.1mdvmes5.2.x86_64.rpm 7de9187f26e2b1dcbde7bfa6b5e72cc3 mes5/x86_64/php-pdo_dblib-5.3.13-0.1mdvmes5.2.x86_64.rpm 43c1dabc4e916f1676a64affa4e71923 mes5/x86_64/php-pdo_mysql-5.3.13-0.1mdvmes5.2.x86_64.rpm 90e7bb6c5edceae816e1efc1d772c1cd mes5/x86_64/php-pdo_odbc-5.3.13-0.1mdvmes5.2.x86_64.rpm 41c159cea72f2c8608422dd60b24a2aa mes5/x86_64/php-pdo_pgsql-5.3.13-0.1mdvmes5.2.x86_64.rpm 3b806d521833732f44d199760894e6cc mes5/x86_64/php-pdo_sqlite-5.3.13-0.1mdvmes5.2.x86_64.rpm e3047e894435230a2234b6c106e7f85b mes5/x86_64/php-perl-1.0.0-32.2mdvmes5.2.x86_64.rpm 13e2506c835e395eb7f81edac6b61a8f mes5/x86_64/php-pgsql-5.3.13-0.1mdvmes5.2.x86_64.rpm dab84434950d74f298b66066fc5d22b2 mes5/x86_64/php-phar-5.3.13-0.1mdvmes5.2.x86_64.rpm c087bf52f652c59da6bdd4fb06286464 mes5/x86_64/php-posix-5.3.13-0.1mdvmes5.2.x86_64.rpm 29d9820c941b281ec4bf2e1ae154b590 mes5/x86_64/php-pspell-5.3.13-0.1mdvmes5.2.x86_64.rpm 2a5472038518e78b1e77c085486a7f41 mes5/x86_64/php-radius-1.2.5-7.2mdvmes5.2.x86_64.rpm ef96d7846f36e03abbe0389a9c7025a6 mes5/x86_64/php-readline-5.3.13-0.1mdvmes5.2.x86_64.rpm 3d6dc5bbe9f83a3b7379b09842418d6d mes5/x86_64/php-recode-5.3.13-0.1mdvmes5.2.x86_64.rpm fe9478b8ef31ffd03c4fd7e3b13a6fcd mes5/x86_64/php-sasl-0.1.0-21.6mdvmes5.2.x86_64.rpm 66ea22c633fb484f787795c541c31458 mes5/x86_64/php-session-5.3.13-0.1mdvmes5.2.x86_64.rpm 73cf8b14818d6c4aa6ff7b4f876a305f mes5/x86_64/php-shmop-5.3.13-0.1mdvmes5.2.x86_64.rpm 2f1c10a3e69bc4962c68da8494d7a2d1 mes5/x86_64/php-snmp-5.3.13-0.1mdvmes5.2.x86_64.rpm 66bf34f4665ce04daf5962c4c5178966 mes5/x86_64/php-soap-5.3.13-0.1mdvmes5.2.x86_64.rpm d9f0deeb70efb200c65be5ba2cbfe197 mes5/x86_64/php-sockets-5.3.13-0.1mdvmes5.2.x86_64.rpm cb5ace43e37f4488ca65e4740495842a mes5/x86_64/php-sphinx-1.2.0-0.1mdvmes5.2.x86_64.rpm d2347f18673adf71d3fdc94600e6ec77 mes5/x86_64/php-sqlite3-5.3.13-0.1mdvmes5.2.x86_64.rpm 5317fd6819706540ee1d1e209b0ee65d mes5/x86_64/php-sqlite-5.3.13-0.1mdvmes5.2.x86_64.rpm e308fc3349779514b7aa1e336452f539 mes5/x86_64/php-ssh2-0.11.3-0.1mdvmes5.2.x86_64.rpm c60c35039cdf4a3446e29d0dfa96bc40 mes5/x86_64/php-suhosin-0.9.33-0.1mdvmes5.2.x86_64.rpm 3076e178dff5d37d8c44f21e00d63c9e mes5/x86_64/php-sybase_ct-5.3.13-0.1mdvmes5.2.x86_64.rpm e268581c1bbbd9269faa591577fce62a mes5/x86_64/php-sysvmsg-5.3.13-0.1mdvmes5.2.x86_64.rpm 7dbc04b5fc2ffee323f2c4123feb05bd mes5/x86_64/php-sysvsem-5.3.13-0.1mdvmes5.2.x86_64.rpm 1bdffd99b577b97adc67e5b20df0b301 mes5/x86_64/php-sysvshm-5.3.13-0.1mdvmes5.2.x86_64.rpm 71043e5371ce75f9f0cb63df38021fdb mes5/x86_64/php-tclink-3.4.5-0.2mdvmes5.2.x86_64.rpm 215a92aa7004ea738f44aed3e1168b9c mes5/x86_64/php-tidy-5.3.13-0.1mdvmes5.2.x86_64.rpm efc0a9750197c1b1f5158c8c1e55c27b mes5/x86_64/php-timezonedb-2012.3-0.1mdvmes5.2.x86_64.rpm c7debf59191371056785b18a4a99c276 mes5/x86_64/php-tokenizer-5.3.13-0.1mdvmes5.2.x86_64.rpm 26be1bde74ac0ce9f0b442cb4c81a9be mes5/x86_64/php-translit-0.6.1-0.1mdvmes5.2.x86_64.rpm c99427fc99b451727ac42a9b96a5537c mes5/x86_64/php-vld-0.11.1-0.1mdvmes5.2.x86_64.rpm 2743db76a4ec5fd0a67dbd68bf1229a4 mes5/x86_64/php-wddx-5.3.13-0.1mdvmes5.2.x86_64.rpm 6af7e7503ffe3d4141f222fb0701e817 mes5/x86_64/php-xattr-1.1.0-2.6mdvmes5.2.x86_64.rpm 85f807ce183c7b843701fd8899ef0991 mes5/x86_64/php-xcache-1.3.2-0.1mdvmes5.2.x86_64.rpm a62dad29f5eade1f3d3864b25dff3f2d mes5/x86_64/php-xcache-admin-1.3.2-0.1mdvmes5.2.x86_64.rpm bbf6d7585d06df26bcfa3b73dab0007c mes5/x86_64/php-xdebug-2.1.4-0.1mdvmes5.2.x86_64.rpm a5f092be6c7ca43ad60913afb67885e6 mes5/x86_64/php-xml-5.3.13-0.1mdvmes5.2.x86_64.rpm 65ef3be867bd8427c1f5d41131de8249 mes5/x86_64/php-xmlreader-5.3.13-0.1mdvmes5.2.x86_64.rpm d0c2192b6b08ef59e912fcbd272c98be mes5/x86_64/php-xmlrpc-5.3.13-0.1mdvmes5.2.x86_64.rpm 1c529b0215628a4d699542742dddb80e mes5/x86_64/php-xmlwriter-5.3.13-0.1mdvmes5.2.x86_64.rpm 78df5fc0a2128aa9658b426cd8378b35 mes5/x86_64/php-xsl-5.3.13-0.1mdvmes5.2.x86_64.rpm dadfa8975b5a1a141b2f454d370c59f6 mes5/x86_64/php-yaz-1.1.1-0.1mdvmes5.2.x86_64.rpm 9caa5cd5185ae316a091de219fd984d9 mes5/x86_64/php-zip-5.3.13-0.1mdvmes5.2.x86_64.rpm 92ac01caa79c1d542fe06e4aae21ff0b mes5/x86_64/php-zlib-5.3.13-0.1mdvmes5.2.x86_64.rpm fb2eadb2172166381d594394916add79 mes5/x86_64/python-SWF-0.4.4-0.1mdvmes5.2.x86_64.rpm 5fdd248cb611e7997ddc828e8a90c043 mes5/x86_64/sphinx-0.9.9-0.1mdvmes5.2.x86_64.rpm b3d72ab63f47dd5a0f3b1f147321bcab mes5/x86_64/stemwords-0-5.1mdvmes5.2.x86_64.rpm cfada59c5348ee46e44202376cf042c5 mes5/x86_64/yaz-3.0.48-0.1mdvmes5.2.x86_64.rpm 2bac0388ad669fc836a910cb6919733e mes5/SRPMS/apache-mod_php-5.3.13-0.1mdvmes5.2.src.rpm 0dd8c597a6a39e17b504408fa4f894d1 mes5/SRPMS/lemon-3.7.4-0.1mdvmes5.2.src.rpm 04a50458044ddef8dca4acbecd0555d1 mes5/SRPMS/libmbfl-1.1.0-0.1mdvmes5.2.src.rpm d9e473396af964f01dd6310844925396 mes5/SRPMS/libmonetra-7.0.4-0.1mdvmes5.2.src.rpm 0fafe53fccc11afa4b75c66dc49261cd mes5/SRPMS/libstemmer-0-5.1mdvmes5.2.src.rpm 6de1878b7ff4fbc0b63e381618e966ba mes5/SRPMS/ming-0.4.4-0.1mdvmes5.2.src.rpm c4041cade9aaf6c4c67f046e4bfbaa74 mes5/SRPMS/php-5.3.13-0.1mdvmes5.2.src.rpm c0a1c69bca172f69a034505cfd6b37fc mes5/SRPMS/php-apc-3.1.10-0.1mdvmes5.2.src.rpm df8c3520a450cb4209179f60cf8828cd mes5/SRPMS/php-dbx-1.1.0-30.2mdvmes5.2.src.rpm 7705d28806c6a73a9e588d174203ec11 mes5/SRPMS/php-dio-0.0.5-0.1mdvmes5.2.src.rpm cb9fd58d04a1db3ceec2f9b15c5ddac0 mes5/SRPMS/php-eaccelerator-0.9.6.1-0.6mdvmes5.2.src.rpm d1e7c7da449372f62c27a0cd3eeb8a8d mes5/SRPMS/php-fam-5.0.1-3.6mdvmes5.2.src.rpm 4c10d297abc9ea2a4dfe2cc441be619c mes5/SRPMS/php-filepro-5.1.6-13.6mdvmes5.2.src.rpm 7c30fe50ac1dc23870c64660300e78f8 mes5/SRPMS/php-gtk2-2.0.1-2.2mdvmes5.2.src.rpm ecdbedc8c745921ab7e8c97850c7e976 mes5/SRPMS/php-imagick-3.0.1-0.2mdvmes5.2.src.rpm c31069ae710a67783a81adf905f72842 mes5/SRPMS/php-ini-5.3.13-0.1mdvmes5.2.src.rpm 7bba5d67278539bbfe8980f4619fc443 mes5/SRPMS/php-mailparse-2.1.6-0.1mdvmes5.2.src.rpm c064fa5008b99634cf43dd8cfcfc38a8 mes5/SRPMS/php-mcal-0.6-23.6mdvmes5.2.src.rpm 4dc1c969e13503b5b84e4cc2a62fcafa mes5/SRPMS/php-mcve-7.0.3-0.2mdvmes5.2.src.rpm 8a0b00a7eb45735c7f1b84db2124a02a mes5/SRPMS/php-mdbtools-1.0.0-4.2mdvmes5.2.src.rpm 50514e567296ef853fc9c040b27fde14 mes5/SRPMS/php-memcache-3.0.6-0.2mdvmes5.2.src.rpm 3d68803bc8d4d5db837d034e31b559ab mes5/SRPMS/php-ming-5.2.10-0.2mdvmes5.2.src.rpm 3788a033464659c7697271fe3e11cb6b mes5/SRPMS/php-optimizer-0.1-0.alpha2.0.2mdvmes5.2.src.rpm 4e41590da9fd097f6ecb0cf362bf99f9 mes5/SRPMS/php-perl-1.0.0-32.2mdvmes5.2.src.rpm 8227db814a6322c4a1c72717965be834 mes5/SRPMS/php-radius-1.2.5-7.2mdvmes5.2.src.rpm b6eea216f82a274151c12bb38e50793c mes5/SRPMS/php-sasl-0.1.0-21.6mdvmes5.2.src.rpm aefb4d8a934bd9ecf18f10cf94508b21 mes5/SRPMS/php-sphinx-1.2.0-0.1mdvmes5.2.src.rpm 27acc20ae9792b5ee79127428c76d019 mes5/SRPMS/php-ssh2-0.11.3-0.1mdvmes5.2.src.rpm 8561139b4f53146b52d0d881c93bd884 mes5/SRPMS/php-suhosin-0.9.33-0.1mdvmes5.2.src.rpm 9decd2138202b8f51428b69f8d089679 mes5/SRPMS/php-tclink-3.4.5-0.2mdvmes5.2.src.rpm a331ac0e06665fb2b1696eeb35ddd67b mes5/SRPMS/php-timezonedb-2012.3-0.1mdvmes5.2.src.rpm 79c414525991c894f01d9e597cda78f6 mes5/SRPMS/php-translit-0.6.1-0.1mdvmes5.2.src.rpm 93897f5b7d60138c9e12474dc8388954 mes5/SRPMS/php-vld-0.11.1-0.1mdvmes5.2.src.rpm 9f2b8c72495c63762e02a4792b321463 mes5/SRPMS/php-xattr-1.1.0-2.6mdvmes5.2.src.rpm bec964b1764e87c0ba2d78ec3c33f662 mes5/SRPMS/php-xcache-1.3.2-0.1mdvmes5.2.src.rpm 6e3b637199e13bd895401f2cadbf25c5 mes5/SRPMS/php-xdebug-2.1.4-0.1mdvmes5.2.src.rpm 7b1f065bc086533fa01adba07235c4fe mes5/SRPMS/php-yaz-1.1.1-0.1mdvmes5.2.src.rpm 51586ceaba69e3a61e4171c1b33821ad mes5/SRPMS/sphinx-0.9.9-0.1mdvmes5.2.src.rpm fb8632c3872b5f62b8fdc070565d21b6 mes5/SRPMS/xmlrpc-epi-0.54-0.1mdvmes5.2.src.rpm 7737d7193bce052e26930d49ee7e841f mes5/SRPMS/yaz-3.0.48-0.1mdvmes5.2.src.rpm


To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com


Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux)

iD8DBQFPq6gTmqjQ0CJFipgRAqvVAJ9zEwWjj1SD2W0x+6Nb/vNvjYO4oQCg6O6L wF916W6TuFcSv/gD10fMyoE= =Va72 -----END PGP SIGNATURE-----


Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1

Note: the current version of the following document is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c03839862

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c03839862 Version: 1

HPSBMU02900 rev.1 - HP System Management Homepage (SMH) running on Linux and Windows, Multiple Remote and Local Vulnerabilities

NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.

Release Date: 2013-07-18 Last Updated: 2013-07-18

Potential Security Impact: Local Denial of Service (DoS), remote Denial of Service (DoS), execution of arbitrary code, gain extended privileges, disclosure of information, unauthorized access, XSS

Source: Hewlett-Packard Company, HP Software Security Response Team

VULNERABILITY SUMMARY Potential security vulnerabilities have been identified with HP System Management Homepage (SMH) running on Linux and Windows. The vulnerabilities could be exploited remotely resulting in Local Denial of Service (DoS), remote Denial of Service (DoS), execution of arbitrary code, gain privileges, disclosure of information, unauthorized access, or XSS.

References: CVE-2011-3389 (SSRT100740) Remote disclosure of information CVE-2012-0883 (SSRT101209) Remote gain extended privileges CVE-2012-2110 (SSRT101210) Remote Denial of Service (DoS) CVE-2012-2311 (SSRT100992) Remote execution of arbitrary code CVE-2012-2329 (SSRT100992) Remote Denial of Service (DoS) CVE-2012-2335 (SSRT100992) Remote execution of arbitrary code CVE-2012-2336 (SSRT100992) Remote Denial of Service (DoS) CVE-2013-2355 (SSRT100696) Remote unauthorized Access CVE-2013-2356 (SSRT100835) Remote disclosure of information CVE-2013-2357 (SSRT100907) Remote Denial of Service (DoS) CVE-2013-2358 (SSRT100907) Remote Denial of Service (DoS) CVE-2013-2359 (SSRT100907) Remote Denial of Service (DoS) CVE-2013-2360 (SSRT100907) Remote Denial of Service (DoS) CVE-2013-2361 (SSRT101007) XSS CVE-2013-2362 (SSRT101076, ZDI-CAN-1676) Local Denial of Service (DoS) CVE-2013-2363 (SSRT101150) Remote disclosure of information CVE-2013-2364 (SSRT101151) XSS CVE-2013-5217 (SSRT101137) Remote unauthorized access

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP System Management Homepage (SMH) v7.2.0 and earlier running on Linux and Windows.

BACKGROUND

CVSS 2.0 Base Metrics

Reference Base Vector Base Score CVE-2011-3389 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3 CVE-2012-0883 (AV:L/AC:M/Au:N/C:C/I:C/A:C) 6.9 CVE-2012-2110 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 CVE-2012-2311 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 CVE-2012-2329 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0 CVE-2012-2335 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 CVE-2012-2336 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0 CVE-2013-2355 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3 CVE-2013-2356 (AV:N/AC:L/Au:N/C:C/I:N/A:N) 7.8 CVE-2013-2357 (AV:N/AC:M/Au:S/C:N/I:N/A:C) 6.3 CVE-2013-2358 (AV:N/AC:M/Au:S/C:N/I:N/A:C) 6.3 CVE-2013-2359 (AV:N/AC:M/Au:S/C:N/I:N/A:P) 3.5 CVE-2013-2360 (AV:N/AC:M/Au:S/C:N/I:N/A:P) 3.5 CVE-2013-2361 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3 CVE-2013-2362 (AV:L/AC:H/Au:S/C:N/I:N/A:P) 1.0 CVE-2013-2363 (AV:N/AC:H/Au:N/C:C/I:N/A:P) 6.1 CVE-2013-2364 (AV:N/AC:L/Au:S/C:N/I:N/A:P) 4.0 CVE-2013-5217 (AV:N/AC:H/Au:N/C:P/I:N/A:N) 2.6 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002

The Hewlett-Packard Company thanks agix for working with the TippingPoint Zero Day Initiative to report vulnerability CVE-2013-2362 to security-alert@hp.com

RESOLUTION

HP has made System Management Homepage (SMH) v7.2.1 or subsequent available for Windows and Linux to resolve the vulnerabilities.

Information and updates for SMH can be found at the following location:

http://h18013.www1.hp.com/products/servers/management/agents/index.html

HISTORY Version:1 (rev.1) - 18 July 2013 Initial release

Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.

Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com.

Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com

Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/

Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.

3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX

Copyright 2013 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits;damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1

===================================================================== Red Hat Security Advisory

Synopsis: Moderate: php53 security update Advisory ID: RHSA-2012:1047-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2012-1047.html Issue date: 2012-06-27 CVE Names: CVE-2010-2950 CVE-2011-4153 CVE-2012-0057 CVE-2012-0789 CVE-2012-1172 CVE-2012-2143 CVE-2012-2336 CVE-2012-2386 =====================================================================

  1. Summary:

Updated php53 packages that fix multiple security issues are now available for Red Hat Enterprise Linux 5.

The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.

  1. Relevant releases/architectures:

RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64

  1. Description:

PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.

It was discovered that the PHP XSL extension did not restrict the file writing capability of libxslt. A remote attacker could use this flaw to create or overwrite an arbitrary file that is writable by the user running PHP, if a PHP script processed untrusted eXtensible Style Sheet Language Transformations (XSLT) content. (CVE-2012-0057)

Note: This update disables file writing by default. A new PHP configuration directive, "xsl.security_prefs", can be used to enable file writing in XSLT.

A flaw was found in the way PHP validated file names in file upload requests. A remote attacker could possibly use this flaw to bypass the sanitization of the uploaded file names, and cause a PHP script to store the uploaded file in an unexpected directory, by using a directory traversal attack. (CVE-2012-1172)

Multiple integer overflow flaws, leading to heap-based buffer overflows, were found in the way the PHP phar extension processed certain fields of tar archive files. A remote attacker could provide a specially-crafted tar archive file that, when processed by a PHP application using the phar extension, could cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running PHP. (CVE-2012-2386)

A format string flaw was found in the way the PHP phar extension processed certain PHAR files. A remote attacker could provide a specially-crafted PHAR file, which once processed in a PHP application using the phar extension, could lead to information disclosure and possibly arbitrary code execution via a crafted phar:// URI. (CVE-2010-2950)

A flaw was found in the DES algorithm implementation in the crypt() password hashing function in PHP. If the password string to be hashed contained certain characters, the remainder of the string was ignored when calculating the hash, significantly reducing the password strength. (CVE-2012-2143)

Note: With this update, passwords are no longer truncated when performing DES hashing. Therefore, new hashes of the affected passwords will not match stored hashes generated using vulnerable PHP versions, and will need to be updated.

It was discovered that the fix for CVE-2012-1823, released via RHSA-2012:0547, did not properly filter all php-cgi command line arguments. A specially-crafted request to a PHP script could cause the PHP interpreter to execute the script in a loop, or output usage information that triggers an Internal Server Error. (CVE-2012-2336)

A memory leak flaw was found in the PHP strtotime() function call. A remote attacker could possibly use this flaw to cause excessive memory consumption by triggering many strtotime() function calls. (CVE-2012-0789)

It was found that PHP did not check the zend_strndup() function's return value in certain cases. A remote attacker could possibly use this flaw to crash a PHP application. (CVE-2011-4153)

Upstream acknowledges Rubin Xu and Joseph Bonneau as the original reporters of CVE-2012-2143.

All php53 users should upgrade to these updated packages, which contain backported patches to resolve these issues. After installing the updated packages, the httpd daemon must be restarted for the update to take effect.

  1. Solution:

Before applying this update, make sure all previously-released errata relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/knowledge/articles/11258

  1. Bugs fixed (http://bugzilla.redhat.com/):

782657 - CVE-2012-0057 php: XSLT file writing vulnerability 782943 - CVE-2011-4153 php: zend_strndup() NULL pointer dereference may cause DoS 783609 - CVE-2012-0789 php: strtotime timezone memory leak 799187 - CVE-2012-1172 php: $_FILES array indexes corruption 816956 - CVE-2012-2143 BSD crypt(): DES encrypted password weakness 820708 - CVE-2012-2336 php: incomplete CVE-2012-1823 fix - missing filtering of -T and -h 823594 - CVE-2012-2386 php: Integer overflow leading to heap-buffer overflow in the Phar extension 835024 - CVE-2010-2950 php: Format string flaw in phar extension via phar_stream_flush() (MOPS-2010-024)

  1. Package List:

RHEL Desktop Workstation (v. 5 client):

Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/php53-5.3.3-13.el5_8.src.rpm

i386: php53-5.3.3-13.el5_8.i386.rpm php53-bcmath-5.3.3-13.el5_8.i386.rpm php53-cli-5.3.3-13.el5_8.i386.rpm php53-common-5.3.3-13.el5_8.i386.rpm php53-dba-5.3.3-13.el5_8.i386.rpm php53-debuginfo-5.3.3-13.el5_8.i386.rpm php53-devel-5.3.3-13.el5_8.i386.rpm php53-gd-5.3.3-13.el5_8.i386.rpm php53-imap-5.3.3-13.el5_8.i386.rpm php53-intl-5.3.3-13.el5_8.i386.rpm php53-ldap-5.3.3-13.el5_8.i386.rpm php53-mbstring-5.3.3-13.el5_8.i386.rpm php53-mysql-5.3.3-13.el5_8.i386.rpm php53-odbc-5.3.3-13.el5_8.i386.rpm php53-pdo-5.3.3-13.el5_8.i386.rpm php53-pgsql-5.3.3-13.el5_8.i386.rpm php53-process-5.3.3-13.el5_8.i386.rpm php53-pspell-5.3.3-13.el5_8.i386.rpm php53-snmp-5.3.3-13.el5_8.i386.rpm php53-soap-5.3.3-13.el5_8.i386.rpm php53-xml-5.3.3-13.el5_8.i386.rpm php53-xmlrpc-5.3.3-13.el5_8.i386.rpm

x86_64: php53-5.3.3-13.el5_8.x86_64.rpm php53-bcmath-5.3.3-13.el5_8.x86_64.rpm php53-cli-5.3.3-13.el5_8.x86_64.rpm php53-common-5.3.3-13.el5_8.x86_64.rpm php53-dba-5.3.3-13.el5_8.x86_64.rpm php53-debuginfo-5.3.3-13.el5_8.x86_64.rpm php53-devel-5.3.3-13.el5_8.x86_64.rpm php53-gd-5.3.3-13.el5_8.x86_64.rpm php53-imap-5.3.3-13.el5_8.x86_64.rpm php53-intl-5.3.3-13.el5_8.x86_64.rpm php53-ldap-5.3.3-13.el5_8.x86_64.rpm php53-mbstring-5.3.3-13.el5_8.x86_64.rpm php53-mysql-5.3.3-13.el5_8.x86_64.rpm php53-odbc-5.3.3-13.el5_8.x86_64.rpm php53-pdo-5.3.3-13.el5_8.x86_64.rpm php53-pgsql-5.3.3-13.el5_8.x86_64.rpm php53-process-5.3.3-13.el5_8.x86_64.rpm php53-pspell-5.3.3-13.el5_8.x86_64.rpm php53-snmp-5.3.3-13.el5_8.x86_64.rpm php53-soap-5.3.3-13.el5_8.x86_64.rpm php53-xml-5.3.3-13.el5_8.x86_64.rpm php53-xmlrpc-5.3.3-13.el5_8.x86_64.rpm

Red Hat Enterprise Linux (v. 5 server):

Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/php53-5.3.3-13.el5_8.src.rpm

i386: php53-5.3.3-13.el5_8.i386.rpm php53-bcmath-5.3.3-13.el5_8.i386.rpm php53-cli-5.3.3-13.el5_8.i386.rpm php53-common-5.3.3-13.el5_8.i386.rpm php53-dba-5.3.3-13.el5_8.i386.rpm php53-debuginfo-5.3.3-13.el5_8.i386.rpm php53-devel-5.3.3-13.el5_8.i386.rpm php53-gd-5.3.3-13.el5_8.i386.rpm php53-imap-5.3.3-13.el5_8.i386.rpm php53-intl-5.3.3-13.el5_8.i386.rpm php53-ldap-5.3.3-13.el5_8.i386.rpm php53-mbstring-5.3.3-13.el5_8.i386.rpm php53-mysql-5.3.3-13.el5_8.i386.rpm php53-odbc-5.3.3-13.el5_8.i386.rpm php53-pdo-5.3.3-13.el5_8.i386.rpm php53-pgsql-5.3.3-13.el5_8.i386.rpm php53-process-5.3.3-13.el5_8.i386.rpm php53-pspell-5.3.3-13.el5_8.i386.rpm php53-snmp-5.3.3-13.el5_8.i386.rpm php53-soap-5.3.3-13.el5_8.i386.rpm php53-xml-5.3.3-13.el5_8.i386.rpm php53-xmlrpc-5.3.3-13.el5_8.i386.rpm

ia64: php53-5.3.3-13.el5_8.ia64.rpm php53-bcmath-5.3.3-13.el5_8.ia64.rpm php53-cli-5.3.3-13.el5_8.ia64.rpm php53-common-5.3.3-13.el5_8.ia64.rpm php53-dba-5.3.3-13.el5_8.ia64.rpm php53-debuginfo-5.3.3-13.el5_8.ia64.rpm php53-devel-5.3.3-13.el5_8.ia64.rpm php53-gd-5.3.3-13.el5_8.ia64.rpm php53-imap-5.3.3-13.el5_8.ia64.rpm php53-intl-5.3.3-13.el5_8.ia64.rpm php53-ldap-5.3.3-13.el5_8.ia64.rpm php53-mbstring-5.3.3-13.el5_8.ia64.rpm php53-mysql-5.3.3-13.el5_8.ia64.rpm php53-odbc-5.3.3-13.el5_8.ia64.rpm php53-pdo-5.3.3-13.el5_8.ia64.rpm php53-pgsql-5.3.3-13.el5_8.ia64.rpm php53-process-5.3.3-13.el5_8.ia64.rpm php53-pspell-5.3.3-13.el5_8.ia64.rpm php53-snmp-5.3.3-13.el5_8.ia64.rpm php53-soap-5.3.3-13.el5_8.ia64.rpm php53-xml-5.3.3-13.el5_8.ia64.rpm php53-xmlrpc-5.3.3-13.el5_8.ia64.rpm

ppc: php53-5.3.3-13.el5_8.ppc.rpm php53-bcmath-5.3.3-13.el5_8.ppc.rpm php53-cli-5.3.3-13.el5_8.ppc.rpm php53-common-5.3.3-13.el5_8.ppc.rpm php53-dba-5.3.3-13.el5_8.ppc.rpm php53-debuginfo-5.3.3-13.el5_8.ppc.rpm php53-devel-5.3.3-13.el5_8.ppc.rpm php53-gd-5.3.3-13.el5_8.ppc.rpm php53-imap-5.3.3-13.el5_8.ppc.rpm php53-intl-5.3.3-13.el5_8.ppc.rpm php53-ldap-5.3.3-13.el5_8.ppc.rpm php53-mbstring-5.3.3-13.el5_8.ppc.rpm php53-mysql-5.3.3-13.el5_8.ppc.rpm php53-odbc-5.3.3-13.el5_8.ppc.rpm php53-pdo-5.3.3-13.el5_8.ppc.rpm php53-pgsql-5.3.3-13.el5_8.ppc.rpm php53-process-5.3.3-13.el5_8.ppc.rpm php53-pspell-5.3.3-13.el5_8.ppc.rpm php53-snmp-5.3.3-13.el5_8.ppc.rpm php53-soap-5.3.3-13.el5_8.ppc.rpm php53-xml-5.3.3-13.el5_8.ppc.rpm php53-xmlrpc-5.3.3-13.el5_8.ppc.rpm

s390x: php53-5.3.3-13.el5_8.s390x.rpm php53-bcmath-5.3.3-13.el5_8.s390x.rpm php53-cli-5.3.3-13.el5_8.s390x.rpm php53-common-5.3.3-13.el5_8.s390x.rpm php53-dba-5.3.3-13.el5_8.s390x.rpm php53-debuginfo-5.3.3-13.el5_8.s390x.rpm php53-devel-5.3.3-13.el5_8.s390x.rpm php53-gd-5.3.3-13.el5_8.s390x.rpm php53-imap-5.3.3-13.el5_8.s390x.rpm php53-intl-5.3.3-13.el5_8.s390x.rpm php53-ldap-5.3.3-13.el5_8.s390x.rpm php53-mbstring-5.3.3-13.el5_8.s390x.rpm php53-mysql-5.3.3-13.el5_8.s390x.rpm php53-odbc-5.3.3-13.el5_8.s390x.rpm php53-pdo-5.3.3-13.el5_8.s390x.rpm php53-pgsql-5.3.3-13.el5_8.s390x.rpm php53-process-5.3.3-13.el5_8.s390x.rpm php53-pspell-5.3.3-13.el5_8.s390x.rpm php53-snmp-5.3.3-13.el5_8.s390x.rpm php53-soap-5.3.3-13.el5_8.s390x.rpm php53-xml-5.3.3-13.el5_8.s390x.rpm php53-xmlrpc-5.3.3-13.el5_8.s390x.rpm

x86_64: php53-5.3.3-13.el5_8.x86_64.rpm php53-bcmath-5.3.3-13.el5_8.x86_64.rpm php53-cli-5.3.3-13.el5_8.x86_64.rpm php53-common-5.3.3-13.el5_8.x86_64.rpm php53-dba-5.3.3-13.el5_8.x86_64.rpm php53-debuginfo-5.3.3-13.el5_8.x86_64.rpm php53-devel-5.3.3-13.el5_8.x86_64.rpm php53-gd-5.3.3-13.el5_8.x86_64.rpm php53-imap-5.3.3-13.el5_8.x86_64.rpm php53-intl-5.3.3-13.el5_8.x86_64.rpm php53-ldap-5.3.3-13.el5_8.x86_64.rpm php53-mbstring-5.3.3-13.el5_8.x86_64.rpm php53-mysql-5.3.3-13.el5_8.x86_64.rpm php53-odbc-5.3.3-13.el5_8.x86_64.rpm php53-pdo-5.3.3-13.el5_8.x86_64.rpm php53-pgsql-5.3.3-13.el5_8.x86_64.rpm php53-process-5.3.3-13.el5_8.x86_64.rpm php53-pspell-5.3.3-13.el5_8.x86_64.rpm php53-snmp-5.3.3-13.el5_8.x86_64.rpm php53-soap-5.3.3-13.el5_8.x86_64.rpm php53-xml-5.3.3-13.el5_8.x86_64.rpm php53-xmlrpc-5.3.3-13.el5_8.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package

  1. References:

https://www.redhat.com/security/data/cve/CVE-2010-2950.html https://www.redhat.com/security/data/cve/CVE-2011-4153.html https://www.redhat.com/security/data/cve/CVE-2012-0057.html https://www.redhat.com/security/data/cve/CVE-2012-0789.html https://www.redhat.com/security/data/cve/CVE-2012-1172.html https://www.redhat.com/security/data/cve/CVE-2012-2143.html https://www.redhat.com/security/data/cve/CVE-2012-2336.html https://www.redhat.com/security/data/cve/CVE-2012-2386.html https://access.redhat.com/security/updates/classification/#moderate https://rhn.redhat.com/errata/RHSA-2012-0547.html

  1. Contact:

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/

Copyright 2012 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFP6yyDXlSAg2UNWIIRAu2zAKC8ROcChsz1MkTbSM921azTr7x5vACggc8v uQDSWVmKWcYfJwvqolSqJUI= =fzOC -----END PGP SIGNATURE-----

-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . ============================================================================ Ubuntu Security Notice USN-1481-1 June 19, 2012

php5 vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 12.04 LTS
  • Ubuntu 11.10
  • Ubuntu 11.04
  • Ubuntu 10.04 LTS
  • Ubuntu 8.04 LTS

Summary:

Several security issues were fixed in PHP.

Software Description: - php5: HTML-embedded scripting language interpreter

Details:

It was discovered that PHP incorrectly handled certain Tidy::diagnose operations on invalid objects. (CVE-2012-1172)

Rubin Xu and Joseph Bonneau discovered that PHP incorrectly handled certain Unicode characters in passwords passed to the crypt() function. (CVE-2012-2143)

It was discovered that a Debian/Ubuntu specific patch caused PHP to incorrectly handle empty salt strings. This issue only affected Ubuntu 10.04 LTS and Ubuntu 11.04. (CVE-2012-2317)

It was discovered that PHP, when used as a stand alone CGI processor for the Apache Web Server, did not properly parse and filter query strings. Configurations using mod_php5 and FastCGI were not vulnerable. (CVE-2012-2386)

Update instructions:

The problem can be corrected by updating your system to the following package versions:

Ubuntu 12.04 LTS: php5 5.3.10-1ubuntu3.2

Ubuntu 11.10: php5 5.3.6-13ubuntu3.8

Ubuntu 11.04: php5 5.3.5-1ubuntu7.10

Ubuntu 10.04 LTS: php5 5.3.2-1ubuntu4.17

Ubuntu 8.04 LTS: php5 5.2.4-2ubuntu5.25

In general, a standard system update will make all the necessary changes

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201205-0312",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "php",
        "version": "5.3.8"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "php",
        "version": "5.3.10"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "php",
        "version": "5.3.9"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "php",
        "version": "5.4.2"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "php",
        "version": "5.3.7"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "php",
        "version": "5.4.1"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "php",
        "version": "5.3.11"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "php",
        "version": "5.4.0"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "php",
        "version": "5.3.1"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "php",
        "version": "5.3.3"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "php",
        "version": "5.3.6"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "php",
        "version": "5.3.5"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "php",
        "version": "5.3.4"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "php",
        "version": "5.3.2"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "5.2.7"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "5.2.9"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "4.4.4"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "5.0.3"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "4.0.2"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "4.3.11"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "4.4.3"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "3.0"
      },
      {
        "model": "php",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "php",
        "version": "5.3.12"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "4.4.8"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "5.2.2"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "5.0.2"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "3.0.5"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "4.0"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "4.3.6"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "5.1.6"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "5.2.1"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "5.1.4"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "2.0"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "2.0b10"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "4.0.7"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "4.2.2"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "3.0.16"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "4.3.4"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "5.1.5"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "3.0.13"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "5.2.5"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "4.4.5"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "3.0.14"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "3.0.3"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "5.2.11"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "5.1.2"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "3.0.11"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "4.0.5"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "4.4.2"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "5.2.17"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "4.3.0"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "4.3.2"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "4.0.4"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "4.4.9"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "4.0.0"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "3.0.7"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "5.2.16"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "5.1.0"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "5.1.1"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "4.3.5"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "3.0.12"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "4.2.1"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "5.2.6"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "3.0.15"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "4.4.0"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "3.0.8"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "4.0.6"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "4.3.7"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "5.0.5"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "5.2.12"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "4.2.3"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "5.2.0"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "5.0.1"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "3.0.9"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "3.0.6"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "5.2.14"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "4.4.7"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "4.3.8"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "3.0.2"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "5.3.0"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "4.4.6"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "5.0.4"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "5.0.0"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "4.0.1"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "4.3.1"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "1.0"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "5.2.3"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "3.0.17"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "4.3.9"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "3.0.18"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "4.1.0"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "4.3.10"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "4.4.1"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "4.1.2"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "4.1.1"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "5.2.10"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "4.2.0"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "5.1.3"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "4.3.3"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "5.2.13"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "5.2.8"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "5.2.15"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "3.0.1"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "5.2.4"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "4.0.3"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "3.0.10"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "php",
        "version": "3.0.4"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "php",
        "version": "5.3.12"
      },
      {
        "model": "php",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "the php group",
        "version": "5.4.x"
      },
      {
        "model": "php",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "the php group",
        "version": "5.4.3"
      },
      {
        "model": "plesk panel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "parallels",
        "version": "9.5.4"
      },
      {
        "model": "linux i386",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ubuntu",
        "version": "11.10"
      },
      {
        "model": "system management homepage",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "6.2"
      },
      {
        "model": "enterprise linux hpc node optional",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "6"
      },
      {
        "model": "system management homepage",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "7.2"
      },
      {
        "model": "linux arm",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "debian",
        "version": "6.0"
      },
      {
        "model": "linux ia-64",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "debian",
        "version": "6.0"
      },
      {
        "model": "ip office application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "8.1"
      },
      {
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "6.2"
      },
      {
        "model": "voice portal sp1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "5.0"
      },
      {
        "model": "enterprise linux server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "6"
      },
      {
        "model": "linux enterprise sdk sp1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "suse",
        "version": "11"
      },
      {
        "model": "voice portal",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "5.1"
      },
      {
        "model": "linux enterprise server sp3 ltss",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "suse",
        "version": "10"
      },
      {
        "model": "aura application enablement services",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "5.2"
      },
      {
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "5"
      },
      {
        "model": "enterprise linux server eus 6.1.z",
        "scope": null,
        "trust": 0.3,
        "vendor": "redhat",
        "version": null
      },
      {
        "model": "enterprise linux server optional",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "6"
      },
      {
        "model": "enterprise linux long life server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "5.3"
      },
      {
        "model": "appliance server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "turbolinux",
        "version": "3.0"
      },
      {
        "model": "aura application enablement services",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "5.2.3"
      },
      {
        "model": "enterprise server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "mandrakesoft",
        "version": "5"
      },
      {
        "model": "voice portal sp2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "5.0"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.7"
      },
      {
        "model": "ctpview",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "juniper",
        "version": "4.6"
      },
      {
        "model": "aura application enablement services",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "6.1"
      },
      {
        "model": "linux amd64",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ubuntu",
        "version": "11.10"
      },
      {
        "model": "system management homepage",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "7.0"
      },
      {
        "model": "aura application enablement services",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "6.1.1"
      },
      {
        "model": "aura communication manager utility services",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "6.1"
      },
      {
        "model": "linux lts amd64",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ubuntu",
        "version": "8.04"
      },
      {
        "model": "linux mandrake x86 64",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "mandriva",
        "version": "2011"
      },
      {
        "model": "enterprise linux workstation",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "6"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.6.8"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.7.5"
      },
      {
        "model": "linux lts powerpc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ubuntu",
        "version": "8.04"
      },
      {
        "model": "linux amd64",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ubuntu",
        "version": "10.04"
      },
      {
        "model": "ctpview",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "juniper",
        "version": "4.3"
      },
      {
        "model": "aura messaging",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "6.0.1"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.7.3"
      },
      {
        "model": "linux enterprise sdk sp4",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "suse",
        "version": "10"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.7.4"
      },
      {
        "model": "ctpview",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "juniper",
        "version": "4.2"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.8"
      },
      {
        "model": "opensuse",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "s u s e",
        "version": "11.4"
      },
      {
        "model": "linux amd64",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ubuntu",
        "version": "11.04"
      },
      {
        "model": "enterprise linux workstation optional",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "6"
      },
      {
        "model": "voice portal",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "5.1.1"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.8.1"
      },
      {
        "model": "linux i386",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ubuntu",
        "version": "10.04"
      },
      {
        "model": "aura communication manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "6.0"
      },
      {
        "model": "plesk panel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "parallels",
        "version": "9.3"
      },
      {
        "model": "linux lts sparc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ubuntu",
        "version": "8.04"
      },
      {
        "model": "linux sparc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "debian",
        "version": "6.0"
      },
      {
        "model": "ctpview 7.0r1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "juniper",
        "version": null
      },
      {
        "model": "lotus foundations start 1.2.2b",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.7.1"
      },
      {
        "model": "system management homepage",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "6.1"
      },
      {
        "model": "aura messaging",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "6.1"
      },
      {
        "model": "linux lts i386",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ubuntu",
        "version": "8.04"
      },
      {
        "model": "linux i386",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ubuntu",
        "version": "11.04"
      },
      {
        "model": "aura application enablement services",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "5.2.2"
      },
      {
        "model": "enterprise linux eus 5.6.z server",
        "scope": null,
        "trust": 0.3,
        "vendor": "redhat",
        "version": null
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.7.2"
      },
      {
        "model": "system management homepage",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "hp",
        "version": "7.2.1"
      },
      {
        "model": "linux enterprise server sp1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "suse",
        "version": "11"
      },
      {
        "model": "aura session manager sp1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "5.2"
      },
      {
        "model": "linux enterprise server sp4",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "suse",
        "version": "10"
      },
      {
        "model": "ip office application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "6.1"
      },
      {
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "oracle",
        "version": "6"
      },
      {
        "model": "lotus foundations start 1.2.2a",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "mac os",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.7.5"
      },
      {
        "model": "ctpview",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "juniper",
        "version": "4.5"
      },
      {
        "model": "aura application enablement services",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "5.2.1"
      },
      {
        "model": "linux sparc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ubuntu",
        "version": "10.04"
      },
      {
        "model": "enterprise linux desktop optional",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "6"
      },
      {
        "model": "aura communication manager utility services",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "6.0"
      },
      {
        "model": "linux mandrake x86 64",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "mandriva",
        "version": "2010.1"
      },
      {
        "model": "voice portal sp1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "5.1"
      },
      {
        "model": "linux enterprise server sp2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "suse",
        "version": "11"
      },
      {
        "model": "voice portal",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "5.1.2"
      },
      {
        "model": "ip office application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "7.0"
      },
      {
        "model": "linux",
        "scope": null,
        "trust": 0.3,
        "vendor": "gentoo",
        "version": null
      },
      {
        "model": "linux enterprise sdk sp2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "suse",
        "version": "11"
      },
      {
        "model": "linux powerpc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ubuntu",
        "version": "10.04"
      },
      {
        "model": "enterprise linux server optional eus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "6.1"
      },
      {
        "model": "linux lts i386",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ubuntu",
        "version": "12.04"
      },
      {
        "model": "enterprise linux hpc node",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "6"
      },
      {
        "model": "linux amd64",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "debian",
        "version": "6.0"
      },
      {
        "model": "aura communication manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "6.0.1"
      },
      {
        "model": "server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "turbolinux",
        "version": "110"
      },
      {
        "model": "voice portal",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "5.0"
      },
      {
        "model": "aura session manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "5.2"
      },
      {
        "model": "ip office application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "8.0"
      },
      {
        "model": "linux mandrake",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "mandriva",
        "version": "2011"
      },
      {
        "model": "linux lts lpia",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ubuntu",
        "version": "8.04"
      },
      {
        "model": "linux arm",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ubuntu",
        "version": "10.04"
      },
      {
        "model": "linux powerpc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ubuntu",
        "version": "11.04"
      },
      {
        "model": "ctpview",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "juniper",
        "version": "4.4"
      },
      {
        "model": "enterprise linux server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "5"
      },
      {
        "model": "linux lts amd64",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ubuntu",
        "version": "12.04"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.7"
      },
      {
        "model": "linux ia-32",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "debian",
        "version": "6.0"
      },
      {
        "model": "linux mips",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "debian",
        "version": "6.0"
      },
      {
        "model": "linux arm",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ubuntu",
        "version": "11.04"
      },
      {
        "model": "system management homepage",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "6.0"
      },
      {
        "model": "aura messaging",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "6.0"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.6.8"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.7.3"
      },
      {
        "model": "linux enterprise server for vmware sp1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "suse",
        "version": "11"
      },
      {
        "model": "system management homepage",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "7.1.2"
      },
      {
        "model": "mac os",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.8.2"
      },
      {
        "model": "linux enterprise server for vmware sp2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "suse",
        "version": "11"
      },
      {
        "model": "hp-ux b.11.31",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "linux s/390",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "debian",
        "version": "6.0"
      },
      {
        "model": "aura communication manager utility services",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "6.2"
      },
      {
        "model": "appliance server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "turbolinux",
        "version": "3.0x64"
      },
      {
        "model": "enterprise linux desktop workstation client",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "5"
      },
      {
        "model": "plesk panel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "parallels",
        "version": "9.2"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.7.1"
      },
      {
        "model": "linux powerpc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "debian",
        "version": "6.0"
      },
      {
        "model": "client",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "turbolinux",
        "version": "2008"
      },
      {
        "model": "plesk panel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "parallels",
        "version": "8.6"
      },
      {
        "model": "plesk panel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "parallels",
        "version": "9.0"
      },
      {
        "model": "ip office application server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "6.0"
      },
      {
        "model": "system management homepage",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "6.3"
      },
      {
        "model": "lotus foundations start",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "1.2"
      },
      {
        "model": "system management homepage",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "7.1.1"
      },
      {
        "model": "enterprise server x86 64",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "mandrakesoft",
        "version": "5"
      },
      {
        "model": "system management homepage",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "7.1"
      },
      {
        "model": "enterprise linux server eus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "6.0"
      },
      {
        "model": "aura session manager sp2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "5.2"
      },
      {
        "model": "server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "turbolinux",
        "version": "11x64"
      },
      {
        "model": "system management homepage",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "hp",
        "version": "7.1.1"
      },
      {
        "model": "enterprise linux server optional eus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "6.0"
      },
      {
        "model": "opensuse",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "s u s e",
        "version": "12.1"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.7.2"
      },
      {
        "model": "linux mandrake",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "mandriva",
        "version": "2010.1"
      },
      {
        "model": "php",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "php",
        "version": "5.3.13"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "53388"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-002395"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201205-209"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-2336"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:php:php",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-002395"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "De Eindbazen",
    "sources": [
      {
        "db": "BID",
        "id": "53388"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2012-2336",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2012-2336",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2012-2336",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2012-2336",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201205-209",
            "trust": 0.6,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-002395"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201205-209"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-2336"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "sapi/cgi/cgi_main.c in PHP before 5.3.13 and 5.4.x before 5.4.3, when configured as a CGI script (aka php-cgi), does not properly handle query strings that lack an = (equals sign) character, which allows remote attackers to cause a denial of service (resource consumption) by placing command-line options in the query string, related to lack of skipping a certain php_getopt for the \u0027T\u0027 case.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-1823. This vulnerability CVE-2012-1823 Vulnerability due to insufficient fix for.Service operation disruption by placing command line options in query strings by a third party ( Resource consumption ) There is a possibility of being put into a state. PHP is prone to an information-disclosure vulnerability. \nExploiting this issue allows remote attackers to view the source code of files in the context of the server process. This may allow the attacker to obtain sensitive information and to run arbitrary PHP code on the affected computer; other attacks are also possible. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory                           GLSA 201209-03\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n                                            http://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: High\n    Title: PHP: Multiple vulnerabilities\n     Date: September 24, 2012\n     Bugs: #384301, #396311, #396533, #399247, #399567, #399573,\n           #401997, #410957, #414553, #421489, #427354, #429630\n       ID: 201209-03\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities were found in PHP, the worst of which lead to\nremote execution of arbitrary code. \n\nBackground\n==========\n\nPHP is a widely-used general-purpose scripting language that is\nespecially suited for Web development and can be embedded into HTML. \n\nAffected packages\n=================\n\n    -------------------------------------------------------------------\n     Package              /     Vulnerable     /            Unaffected\n    -------------------------------------------------------------------\n  1  dev-lang/php                 \u003c 5.3.15                  \u003e= 5.3.15\n                                  \u003c 5.4.5                    \u003e= 5.4.5\n    -------------------------------------------------------------------\n     # Package 1 only applies to users of these architectures:\n       arm\n\nDescription\n===========\n\nMultiple vulnerabilities have been discovered in PHP. Please review the\nCVE identifiers referenced below for details. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll PHP users should upgrade to the latest version:\n\n  # emerge --sync\n  # emerge --ask --oneshot --verbose \"\u003e=dev-lang/php-5.3.15\"\n\nAll PHP users on ARM should upgrade to the latest version:\n\n  # emerge --sync\n  # emerge --ask --oneshot --verbose \"\u003e=dev-lang/php-5.4.5\"\n\nReferences\n==========\n\n[  1 ] CVE-2011-1398\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1398\n[  2 ] CVE-2011-3379\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3379\n[  3 ] CVE-2011-4566\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4566\n[  4 ] CVE-2011-4885\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4885\n[  5 ] CVE-2012-0057\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0057\n[  6 ] CVE-2012-0788\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0788\n[  7 ] CVE-2012-0789\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0789\n[  8 ] CVE-2012-0830\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0830\n[  9 ] CVE-2012-0831\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0831\n[ 10 ] CVE-2012-1172\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1172\n[ 11 ] CVE-2012-1823\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1823\n[ 12 ] CVE-2012-2143\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2143\n[ 13 ] CVE-2012-2311\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2311\n[ 14 ] CVE-2012-2335\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2335\n[ 15 ] CVE-2012-2336\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2336\n[ 16 ] CVE-2012-2386\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2386\n[ 17 ] CVE-2012-2688\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2688\n[ 18 ] CVE-2012-3365\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3365\n[ 19 ] CVE-2012-3450\n       http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3450\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-201209-03.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2012 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n. Please refer to the following Mandriva\n advisories for further information:\n MDVA-2012:004, MDVSA-2011:165, MDVSA-2011:166, MDVSA-2011:180,\n MDVSA-2011:197, MDVSA-2012:065, MDVSA-2012:068, MDVSA-2012:068-1. \n _______________________________________________________________________\n\n References:\n\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1148\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1657\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1938\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2202\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2483\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3182\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3267\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3268\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3379\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2483\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4566\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4885\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0788\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0807\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0830\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0831\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1172\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1823\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1823\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2335\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2336\n http://www.mandriva.com/security/advisories?name=MDVA-2012:004\n http://www.mandriva.com/security/advisories?name=MDVSA-2011:165\n http://www.mandriva.com/security/advisories?name=MDVSA-2011:166\n http://www.mandriva.com/security/advisories?name=MDVSA-2011:180\n http://www.mandriva.com/security/advisories?name=MDVSA-2011:197\n http://www.mandriva.com/security/advisories?name=MDVSA-2012:065\n http://www.mandriva.com/security/advisories?name=MDVSA-2012:068\n http://www.mandriva.com/security/advisories?name=MDVSA-2012:068-1\n _______________________________________________________________________\n\n Updated Packages:\n\n Mandriva Enterprise Server 5:\n 7361d218b400b6601eef5465f0c132f1  mes5/i586/apache-mod_php-5.3.13-0.1mdvmes5.2.i586.rpm\n 23194f266a0a18c9d49fa7760f6d75f7  mes5/i586/lemon-3.7.4-0.1mdvmes5.2.i586.rpm\n ee51be362aff5c90c587650c52e5d874  mes5/i586/libmbfl1-1.1.0-0.1mdvmes5.2.i586.rpm\n 0cd89098cc20b5ce8acb14d6f6ddc748  mes5/i586/libmbfl-devel-1.1.0-0.1mdvmes5.2.i586.rpm\n dedab7019ea9edfeb929fa521191fe09  mes5/i586/libming1-0.4.4-0.1mdvmes5.2.i586.rpm\n 881df3313a40b7113d0b2c4d39349c4a  mes5/i586/libming-devel-0.4.4-0.1mdvmes5.2.i586.rpm\n a09e59b16f2c4fe4a583b65689f0f308  mes5/i586/libmonetra7-7.0.4-0.1mdvmes5.2.i586.rpm\n 1cdd454b9561c94253a4d885a1f34370  mes5/i586/libmonetra-devel-7.0.4-0.1mdvmes5.2.i586.rpm\n 90dcdd87fb687327fd687e490be5fc7b  mes5/i586/libphp5_common5-5.3.13-0.1mdvmes5.2.i586.rpm\n cc8e259df098747e849797194711dff1  mes5/i586/libsphinxclient0-0.9.9-0.1mdvmes5.2.i586.rpm\n 716d1d5539c4a4eaac5996c70578107d  mes5/i586/libsphinxclient-devel-0.9.9-0.1mdvmes5.2.i586.rpm\n b271fe2d863cb99d46f99a20c0cab5d3  mes5/i586/libstemmer0-0-5.1mdvmes5.2.i586.rpm\n f08df937c8cbc104c32a0b42f77a2b2d  mes5/i586/libstemmer-devel-0-5.1mdvmes5.2.i586.rpm\n fc04b1140795dafb3a280100a34e1698  mes5/i586/libxmlrpc-epi0-0.54-0.1mdvmes5.2.i586.rpm\n ed22bcef35a1b90090a01d5bdf5c2861  mes5/i586/libxmlrpc-epi-devel-0.54-0.1mdvmes5.2.i586.rpm\n 3c70ce8653099b8bede16e1d4b1c854c  mes5/i586/libyaz3-3.0.48-0.1mdvmes5.2.i586.rpm\n d73a3220c42f40c085c1caa3a1797b9a  mes5/i586/libyaz-devel-3.0.48-0.1mdvmes5.2.i586.rpm\n 8cd9158f64b8d1345e47485ab28b8f87  mes5/i586/ming-utils-0.4.4-0.1mdvmes5.2.i586.rpm\n ec6c990e242c299eb3f250a273298534  mes5/i586/perl-SWF-0.4.4-0.1mdvmes5.2.i586.rpm\n c199e39972b4633c025cdb4497f866d5  mes5/i586/php-apc-3.1.10-0.1mdvmes5.2.i586.rpm\n 4d7b2a7efea30875044fa27ab621855f  mes5/i586/php-apc-admin-3.1.10-0.1mdvmes5.2.i586.rpm\n b86186ed13e27f5dde58b58e799f9145  mes5/i586/php-bcmath-5.3.13-0.1mdvmes5.2.i586.rpm\n 364fb5e17d6f35aeb212e374f8408236  mes5/i586/php-bz2-5.3.13-0.1mdvmes5.2.i586.rpm\n 64367f635bddcdb8f799f30bd56db615  mes5/i586/php-calendar-5.3.13-0.1mdvmes5.2.i586.rpm\n 040288301616bfb16436f2e5a341ff9f  mes5/i586/php-cgi-5.3.13-0.1mdvmes5.2.i586.rpm\n 3c265959950263674c5017eda963117e  mes5/i586/php-cli-5.3.13-0.1mdvmes5.2.i586.rpm\n 42876a7aead3c2ba20de3b237502d317  mes5/i586/php-ctype-5.3.13-0.1mdvmes5.2.i586.rpm\n 9ae84a482bced4724fc5b2719a5f7e74  mes5/i586/php-curl-5.3.13-0.1mdvmes5.2.i586.rpm\n fb39ca8bc9b3e70dca9eabeb43f1b5a3  mes5/i586/php-dba-5.3.13-0.1mdvmes5.2.i586.rpm\n eb9cd33f04b6b8ce9631dbee6ffdfa1c  mes5/i586/php-dbx-1.1.0-30.2mdvmes5.2.i586.rpm\n 4a289a7a64702fc7bf9167125f172274  mes5/i586/php-devel-5.3.13-0.1mdvmes5.2.i586.rpm\n fc09a56f707392c32ef3aeec9a1bb242  mes5/i586/php-dio-0.0.5-0.1mdvmes5.2.i586.rpm\n 521e2447d98a8d37aa7fb2fa35787ef2  mes5/i586/php-doc-5.3.13-0.1mdvmes5.2.i586.rpm\n 6e0fed6e1c0b5ee5a11645e4956d345c  mes5/i586/php-dom-5.3.13-0.1mdvmes5.2.i586.rpm\n 5e9298f4d04acef2d164c52697e911eb  mes5/i586/php-eaccelerator-0.9.6.1-0.6mdvmes5.2.i586.rpm\n 688d1e19c4955521d7a217bd64b1a3aa  mes5/i586/php-eaccelerator-admin-0.9.6.1-0.6mdvmes5.2.i586.rpm\n c7ba6857a141dbac85afa4f05cdb65ca  mes5/i586/php-enchant-5.3.13-0.1mdvmes5.2.i586.rpm\n 0c179177f51deb368800f0c08cedc599  mes5/i586/php-exif-5.3.13-0.1mdvmes5.2.i586.rpm\n 39f6318d1367c28e8c0365098e7750e4  mes5/i586/php-fam-5.0.1-3.6mdvmes5.2.i586.rpm\n 1ef9b6263948c34f46b5fd29321d911c  mes5/i586/php-fileinfo-5.3.13-0.1mdvmes5.2.i586.rpm\n aad86d693bbe62bba0942b370f6ca246  mes5/i586/php-filepro-5.1.6-13.6mdvmes5.2.i586.rpm\n 3868021d3e61c00b8ae6809bb7c0900b  mes5/i586/php-filter-5.3.13-0.1mdvmes5.2.i586.rpm\n 48b88e31e42379400dc7766ad2c62e5a  mes5/i586/php-fpm-5.3.13-0.1mdvmes5.2.i586.rpm\n f8cd704030d7d70ea8ebe8346f9f0e0f  mes5/i586/php-ftp-5.3.13-0.1mdvmes5.2.i586.rpm\n 7c32f002b04ac8072df7aa7fa8b7a8e6  mes5/i586/php-gd-5.3.13-0.1mdvmes5.2.i586.rpm\n df5a2a2b26101a778494b26af67766a2  mes5/i586/php-gettext-5.3.13-0.1mdvmes5.2.i586.rpm\n 8327f44ffa0b41841ff9b71039017d52  mes5/i586/php-gmp-5.3.13-0.1mdvmes5.2.i586.rpm\n 811259cfad20fd63253a7123b7fd27dc  mes5/i586/php-gtk2-2.0.1-2.2mdvmes5.2.i586.rpm\n be58ace4d69b596b57afd068f7cf3c49  mes5/i586/php-hash-5.3.13-0.1mdvmes5.2.i586.rpm\n a17c44ceea8b3f5a0bc55a3af3474af3  mes5/i586/php-iconv-5.3.13-0.1mdvmes5.2.i586.rpm\n c89f28160eaf77c3655965bfbed6c3b1  mes5/i586/php-imagick-3.0.1-0.2mdvmes5.2.i586.rpm\n 73fa2e549e58fd68ad8a9109c77a7369  mes5/i586/php-imap-5.3.13-0.1mdvmes5.2.i586.rpm\n b3c413082301b0a8f4a25f176a87a45e  mes5/i586/php-ini-5.3.13-0.1mdvmes5.2.i586.rpm\n 6c775dd0ca5396b0ebb70e602db834b6  mes5/i586/php-intl-5.3.13-0.1mdvmes5.2.i586.rpm\n 5902f72d9bc4f0c025618cd49e5f8e79  mes5/i586/php-json-5.3.13-0.1mdvmes5.2.i586.rpm\n 877dc6caffd8bbe76c654ac4a9d18daa  mes5/i586/php-ldap-5.3.13-0.1mdvmes5.2.i586.rpm\n abe1393ef623af8944406dadd8064c89  mes5/i586/php-mailparse-2.1.6-0.1mdvmes5.2.i586.rpm\n 0f498f237e44a451224929ecd24b315c  mes5/i586/php-mbstring-5.3.13-0.1mdvmes5.2.i586.rpm\n 35eceb3b8e39847fa00a91409afe9407  mes5/i586/php-mcal-0.6-23.6mdvmes5.2.i586.rpm\n 385e71ffb5612c05a701ed557e556c62  mes5/i586/php-mcrypt-5.3.13-0.1mdvmes5.2.i586.rpm\n 18e3385588deda52c3516375d6d803d0  mes5/i586/php-mcve-7.0.3-0.2mdvmes5.2.i586.rpm\n daf72900f0a90864046a67a2d71e6caa  mes5/i586/php-mdbtools-1.0.0-4.2mdvmes5.2.i586.rpm\n d0905f31f721643a572bf6b005262bf6  mes5/i586/php-memcache-3.0.6-0.2mdvmes5.2.i586.rpm\n 6b5378f95fb1022c83d34c9db1422d8e  mes5/i586/php-ming-5.2.10-0.2mdvmes5.2.i586.rpm\n 8e6e4f7017a0febfef7cdf155ecc4962  mes5/i586/php-mssql-5.3.13-0.1mdvmes5.2.i586.rpm\n 0411daf7561b179eb5a8e484d36f4ad3  mes5/i586/php-mysql-5.3.13-0.1mdvmes5.2.i586.rpm\n ff31716a2c412fba2e9d013c56965cf7  mes5/i586/php-mysqli-5.3.13-0.1mdvmes5.2.i586.rpm\n 993a888b1c2713a00565e45282b23148  mes5/i586/php-mysqlnd-5.3.13-0.1mdvmes5.2.i586.rpm\n 08fbe9fae6d67c0637041c80f07eba12  mes5/i586/php-odbc-5.3.13-0.1mdvmes5.2.i586.rpm\n 7a29e566a7751e1821a623a4f0018a6f  mes5/i586/php-openssl-5.3.13-0.1mdvmes5.2.i586.rpm\n f441f06ada4ee980d501e2b6576f2806  mes5/i586/php-optimizer-0.1-0.alpha2.0.2mdvmes5.2.i586.rpm\n b8da69bd634b1daa981efbc2ed95a648  mes5/i586/php-pcntl-5.3.13-0.1mdvmes5.2.i586.rpm\n 95089b116c79922e497d4fd7854df544  mes5/i586/php-pdo-5.3.13-0.1mdvmes5.2.i586.rpm\n 2f2196f900c6b802cf7fea375c9eeb91  mes5/i586/php-pdo_dblib-5.3.13-0.1mdvmes5.2.i586.rpm\n 25c438a18c01c09b60e7c7b2fe13671f  mes5/i586/php-pdo_mysql-5.3.13-0.1mdvmes5.2.i586.rpm\n 91f1fee5243ed4ae8398a75e9114adac  mes5/i586/php-pdo_odbc-5.3.13-0.1mdvmes5.2.i586.rpm\n bfff4547a91207f42302cd9fc184f86f  mes5/i586/php-pdo_pgsql-5.3.13-0.1mdvmes5.2.i586.rpm\n 8d460754542459d816d1b3dff39c872b  mes5/i586/php-pdo_sqlite-5.3.13-0.1mdvmes5.2.i586.rpm\n 9ff947c66182403b9888b265832c9161  mes5/i586/php-perl-1.0.0-32.2mdvmes5.2.i586.rpm\n cb1bca793338e4e792ab6c8792293617  mes5/i586/php-pgsql-5.3.13-0.1mdvmes5.2.i586.rpm\n 1ef789ec5d683fef4934fc57101456b1  mes5/i586/php-phar-5.3.13-0.1mdvmes5.2.i586.rpm\n 52145842d6faa93fa073fa17cb3b0763  mes5/i586/php-posix-5.3.13-0.1mdvmes5.2.i586.rpm\n aed79d1522b7507df309ddd682a99b4d  mes5/i586/php-pspell-5.3.13-0.1mdvmes5.2.i586.rpm\n 7cf0cf423041e29370ec6df0da70d21e  mes5/i586/php-radius-1.2.5-7.2mdvmes5.2.i586.rpm\n f53c0be9c38ddf42a8c6820a312eaa06  mes5/i586/php-readline-5.3.13-0.1mdvmes5.2.i586.rpm\n 29ee9c49f78cb11e83f9a251bd02b7e9  mes5/i586/php-recode-5.3.13-0.1mdvmes5.2.i586.rpm\n 2c8c33fd81fc8468d0ddb774c2814264  mes5/i586/php-sasl-0.1.0-21.6mdvmes5.2.i586.rpm\n 8c2471fa96a43e94edabd4b9668724ef  mes5/i586/php-session-5.3.13-0.1mdvmes5.2.i586.rpm\n 3ca8b754f64883be1924fa8e95e799d3  mes5/i586/php-shmop-5.3.13-0.1mdvmes5.2.i586.rpm\n faa1b493b705f393754abcc2174857b5  mes5/i586/php-snmp-5.3.13-0.1mdvmes5.2.i586.rpm\n c393eb8db265798b1beff2541d13ee25  mes5/i586/php-soap-5.3.13-0.1mdvmes5.2.i586.rpm\n c23958451e7f49cb90e18f0d58fde045  mes5/i586/php-sockets-5.3.13-0.1mdvmes5.2.i586.rpm\n 419a7ecf0f1d44a08795cc21c88f3b17  mes5/i586/php-sphinx-1.2.0-0.1mdvmes5.2.i586.rpm\n b42c41d30364c4bb308146ab5087fabf  mes5/i586/php-sqlite3-5.3.13-0.1mdvmes5.2.i586.rpm\n 6e9609d6fd4724426a63e3e520341051  mes5/i586/php-sqlite-5.3.13-0.1mdvmes5.2.i586.rpm\n e0b0e03c3ba4746805a70f3749784af7  mes5/i586/php-ssh2-0.11.3-0.1mdvmes5.2.i586.rpm\n f3be55d6857f3c36f063a418ff780c01  mes5/i586/php-suhosin-0.9.33-0.1mdvmes5.2.i586.rpm\n 49ab75a66171482bc0c92da727b42790  mes5/i586/php-sybase_ct-5.3.13-0.1mdvmes5.2.i586.rpm\n a49fe633e4d2eb4acb1fcd9ded4afff6  mes5/i586/php-sysvmsg-5.3.13-0.1mdvmes5.2.i586.rpm\n e548f18c2ccd5522376387fb9895e605  mes5/i586/php-sysvsem-5.3.13-0.1mdvmes5.2.i586.rpm\n 079ffcc8e9bbcf02d70b39aed0e37510  mes5/i586/php-sysvshm-5.3.13-0.1mdvmes5.2.i586.rpm\n a0bfac8555bfaefec8cdab4a8fe8f759  mes5/i586/php-tclink-3.4.5-0.2mdvmes5.2.i586.rpm\n c3bb9c496c70fa477b65a326f10f1f13  mes5/i586/php-tidy-5.3.13-0.1mdvmes5.2.i586.rpm\n 92fa5b22a77b38c94e1e81cee27e94e5  mes5/i586/php-timezonedb-2012.3-0.1mdvmes5.2.i586.rpm\n c69e34969e6be01c229701cb3bd381f3  mes5/i586/php-tokenizer-5.3.13-0.1mdvmes5.2.i586.rpm\n 86d0fa4af4c00f2a996ee86c7480eaec  mes5/i586/php-translit-0.6.1-0.1mdvmes5.2.i586.rpm\n 11aa119fde6b2c43e93259784d78b72a  mes5/i586/php-vld-0.11.1-0.1mdvmes5.2.i586.rpm\n f48532222388b41b6f5abbeffa704cf9  mes5/i586/php-wddx-5.3.13-0.1mdvmes5.2.i586.rpm\n 1770351942d2fb1c5685afe0609d22ea  mes5/i586/php-xattr-1.1.0-2.6mdvmes5.2.i586.rpm\n 09300dd1170f00c70d05a21017d05448  mes5/i586/php-xcache-1.3.2-0.1mdvmes5.2.i586.rpm\n 508c5edb557c8bc20d7084b314278944  mes5/i586/php-xcache-admin-1.3.2-0.1mdvmes5.2.i586.rpm\n 41e91f88a9fdaf1fa0420ae01dc46ade  mes5/i586/php-xdebug-2.1.4-0.1mdvmes5.2.i586.rpm\n c8d6da8bdb753cf7a2a6db3d3e2e46bf  mes5/i586/php-xml-5.3.13-0.1mdvmes5.2.i586.rpm\n 50aed2d093b83fdaa77dc407da9b861a  mes5/i586/php-xmlreader-5.3.13-0.1mdvmes5.2.i586.rpm\n fe32252d37699afb0c51f60f9722adcb  mes5/i586/php-xmlrpc-5.3.13-0.1mdvmes5.2.i586.rpm\n a1a2181cb93d31acf2c6b6e246b9db0d  mes5/i586/php-xmlwriter-5.3.13-0.1mdvmes5.2.i586.rpm\n f87097cce5a501146df0e7120211c4bd  mes5/i586/php-xsl-5.3.13-0.1mdvmes5.2.i586.rpm\n 9d5c99b04a85caea9bce01f4c662372c  mes5/i586/php-yaz-1.1.1-0.1mdvmes5.2.i586.rpm\n d38eb4445d09878793e8506f1b649236  mes5/i586/php-zip-5.3.13-0.1mdvmes5.2.i586.rpm\n ec0cbe2b90c8fb0db9939d10e62fef02  mes5/i586/php-zlib-5.3.13-0.1mdvmes5.2.i586.rpm\n e2fe6c46edade8b149063316fb6e9268  mes5/i586/python-SWF-0.4.4-0.1mdvmes5.2.i586.rpm\n aef4719c148c3f6edf549f236a08868e  mes5/i586/sphinx-0.9.9-0.1mdvmes5.2.i586.rpm\n 48b1928235704dd977b9fdc25f1e2933  mes5/i586/stemwords-0-5.1mdvmes5.2.i586.rpm\n 1b7636ca4c1ec6eac492041c6e9c95e2  mes5/i586/yaz-3.0.48-0.1mdvmes5.2.i586.rpm \n 2bac0388ad669fc836a910cb6919733e  mes5/SRPMS/apache-mod_php-5.3.13-0.1mdvmes5.2.src.rpm\n 0dd8c597a6a39e17b504408fa4f894d1  mes5/SRPMS/lemon-3.7.4-0.1mdvmes5.2.src.rpm\n 04a50458044ddef8dca4acbecd0555d1  mes5/SRPMS/libmbfl-1.1.0-0.1mdvmes5.2.src.rpm\n d9e473396af964f01dd6310844925396  mes5/SRPMS/libmonetra-7.0.4-0.1mdvmes5.2.src.rpm\n 0fafe53fccc11afa4b75c66dc49261cd  mes5/SRPMS/libstemmer-0-5.1mdvmes5.2.src.rpm\n 6de1878b7ff4fbc0b63e381618e966ba  mes5/SRPMS/ming-0.4.4-0.1mdvmes5.2.src.rpm\n c4041cade9aaf6c4c67f046e4bfbaa74  mes5/SRPMS/php-5.3.13-0.1mdvmes5.2.src.rpm\n c0a1c69bca172f69a034505cfd6b37fc  mes5/SRPMS/php-apc-3.1.10-0.1mdvmes5.2.src.rpm\n df8c3520a450cb4209179f60cf8828cd  mes5/SRPMS/php-dbx-1.1.0-30.2mdvmes5.2.src.rpm\n 7705d28806c6a73a9e588d174203ec11  mes5/SRPMS/php-dio-0.0.5-0.1mdvmes5.2.src.rpm\n cb9fd58d04a1db3ceec2f9b15c5ddac0  mes5/SRPMS/php-eaccelerator-0.9.6.1-0.6mdvmes5.2.src.rpm\n d1e7c7da449372f62c27a0cd3eeb8a8d  mes5/SRPMS/php-fam-5.0.1-3.6mdvmes5.2.src.rpm\n 4c10d297abc9ea2a4dfe2cc441be619c  mes5/SRPMS/php-filepro-5.1.6-13.6mdvmes5.2.src.rpm\n 7c30fe50ac1dc23870c64660300e78f8  mes5/SRPMS/php-gtk2-2.0.1-2.2mdvmes5.2.src.rpm\n ecdbedc8c745921ab7e8c97850c7e976  mes5/SRPMS/php-imagick-3.0.1-0.2mdvmes5.2.src.rpm\n c31069ae710a67783a81adf905f72842  mes5/SRPMS/php-ini-5.3.13-0.1mdvmes5.2.src.rpm\n 7bba5d67278539bbfe8980f4619fc443  mes5/SRPMS/php-mailparse-2.1.6-0.1mdvmes5.2.src.rpm\n c064fa5008b99634cf43dd8cfcfc38a8  mes5/SRPMS/php-mcal-0.6-23.6mdvmes5.2.src.rpm\n 4dc1c969e13503b5b84e4cc2a62fcafa  mes5/SRPMS/php-mcve-7.0.3-0.2mdvmes5.2.src.rpm\n 8a0b00a7eb45735c7f1b84db2124a02a  mes5/SRPMS/php-mdbtools-1.0.0-4.2mdvmes5.2.src.rpm\n 50514e567296ef853fc9c040b27fde14  mes5/SRPMS/php-memcache-3.0.6-0.2mdvmes5.2.src.rpm\n 3d68803bc8d4d5db837d034e31b559ab  mes5/SRPMS/php-ming-5.2.10-0.2mdvmes5.2.src.rpm\n 3788a033464659c7697271fe3e11cb6b  mes5/SRPMS/php-optimizer-0.1-0.alpha2.0.2mdvmes5.2.src.rpm\n 4e41590da9fd097f6ecb0cf362bf99f9  mes5/SRPMS/php-perl-1.0.0-32.2mdvmes5.2.src.rpm\n 8227db814a6322c4a1c72717965be834  mes5/SRPMS/php-radius-1.2.5-7.2mdvmes5.2.src.rpm\n b6eea216f82a274151c12bb38e50793c  mes5/SRPMS/php-sasl-0.1.0-21.6mdvmes5.2.src.rpm\n aefb4d8a934bd9ecf18f10cf94508b21  mes5/SRPMS/php-sphinx-1.2.0-0.1mdvmes5.2.src.rpm\n 27acc20ae9792b5ee79127428c76d019  mes5/SRPMS/php-ssh2-0.11.3-0.1mdvmes5.2.src.rpm\n 8561139b4f53146b52d0d881c93bd884  mes5/SRPMS/php-suhosin-0.9.33-0.1mdvmes5.2.src.rpm\n 9decd2138202b8f51428b69f8d089679  mes5/SRPMS/php-tclink-3.4.5-0.2mdvmes5.2.src.rpm\n a331ac0e06665fb2b1696eeb35ddd67b  mes5/SRPMS/php-timezonedb-2012.3-0.1mdvmes5.2.src.rpm\n 79c414525991c894f01d9e597cda78f6  mes5/SRPMS/php-translit-0.6.1-0.1mdvmes5.2.src.rpm\n 93897f5b7d60138c9e12474dc8388954  mes5/SRPMS/php-vld-0.11.1-0.1mdvmes5.2.src.rpm\n 9f2b8c72495c63762e02a4792b321463  mes5/SRPMS/php-xattr-1.1.0-2.6mdvmes5.2.src.rpm\n bec964b1764e87c0ba2d78ec3c33f662  mes5/SRPMS/php-xcache-1.3.2-0.1mdvmes5.2.src.rpm\n 6e3b637199e13bd895401f2cadbf25c5  mes5/SRPMS/php-xdebug-2.1.4-0.1mdvmes5.2.src.rpm\n 7b1f065bc086533fa01adba07235c4fe  mes5/SRPMS/php-yaz-1.1.1-0.1mdvmes5.2.src.rpm\n 51586ceaba69e3a61e4171c1b33821ad  mes5/SRPMS/sphinx-0.9.9-0.1mdvmes5.2.src.rpm\n fb8632c3872b5f62b8fdc070565d21b6  mes5/SRPMS/xmlrpc-epi-0.54-0.1mdvmes5.2.src.rpm\n 7737d7193bce052e26930d49ee7e841f  mes5/SRPMS/yaz-3.0.48-0.1mdvmes5.2.src.rpm\n\n Mandriva Enterprise Server 5/X86_64:\n 96b2d5df095de56795b5e402b5615e5a  mes5/x86_64/apache-mod_php-5.3.13-0.1mdvmes5.2.x86_64.rpm\n 03641ff5a502b304b0cbdeff4161f07a  mes5/x86_64/lemon-3.7.4-0.1mdvmes5.2.x86_64.rpm\n 16d5aee91aab749c674b146725679edf  mes5/x86_64/lib64mbfl1-1.1.0-0.1mdvmes5.2.x86_64.rpm\n 211cf3c8c54d7135c1c59d37df63dbd9  mes5/x86_64/lib64mbfl-devel-1.1.0-0.1mdvmes5.2.x86_64.rpm\n ff17fd8f9ad24289e558636ce26d6e17  mes5/x86_64/lib64ming1-0.4.4-0.1mdvmes5.2.x86_64.rpm\n 84acf50087747dcb4f34a5aa2ea1ce0a  mes5/x86_64/lib64ming-devel-0.4.4-0.1mdvmes5.2.x86_64.rpm\n db2510f25a007023647f235013ec6e74  mes5/x86_64/lib64monetra7-7.0.4-0.1mdvmes5.2.x86_64.rpm\n e449abc214208571c14827a9319c0ec3  mes5/x86_64/lib64monetra-devel-7.0.4-0.1mdvmes5.2.x86_64.rpm\n 7a418a728839573bca2187e8c5468fe2  mes5/x86_64/lib64php5_common5-5.3.13-0.1mdvmes5.2.x86_64.rpm\n 4060a9ea3f85ea3df9260575783e7a17  mes5/x86_64/lib64sphinxclient0-0.9.9-0.1mdvmes5.2.x86_64.rpm\n f6ca93737988ebae403ef0ed8ab41359  mes5/x86_64/lib64sphinxclient-devel-0.9.9-0.1mdvmes5.2.x86_64.rpm\n 4a7ef9bd46d3c4e8e36f08868319244d  mes5/x86_64/lib64stemmer0-0-5.1mdvmes5.2.x86_64.rpm\n b15fe53cc1c6ea59fdd82c04eae8e7fd  mes5/x86_64/lib64stemmer-devel-0-5.1mdvmes5.2.x86_64.rpm\n c673964b2561e44781a98cb86a9e3187  mes5/x86_64/lib64xmlrpc-epi0-0.54-0.1mdvmes5.2.x86_64.rpm\n e66b903dc4310d0d3849689529146ec3  mes5/x86_64/lib64xmlrpc-epi-devel-0.54-0.1mdvmes5.2.x86_64.rpm\n 49cbe05c0d48ad378bd129ebd036ba26  mes5/x86_64/lib64yaz3-3.0.48-0.1mdvmes5.2.x86_64.rpm\n 2afb044886e1c96c3db29bdf0bb7dc9b  mes5/x86_64/lib64yaz-devel-3.0.48-0.1mdvmes5.2.x86_64.rpm\n 2f4b0caff3c9e97839df3aa1ad6ca732  mes5/x86_64/ming-utils-0.4.4-0.1mdvmes5.2.x86_64.rpm\n f288571bd192a5e5802a40cd7d4e3118  mes5/x86_64/perl-SWF-0.4.4-0.1mdvmes5.2.x86_64.rpm\n b059dbc18e76476659494969ef5e4947  mes5/x86_64/php-apc-3.1.10-0.1mdvmes5.2.x86_64.rpm\n 68149e7e29a2e2ea3f7d7e3573bd193b  mes5/x86_64/php-apc-admin-3.1.10-0.1mdvmes5.2.x86_64.rpm\n e38d895cf490704f5e6f8b1ecdca7e61  mes5/x86_64/php-bcmath-5.3.13-0.1mdvmes5.2.x86_64.rpm\n 711815bad3794350d9177d52bac8d95b  mes5/x86_64/php-bz2-5.3.13-0.1mdvmes5.2.x86_64.rpm\n 3e8c4f72f0211a797a172c7092966a46  mes5/x86_64/php-calendar-5.3.13-0.1mdvmes5.2.x86_64.rpm\n 51026f5c6c789d4fe07bb64f5c2a4559  mes5/x86_64/php-cgi-5.3.13-0.1mdvmes5.2.x86_64.rpm\n a5c4c236c80e4219e0a8e29eac78b440  mes5/x86_64/php-cli-5.3.13-0.1mdvmes5.2.x86_64.rpm\n f7d68cdc91a5d1aca630bf5d2cc027a8  mes5/x86_64/php-ctype-5.3.13-0.1mdvmes5.2.x86_64.rpm\n 1e82cf4c1d05409239f773c27f25e148  mes5/x86_64/php-curl-5.3.13-0.1mdvmes5.2.x86_64.rpm\n 4414697431b4f9d8347d368406a74792  mes5/x86_64/php-dba-5.3.13-0.1mdvmes5.2.x86_64.rpm\n 78a159ea14c942e6b1484d7f7a02430f  mes5/x86_64/php-dbx-1.1.0-30.2mdvmes5.2.x86_64.rpm\n afce38f700de1511605177aaac2a4b0c  mes5/x86_64/php-devel-5.3.13-0.1mdvmes5.2.x86_64.rpm\n 24c2440bccc5cdceb6d9c6eb6fbd8fb6  mes5/x86_64/php-dio-0.0.5-0.1mdvmes5.2.x86_64.rpm\n e304390a900576e6344b831935fca984  mes5/x86_64/php-doc-5.3.13-0.1mdvmes5.2.x86_64.rpm\n 41d2f61596375aa03dcd64462432b8ad  mes5/x86_64/php-dom-5.3.13-0.1mdvmes5.2.x86_64.rpm\n 84eead8c2a272ed05ef0a8f3b6672f56  mes5/x86_64/php-eaccelerator-0.9.6.1-0.6mdvmes5.2.x86_64.rpm\n d72cfcdee8d186ad859b3b99fd70bdd0  mes5/x86_64/php-eaccelerator-admin-0.9.6.1-0.6mdvmes5.2.x86_64.rpm\n e3b9b291bbc15d61895e27372b8b1925  mes5/x86_64/php-enchant-5.3.13-0.1mdvmes5.2.x86_64.rpm\n 558cd9c98631858a661a6aa4ccdf882b  mes5/x86_64/php-exif-5.3.13-0.1mdvmes5.2.x86_64.rpm\n 3553939609e3fef1652ee999d37fd530  mes5/x86_64/php-fam-5.0.1-3.6mdvmes5.2.x86_64.rpm\n 5a19e0b3fc58299ccdb1b12f5ca69200  mes5/x86_64/php-fileinfo-5.3.13-0.1mdvmes5.2.x86_64.rpm\n 8a23bbc3e8c9ef45a339563075668d59  mes5/x86_64/php-filepro-5.1.6-13.6mdvmes5.2.x86_64.rpm\n 78be28f1fee69306797aa83a91bee75b  mes5/x86_64/php-filter-5.3.13-0.1mdvmes5.2.x86_64.rpm\n f8339f10b4664c2130f1159f89c0b244  mes5/x86_64/php-fpm-5.3.13-0.1mdvmes5.2.x86_64.rpm\n d3b287afef7b1f6207082e97ae77b349  mes5/x86_64/php-ftp-5.3.13-0.1mdvmes5.2.x86_64.rpm\n 98f68dcc439e4252d72be221fe1e9b98  mes5/x86_64/php-gd-5.3.13-0.1mdvmes5.2.x86_64.rpm\n 0d04cfba60b215c27a87d77a363a51e9  mes5/x86_64/php-gettext-5.3.13-0.1mdvmes5.2.x86_64.rpm\n f95a838116143b396aedeeb01c534584  mes5/x86_64/php-gmp-5.3.13-0.1mdvmes5.2.x86_64.rpm\n e84018d144e7f94e436132420d51440d  mes5/x86_64/php-gtk2-2.0.1-2.2mdvmes5.2.x86_64.rpm\n 7e02ce03f990c677fd39095d094bf5fc  mes5/x86_64/php-hash-5.3.13-0.1mdvmes5.2.x86_64.rpm\n 9e3ae7e6d67397fc15a81d3b3e7d30c8  mes5/x86_64/php-iconv-5.3.13-0.1mdvmes5.2.x86_64.rpm\n 76155d4adcfb84852c193a6a9183a701  mes5/x86_64/php-imagick-3.0.1-0.2mdvmes5.2.x86_64.rpm\n 6c1aa64a78fef0ba6b12de5c7fdf227e  mes5/x86_64/php-imap-5.3.13-0.1mdvmes5.2.x86_64.rpm\n e9dbcfb8b6330f52ea6f83630e0b96db  mes5/x86_64/php-ini-5.3.13-0.1mdvmes5.2.x86_64.rpm\n a99ae1adc279e1446501374b396e9194  mes5/x86_64/php-intl-5.3.13-0.1mdvmes5.2.x86_64.rpm\n c4856a889eb1fabe4cfb4e7e0541a208  mes5/x86_64/php-json-5.3.13-0.1mdvmes5.2.x86_64.rpm\n 1e6ed1c6f514d3bed9271e192d6b8c79  mes5/x86_64/php-ldap-5.3.13-0.1mdvmes5.2.x86_64.rpm\n 23d141eeb5ec49b7bd14931e313efe61  mes5/x86_64/php-mailparse-2.1.6-0.1mdvmes5.2.x86_64.rpm\n 67df3a26f6e25258bb28b9d70ebdc7b9  mes5/x86_64/php-mbstring-5.3.13-0.1mdvmes5.2.x86_64.rpm\n ce6ec0bd9bf2c6bbea51b670566cf125  mes5/x86_64/php-mcal-0.6-23.6mdvmes5.2.x86_64.rpm\n 3af3a06df5a30d2324b42ce38b0170c7  mes5/x86_64/php-mcrypt-5.3.13-0.1mdvmes5.2.x86_64.rpm\n 898c0ff97086e4003f34c5af21a1209b  mes5/x86_64/php-mcve-7.0.3-0.2mdvmes5.2.x86_64.rpm\n ea3c678599dd676b1596cf9b38bac5fa  mes5/x86_64/php-mdbtools-1.0.0-4.2mdvmes5.2.x86_64.rpm\n f42a0499caae118ccb02a404fe853e8d  mes5/x86_64/php-memcache-3.0.6-0.2mdvmes5.2.x86_64.rpm\n d656bf501e02bf270c74e621655e0f79  mes5/x86_64/php-ming-5.2.10-0.2mdvmes5.2.x86_64.rpm\n 67182e137d6799e21d1eb95f8e8a09a6  mes5/x86_64/php-mssql-5.3.13-0.1mdvmes5.2.x86_64.rpm\n 13b16b807e73dc799f820ec360b4c4c4  mes5/x86_64/php-mysql-5.3.13-0.1mdvmes5.2.x86_64.rpm\n 401bf41f8ae42e1c5cbae844b5859310  mes5/x86_64/php-mysqli-5.3.13-0.1mdvmes5.2.x86_64.rpm\n a3d71aca0b59a479be67aa5f7e2dadac  mes5/x86_64/php-mysqlnd-5.3.13-0.1mdvmes5.2.x86_64.rpm\n 299a5af759216cc02b72c73e1aedb898  mes5/x86_64/php-odbc-5.3.13-0.1mdvmes5.2.x86_64.rpm\n 1b9afd33db663c3c0376e9e366a1d7e9  mes5/x86_64/php-openssl-5.3.13-0.1mdvmes5.2.x86_64.rpm\n 1bfa8188adf02eefd1fee6980bf8a637  mes5/x86_64/php-optimizer-0.1-0.alpha2.0.2mdvmes5.2.x86_64.rpm\n 4ea6deefc1d6c98165a39bf0cbbb1e68  mes5/x86_64/php-pcntl-5.3.13-0.1mdvmes5.2.x86_64.rpm\n e8edc47c4535c7185c648fe2cdd62fd3  mes5/x86_64/php-pdo-5.3.13-0.1mdvmes5.2.x86_64.rpm\n 7de9187f26e2b1dcbde7bfa6b5e72cc3  mes5/x86_64/php-pdo_dblib-5.3.13-0.1mdvmes5.2.x86_64.rpm\n 43c1dabc4e916f1676a64affa4e71923  mes5/x86_64/php-pdo_mysql-5.3.13-0.1mdvmes5.2.x86_64.rpm\n 90e7bb6c5edceae816e1efc1d772c1cd  mes5/x86_64/php-pdo_odbc-5.3.13-0.1mdvmes5.2.x86_64.rpm\n 41c159cea72f2c8608422dd60b24a2aa  mes5/x86_64/php-pdo_pgsql-5.3.13-0.1mdvmes5.2.x86_64.rpm\n 3b806d521833732f44d199760894e6cc  mes5/x86_64/php-pdo_sqlite-5.3.13-0.1mdvmes5.2.x86_64.rpm\n e3047e894435230a2234b6c106e7f85b  mes5/x86_64/php-perl-1.0.0-32.2mdvmes5.2.x86_64.rpm\n 13e2506c835e395eb7f81edac6b61a8f  mes5/x86_64/php-pgsql-5.3.13-0.1mdvmes5.2.x86_64.rpm\n dab84434950d74f298b66066fc5d22b2  mes5/x86_64/php-phar-5.3.13-0.1mdvmes5.2.x86_64.rpm\n c087bf52f652c59da6bdd4fb06286464  mes5/x86_64/php-posix-5.3.13-0.1mdvmes5.2.x86_64.rpm\n 29d9820c941b281ec4bf2e1ae154b590  mes5/x86_64/php-pspell-5.3.13-0.1mdvmes5.2.x86_64.rpm\n 2a5472038518e78b1e77c085486a7f41  mes5/x86_64/php-radius-1.2.5-7.2mdvmes5.2.x86_64.rpm\n ef96d7846f36e03abbe0389a9c7025a6  mes5/x86_64/php-readline-5.3.13-0.1mdvmes5.2.x86_64.rpm\n 3d6dc5bbe9f83a3b7379b09842418d6d  mes5/x86_64/php-recode-5.3.13-0.1mdvmes5.2.x86_64.rpm\n fe9478b8ef31ffd03c4fd7e3b13a6fcd  mes5/x86_64/php-sasl-0.1.0-21.6mdvmes5.2.x86_64.rpm\n 66ea22c633fb484f787795c541c31458  mes5/x86_64/php-session-5.3.13-0.1mdvmes5.2.x86_64.rpm\n 73cf8b14818d6c4aa6ff7b4f876a305f  mes5/x86_64/php-shmop-5.3.13-0.1mdvmes5.2.x86_64.rpm\n 2f1c10a3e69bc4962c68da8494d7a2d1  mes5/x86_64/php-snmp-5.3.13-0.1mdvmes5.2.x86_64.rpm\n 66bf34f4665ce04daf5962c4c5178966  mes5/x86_64/php-soap-5.3.13-0.1mdvmes5.2.x86_64.rpm\n d9f0deeb70efb200c65be5ba2cbfe197  mes5/x86_64/php-sockets-5.3.13-0.1mdvmes5.2.x86_64.rpm\n cb5ace43e37f4488ca65e4740495842a  mes5/x86_64/php-sphinx-1.2.0-0.1mdvmes5.2.x86_64.rpm\n d2347f18673adf71d3fdc94600e6ec77  mes5/x86_64/php-sqlite3-5.3.13-0.1mdvmes5.2.x86_64.rpm\n 5317fd6819706540ee1d1e209b0ee65d  mes5/x86_64/php-sqlite-5.3.13-0.1mdvmes5.2.x86_64.rpm\n e308fc3349779514b7aa1e336452f539  mes5/x86_64/php-ssh2-0.11.3-0.1mdvmes5.2.x86_64.rpm\n c60c35039cdf4a3446e29d0dfa96bc40  mes5/x86_64/php-suhosin-0.9.33-0.1mdvmes5.2.x86_64.rpm\n 3076e178dff5d37d8c44f21e00d63c9e  mes5/x86_64/php-sybase_ct-5.3.13-0.1mdvmes5.2.x86_64.rpm\n e268581c1bbbd9269faa591577fce62a  mes5/x86_64/php-sysvmsg-5.3.13-0.1mdvmes5.2.x86_64.rpm\n 7dbc04b5fc2ffee323f2c4123feb05bd  mes5/x86_64/php-sysvsem-5.3.13-0.1mdvmes5.2.x86_64.rpm\n 1bdffd99b577b97adc67e5b20df0b301  mes5/x86_64/php-sysvshm-5.3.13-0.1mdvmes5.2.x86_64.rpm\n 71043e5371ce75f9f0cb63df38021fdb  mes5/x86_64/php-tclink-3.4.5-0.2mdvmes5.2.x86_64.rpm\n 215a92aa7004ea738f44aed3e1168b9c  mes5/x86_64/php-tidy-5.3.13-0.1mdvmes5.2.x86_64.rpm\n efc0a9750197c1b1f5158c8c1e55c27b  mes5/x86_64/php-timezonedb-2012.3-0.1mdvmes5.2.x86_64.rpm\n c7debf59191371056785b18a4a99c276  mes5/x86_64/php-tokenizer-5.3.13-0.1mdvmes5.2.x86_64.rpm\n 26be1bde74ac0ce9f0b442cb4c81a9be  mes5/x86_64/php-translit-0.6.1-0.1mdvmes5.2.x86_64.rpm\n c99427fc99b451727ac42a9b96a5537c  mes5/x86_64/php-vld-0.11.1-0.1mdvmes5.2.x86_64.rpm\n 2743db76a4ec5fd0a67dbd68bf1229a4  mes5/x86_64/php-wddx-5.3.13-0.1mdvmes5.2.x86_64.rpm\n 6af7e7503ffe3d4141f222fb0701e817  mes5/x86_64/php-xattr-1.1.0-2.6mdvmes5.2.x86_64.rpm\n 85f807ce183c7b843701fd8899ef0991  mes5/x86_64/php-xcache-1.3.2-0.1mdvmes5.2.x86_64.rpm\n a62dad29f5eade1f3d3864b25dff3f2d  mes5/x86_64/php-xcache-admin-1.3.2-0.1mdvmes5.2.x86_64.rpm\n bbf6d7585d06df26bcfa3b73dab0007c  mes5/x86_64/php-xdebug-2.1.4-0.1mdvmes5.2.x86_64.rpm\n a5f092be6c7ca43ad60913afb67885e6  mes5/x86_64/php-xml-5.3.13-0.1mdvmes5.2.x86_64.rpm\n 65ef3be867bd8427c1f5d41131de8249  mes5/x86_64/php-xmlreader-5.3.13-0.1mdvmes5.2.x86_64.rpm\n d0c2192b6b08ef59e912fcbd272c98be  mes5/x86_64/php-xmlrpc-5.3.13-0.1mdvmes5.2.x86_64.rpm\n 1c529b0215628a4d699542742dddb80e  mes5/x86_64/php-xmlwriter-5.3.13-0.1mdvmes5.2.x86_64.rpm\n 78df5fc0a2128aa9658b426cd8378b35  mes5/x86_64/php-xsl-5.3.13-0.1mdvmes5.2.x86_64.rpm\n dadfa8975b5a1a141b2f454d370c59f6  mes5/x86_64/php-yaz-1.1.1-0.1mdvmes5.2.x86_64.rpm\n 9caa5cd5185ae316a091de219fd984d9  mes5/x86_64/php-zip-5.3.13-0.1mdvmes5.2.x86_64.rpm\n 92ac01caa79c1d542fe06e4aae21ff0b  mes5/x86_64/php-zlib-5.3.13-0.1mdvmes5.2.x86_64.rpm\n fb2eadb2172166381d594394916add79  mes5/x86_64/python-SWF-0.4.4-0.1mdvmes5.2.x86_64.rpm\n 5fdd248cb611e7997ddc828e8a90c043  mes5/x86_64/sphinx-0.9.9-0.1mdvmes5.2.x86_64.rpm\n b3d72ab63f47dd5a0f3b1f147321bcab  mes5/x86_64/stemwords-0-5.1mdvmes5.2.x86_64.rpm\n cfada59c5348ee46e44202376cf042c5  mes5/x86_64/yaz-3.0.48-0.1mdvmes5.2.x86_64.rpm \n 2bac0388ad669fc836a910cb6919733e  mes5/SRPMS/apache-mod_php-5.3.13-0.1mdvmes5.2.src.rpm\n 0dd8c597a6a39e17b504408fa4f894d1  mes5/SRPMS/lemon-3.7.4-0.1mdvmes5.2.src.rpm\n 04a50458044ddef8dca4acbecd0555d1  mes5/SRPMS/libmbfl-1.1.0-0.1mdvmes5.2.src.rpm\n d9e473396af964f01dd6310844925396  mes5/SRPMS/libmonetra-7.0.4-0.1mdvmes5.2.src.rpm\n 0fafe53fccc11afa4b75c66dc49261cd  mes5/SRPMS/libstemmer-0-5.1mdvmes5.2.src.rpm\n 6de1878b7ff4fbc0b63e381618e966ba  mes5/SRPMS/ming-0.4.4-0.1mdvmes5.2.src.rpm\n c4041cade9aaf6c4c67f046e4bfbaa74  mes5/SRPMS/php-5.3.13-0.1mdvmes5.2.src.rpm\n c0a1c69bca172f69a034505cfd6b37fc  mes5/SRPMS/php-apc-3.1.10-0.1mdvmes5.2.src.rpm\n df8c3520a450cb4209179f60cf8828cd  mes5/SRPMS/php-dbx-1.1.0-30.2mdvmes5.2.src.rpm\n 7705d28806c6a73a9e588d174203ec11  mes5/SRPMS/php-dio-0.0.5-0.1mdvmes5.2.src.rpm\n cb9fd58d04a1db3ceec2f9b15c5ddac0  mes5/SRPMS/php-eaccelerator-0.9.6.1-0.6mdvmes5.2.src.rpm\n d1e7c7da449372f62c27a0cd3eeb8a8d  mes5/SRPMS/php-fam-5.0.1-3.6mdvmes5.2.src.rpm\n 4c10d297abc9ea2a4dfe2cc441be619c  mes5/SRPMS/php-filepro-5.1.6-13.6mdvmes5.2.src.rpm\n 7c30fe50ac1dc23870c64660300e78f8  mes5/SRPMS/php-gtk2-2.0.1-2.2mdvmes5.2.src.rpm\n ecdbedc8c745921ab7e8c97850c7e976  mes5/SRPMS/php-imagick-3.0.1-0.2mdvmes5.2.src.rpm\n c31069ae710a67783a81adf905f72842  mes5/SRPMS/php-ini-5.3.13-0.1mdvmes5.2.src.rpm\n 7bba5d67278539bbfe8980f4619fc443  mes5/SRPMS/php-mailparse-2.1.6-0.1mdvmes5.2.src.rpm\n c064fa5008b99634cf43dd8cfcfc38a8  mes5/SRPMS/php-mcal-0.6-23.6mdvmes5.2.src.rpm\n 4dc1c969e13503b5b84e4cc2a62fcafa  mes5/SRPMS/php-mcve-7.0.3-0.2mdvmes5.2.src.rpm\n 8a0b00a7eb45735c7f1b84db2124a02a  mes5/SRPMS/php-mdbtools-1.0.0-4.2mdvmes5.2.src.rpm\n 50514e567296ef853fc9c040b27fde14  mes5/SRPMS/php-memcache-3.0.6-0.2mdvmes5.2.src.rpm\n 3d68803bc8d4d5db837d034e31b559ab  mes5/SRPMS/php-ming-5.2.10-0.2mdvmes5.2.src.rpm\n 3788a033464659c7697271fe3e11cb6b  mes5/SRPMS/php-optimizer-0.1-0.alpha2.0.2mdvmes5.2.src.rpm\n 4e41590da9fd097f6ecb0cf362bf99f9  mes5/SRPMS/php-perl-1.0.0-32.2mdvmes5.2.src.rpm\n 8227db814a6322c4a1c72717965be834  mes5/SRPMS/php-radius-1.2.5-7.2mdvmes5.2.src.rpm\n b6eea216f82a274151c12bb38e50793c  mes5/SRPMS/php-sasl-0.1.0-21.6mdvmes5.2.src.rpm\n aefb4d8a934bd9ecf18f10cf94508b21  mes5/SRPMS/php-sphinx-1.2.0-0.1mdvmes5.2.src.rpm\n 27acc20ae9792b5ee79127428c76d019  mes5/SRPMS/php-ssh2-0.11.3-0.1mdvmes5.2.src.rpm\n 8561139b4f53146b52d0d881c93bd884  mes5/SRPMS/php-suhosin-0.9.33-0.1mdvmes5.2.src.rpm\n 9decd2138202b8f51428b69f8d089679  mes5/SRPMS/php-tclink-3.4.5-0.2mdvmes5.2.src.rpm\n a331ac0e06665fb2b1696eeb35ddd67b  mes5/SRPMS/php-timezonedb-2012.3-0.1mdvmes5.2.src.rpm\n 79c414525991c894f01d9e597cda78f6  mes5/SRPMS/php-translit-0.6.1-0.1mdvmes5.2.src.rpm\n 93897f5b7d60138c9e12474dc8388954  mes5/SRPMS/php-vld-0.11.1-0.1mdvmes5.2.src.rpm\n 9f2b8c72495c63762e02a4792b321463  mes5/SRPMS/php-xattr-1.1.0-2.6mdvmes5.2.src.rpm\n bec964b1764e87c0ba2d78ec3c33f662  mes5/SRPMS/php-xcache-1.3.2-0.1mdvmes5.2.src.rpm\n 6e3b637199e13bd895401f2cadbf25c5  mes5/SRPMS/php-xdebug-2.1.4-0.1mdvmes5.2.src.rpm\n 7b1f065bc086533fa01adba07235c4fe  mes5/SRPMS/php-yaz-1.1.1-0.1mdvmes5.2.src.rpm\n 51586ceaba69e3a61e4171c1b33821ad  mes5/SRPMS/sphinx-0.9.9-0.1mdvmes5.2.src.rpm\n fb8632c3872b5f62b8fdc070565d21b6  mes5/SRPMS/xmlrpc-epi-0.54-0.1mdvmes5.2.src.rpm\n 7737d7193bce052e26930d49ee7e841f  mes5/SRPMS/yaz-3.0.48-0.1mdvmes5.2.src.rpm\n _______________________________________________________________________\n\n To upgrade automatically use MandrivaUpdate or urpmi.  The verification\n of md5 checksums and GPG signatures is performed automatically for you. \n\n All packages are signed by Mandriva for security.  You can obtain the\n GPG public key of the Mandriva Security Team by executing:\n\n  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\n\n You can view other update advisories for Mandriva Linux at:\n\n  http://www.mandriva.com/security/advisories\n\n If you want to report vulnerabilities, please contact\n\n  security_(at)_mandriva.com\n _______________________________________________________________________\n\n Type Bits/KeyID     Date       User ID\n pub  1024D/22458A98 2000-07-10 Mandriva Security Team\n  \u003csecurity*mandriva.com\u003e\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.11 (GNU/Linux)\n\niD8DBQFPq6gTmqjQ0CJFipgRAqvVAJ9zEwWjj1SD2W0x+6Nb/vNvjYO4oQCg6O6L\nwF916W6TuFcSv/gD10fMyoE=\n=Va72\n-----END PGP SIGNATURE-----\n\n_______________________________________________\nFull-Disclosure - We believe in it. \nCharter: http://lists.grok.org.uk/full-disclosure-charter.html\nHosted and sponsored by Secunia - http://secunia.com/\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nNote: the current version of the following document is available here:\nhttps://h20564.www2.hp.com/portal/site/hpsc/public/kb/\ndocDisplay?docId=emr_na-c03839862\n\nSUPPORT COMMUNICATION - SECURITY BULLETIN\n\nDocument ID: c03839862\nVersion: 1\n\nHPSBMU02900 rev.1 - HP System Management Homepage (SMH) running on Linux and\nWindows, Multiple Remote and Local Vulnerabilities\n\nNOTICE: The information in this Security Bulletin should be acted upon as\nsoon as possible. \n\nRelease Date: 2013-07-18\nLast Updated: 2013-07-18\n\nPotential Security Impact: Local Denial of Service (DoS), remote Denial of\nService (DoS), execution of arbitrary code, gain extended privileges,\ndisclosure of information, unauthorized access, XSS\n\nSource: Hewlett-Packard Company, HP Software Security Response Team\n\nVULNERABILITY SUMMARY\nPotential security vulnerabilities have been identified with HP System\nManagement Homepage (SMH) running on Linux and Windows. The vulnerabilities\ncould be exploited remotely resulting in Local Denial of Service (DoS),\nremote Denial of Service (DoS), execution of arbitrary code, gain privileges,\ndisclosure of information, unauthorized access, or XSS. \n\nReferences:\nCVE-2011-3389 (SSRT100740) Remote disclosure of information\nCVE-2012-0883 (SSRT101209) Remote gain extended privileges\nCVE-2012-2110 (SSRT101210) Remote Denial of Service (DoS)\nCVE-2012-2311 (SSRT100992) Remote execution of arbitrary code\nCVE-2012-2329 (SSRT100992) Remote Denial of Service (DoS)\nCVE-2012-2335 (SSRT100992) Remote execution of arbitrary code\nCVE-2012-2336 (SSRT100992) Remote Denial of Service (DoS)\nCVE-2013-2355 (SSRT100696) Remote unauthorized Access\nCVE-2013-2356 (SSRT100835) Remote disclosure of information\nCVE-2013-2357 (SSRT100907) Remote Denial of Service (DoS)\nCVE-2013-2358 (SSRT100907) Remote Denial of Service (DoS)\nCVE-2013-2359 (SSRT100907) Remote Denial of Service (DoS)\nCVE-2013-2360 (SSRT100907) Remote Denial of Service (DoS)\nCVE-2013-2361 (SSRT101007) XSS\nCVE-2013-2362 (SSRT101076, ZDI-CAN-1676) Local Denial of Service (DoS)\nCVE-2013-2363 (SSRT101150) Remote disclosure of information\nCVE-2013-2364 (SSRT101151) XSS\nCVE-2013-5217 (SSRT101137) Remote unauthorized access\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \nHP System Management Homepage (SMH) v7.2.0 and earlier running on Linux and\nWindows. \n\nBACKGROUND\n\nCVSS 2.0 Base Metrics\n===========================================================\n  Reference              Base Vector             Base Score\nCVE-2011-3389    (AV:N/AC:M/Au:N/C:P/I:N/A:N)       4.3\nCVE-2012-0883    (AV:L/AC:M/Au:N/C:C/I:C/A:C)       6.9\nCVE-2012-2110    (AV:N/AC:L/Au:N/C:P/I:P/A:P)       7.5\nCVE-2012-2311    (AV:N/AC:L/Au:N/C:P/I:P/A:P)       7.5\nCVE-2012-2329    (AV:N/AC:L/Au:N/C:N/I:N/A:P)       5.0\nCVE-2012-2335    (AV:N/AC:L/Au:N/C:P/I:P/A:P)       7.5\nCVE-2012-2336    (AV:N/AC:L/Au:N/C:N/I:N/A:P)       5.0\nCVE-2013-2355    (AV:N/AC:M/Au:N/C:P/I:N/A:N)       4.3\nCVE-2013-2356    (AV:N/AC:L/Au:N/C:C/I:N/A:N)       7.8\nCVE-2013-2357    (AV:N/AC:M/Au:S/C:N/I:N/A:C)       6.3\nCVE-2013-2358    (AV:N/AC:M/Au:S/C:N/I:N/A:C)       6.3\nCVE-2013-2359    (AV:N/AC:M/Au:S/C:N/I:N/A:P)       3.5\nCVE-2013-2360    (AV:N/AC:M/Au:S/C:N/I:N/A:P)       3.5\nCVE-2013-2361    (AV:N/AC:M/Au:N/C:N/I:P/A:N)       4.3\nCVE-2013-2362    (AV:L/AC:H/Au:S/C:N/I:N/A:P)       1.0\nCVE-2013-2363    (AV:N/AC:H/Au:N/C:C/I:N/A:P)       6.1\nCVE-2013-2364    (AV:N/AC:L/Au:S/C:N/I:N/A:P)       4.0\nCVE-2013-5217    (AV:N/AC:H/Au:N/C:P/I:N/A:N)       2.6\n===========================================================\n             Information on CVSS is documented\n            in HP Customer Notice: HPSN-2008-002\n\nThe Hewlett-Packard Company thanks agix for working with the TippingPoint\nZero Day Initiative to report vulnerability CVE-2013-2362 to\nsecurity-alert@hp.com\n\nRESOLUTION\n\nHP has made System Management Homepage (SMH) v7.2.1 or subsequent available\nfor Windows and Linux to resolve the vulnerabilities. \n\nInformation and updates for SMH can be found at the following location:\n\nhttp://h18013.www1.hp.com/products/servers/management/agents/index.html\n\nHISTORY\nVersion:1 (rev.1) - 18 July 2013 Initial release\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running HP software products should be applied in\naccordance with the customer\u0027s patch management policy. \n\nSupport: For issues about implementing the recommendations of this Security\nBulletin, contact normal HP Services support channel.  For other issues about\nthe content of this Security Bulletin, send e-mail to security-alert@hp.com. \n\nReport: To report a potential security vulnerability with any HP supported\nproduct, send Email to: security-alert@hp.com\n\nSubscribe: To initiate a subscription to receive future HP Security Bulletin\nalerts via Email:\nhttp://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins\n\nSecurity Bulletin Archive: A list of recently released Security Bulletins is\navailable here:\nhttps://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/\n\nSoftware Product Category: The Software Product Category is represented in\nthe title by the two characters following HPSB. \n\n3C = 3COM\n3P = 3rd Party Software\nGN = HP General Software\nHF = HP Hardware and Firmware\nMP = MPE/iX\nMU = Multi-Platform Software\nNS = NonStop Servers\nOV = OpenVMS\nPI = Printing and Imaging\nPV = ProCurve\nST = Storage Software\nTU = Tru64 UNIX\nUX = HP-UX\n\nCopyright 2013 Hewlett-Packard Development Company, L.P. \nHewlett-Packard Company shall not be liable for technical or editorial errors\nor omissions contained herein. The information provided is provided \"as is\"\nwithout warranty of any kind. To the extent permitted by law, neither HP or\nits affiliates, subcontractors or suppliers will be liable for\nincidental,special or consequential damages including downtime cost; lost\nprofits;damages relating to the procurement of substitute products or\nservices; or damages for loss of data, or software restoration. The\ninformation in this document is subject to change without notice. \nHewlett-Packard Company and the names of Hewlett-Packard products referenced\nherein are trademarks of Hewlett-Packard Company in the United States and\nother countries. Other product and company names mentioned herein may be\ntrademarks of their respective owners. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n                   Red Hat Security Advisory\n\nSynopsis:          Moderate: php53 security update\nAdvisory ID:       RHSA-2012:1047-01\nProduct:           Red Hat Enterprise Linux\nAdvisory URL:      https://rhn.redhat.com/errata/RHSA-2012-1047.html\nIssue date:        2012-06-27\nCVE Names:         CVE-2010-2950 CVE-2011-4153 CVE-2012-0057 \n                   CVE-2012-0789 CVE-2012-1172 CVE-2012-2143 \n                   CVE-2012-2336 CVE-2012-2386 \n=====================================================================\n\n1. Summary:\n\nUpdated php53 packages that fix multiple security issues are now available\nfor Red Hat Enterprise Linux 5. \n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section. \n\n2. Relevant releases/architectures:\n\nRHEL Desktop Workstation (v. 5 client) - i386, x86_64\nRed Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64\n\n3. Description:\n\nPHP is an HTML-embedded scripting language commonly used with the Apache\nHTTP Server. \n\nIt was discovered that the PHP XSL extension did not restrict the file\nwriting capability of libxslt. A remote attacker could use this flaw to\ncreate or overwrite an arbitrary file that is writable by the user running\nPHP, if a PHP script processed untrusted eXtensible Style Sheet Language\nTransformations (XSLT) content. (CVE-2012-0057)\n\nNote: This update disables file writing by default. A new PHP configuration\ndirective, \"xsl.security_prefs\", can be used to enable file writing in\nXSLT. \n\nA flaw was found in the way PHP validated file names in file upload\nrequests. A remote attacker could possibly use this flaw to bypass the\nsanitization of the uploaded file names, and cause a PHP script to store\nthe uploaded file in an unexpected directory, by using a directory\ntraversal attack. (CVE-2012-1172)\n\nMultiple integer overflow flaws, leading to heap-based buffer overflows,\nwere found in the way the PHP phar extension processed certain fields of\ntar archive files. A remote attacker could provide a specially-crafted tar\narchive file that, when processed by a PHP application using the phar\nextension, could cause the application to crash or, potentially, execute\narbitrary code with the privileges of the user running PHP. (CVE-2012-2386)\n\nA format string flaw was found in the way the PHP phar extension processed\ncertain PHAR files. A remote attacker could provide a specially-crafted\nPHAR file, which once processed in a PHP application using the phar\nextension, could lead to information disclosure and possibly arbitrary code\nexecution via a crafted phar:// URI. (CVE-2010-2950)\n\nA flaw was found in the DES algorithm implementation in the crypt()\npassword hashing function in PHP. If the password string to be hashed\ncontained certain characters, the remainder of the string was ignored when\ncalculating the hash, significantly reducing the password strength. \n(CVE-2012-2143)\n\nNote: With this update, passwords are no longer truncated when performing\nDES hashing. Therefore, new hashes of the affected passwords will not match\nstored hashes generated using vulnerable PHP versions, and will need to be\nupdated. \n\nIt was discovered that the fix for CVE-2012-1823, released via\nRHSA-2012:0547, did not properly filter all php-cgi command line arguments. \nA specially-crafted request to a PHP script could cause the PHP interpreter\nto execute the script in a loop, or output usage information that triggers\nan Internal Server Error. (CVE-2012-2336)\n\nA memory leak flaw was found in the PHP strtotime() function call. A remote\nattacker could possibly use this flaw to cause excessive memory consumption\nby triggering many strtotime() function calls. (CVE-2012-0789)\n\nIt was found that PHP did not check the zend_strndup() function\u0027s return\nvalue in certain cases. A remote attacker could possibly use this flaw to\ncrash a PHP application. (CVE-2011-4153)\n\nUpstream acknowledges Rubin Xu and Joseph Bonneau as the original reporters\nof CVE-2012-2143. \n\nAll php53 users should upgrade to these updated packages, which contain\nbackported patches to resolve these issues. After installing the updated\npackages, the httpd daemon must be restarted for the update to take effect. \n\n4. Solution:\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied. \n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258\n\n5. Bugs fixed (http://bugzilla.redhat.com/):\n\n782657 - CVE-2012-0057 php: XSLT file writing vulnerability\n782943 - CVE-2011-4153 php: zend_strndup() NULL pointer dereference may cause DoS\n783609 - CVE-2012-0789 php: strtotime timezone memory leak\n799187 - CVE-2012-1172 php: $_FILES array indexes corruption\n816956 - CVE-2012-2143 BSD crypt(): DES encrypted password weakness\n820708 - CVE-2012-2336 php: incomplete CVE-2012-1823 fix - missing filtering of -T and -h\n823594 - CVE-2012-2386 php: Integer overflow leading to heap-buffer overflow in the Phar extension\n835024 - CVE-2010-2950 php: Format string flaw in phar extension via phar_stream_flush() (MOPS-2010-024)\n\n6. Package List:\n\nRHEL Desktop Workstation (v. 5 client):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/php53-5.3.3-13.el5_8.src.rpm\n\ni386:\nphp53-5.3.3-13.el5_8.i386.rpm\nphp53-bcmath-5.3.3-13.el5_8.i386.rpm\nphp53-cli-5.3.3-13.el5_8.i386.rpm\nphp53-common-5.3.3-13.el5_8.i386.rpm\nphp53-dba-5.3.3-13.el5_8.i386.rpm\nphp53-debuginfo-5.3.3-13.el5_8.i386.rpm\nphp53-devel-5.3.3-13.el5_8.i386.rpm\nphp53-gd-5.3.3-13.el5_8.i386.rpm\nphp53-imap-5.3.3-13.el5_8.i386.rpm\nphp53-intl-5.3.3-13.el5_8.i386.rpm\nphp53-ldap-5.3.3-13.el5_8.i386.rpm\nphp53-mbstring-5.3.3-13.el5_8.i386.rpm\nphp53-mysql-5.3.3-13.el5_8.i386.rpm\nphp53-odbc-5.3.3-13.el5_8.i386.rpm\nphp53-pdo-5.3.3-13.el5_8.i386.rpm\nphp53-pgsql-5.3.3-13.el5_8.i386.rpm\nphp53-process-5.3.3-13.el5_8.i386.rpm\nphp53-pspell-5.3.3-13.el5_8.i386.rpm\nphp53-snmp-5.3.3-13.el5_8.i386.rpm\nphp53-soap-5.3.3-13.el5_8.i386.rpm\nphp53-xml-5.3.3-13.el5_8.i386.rpm\nphp53-xmlrpc-5.3.3-13.el5_8.i386.rpm\n\nx86_64:\nphp53-5.3.3-13.el5_8.x86_64.rpm\nphp53-bcmath-5.3.3-13.el5_8.x86_64.rpm\nphp53-cli-5.3.3-13.el5_8.x86_64.rpm\nphp53-common-5.3.3-13.el5_8.x86_64.rpm\nphp53-dba-5.3.3-13.el5_8.x86_64.rpm\nphp53-debuginfo-5.3.3-13.el5_8.x86_64.rpm\nphp53-devel-5.3.3-13.el5_8.x86_64.rpm\nphp53-gd-5.3.3-13.el5_8.x86_64.rpm\nphp53-imap-5.3.3-13.el5_8.x86_64.rpm\nphp53-intl-5.3.3-13.el5_8.x86_64.rpm\nphp53-ldap-5.3.3-13.el5_8.x86_64.rpm\nphp53-mbstring-5.3.3-13.el5_8.x86_64.rpm\nphp53-mysql-5.3.3-13.el5_8.x86_64.rpm\nphp53-odbc-5.3.3-13.el5_8.x86_64.rpm\nphp53-pdo-5.3.3-13.el5_8.x86_64.rpm\nphp53-pgsql-5.3.3-13.el5_8.x86_64.rpm\nphp53-process-5.3.3-13.el5_8.x86_64.rpm\nphp53-pspell-5.3.3-13.el5_8.x86_64.rpm\nphp53-snmp-5.3.3-13.el5_8.x86_64.rpm\nphp53-soap-5.3.3-13.el5_8.x86_64.rpm\nphp53-xml-5.3.3-13.el5_8.x86_64.rpm\nphp53-xmlrpc-5.3.3-13.el5_8.x86_64.rpm\n\nRed Hat Enterprise Linux (v. 5 server):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/php53-5.3.3-13.el5_8.src.rpm\n\ni386:\nphp53-5.3.3-13.el5_8.i386.rpm\nphp53-bcmath-5.3.3-13.el5_8.i386.rpm\nphp53-cli-5.3.3-13.el5_8.i386.rpm\nphp53-common-5.3.3-13.el5_8.i386.rpm\nphp53-dba-5.3.3-13.el5_8.i386.rpm\nphp53-debuginfo-5.3.3-13.el5_8.i386.rpm\nphp53-devel-5.3.3-13.el5_8.i386.rpm\nphp53-gd-5.3.3-13.el5_8.i386.rpm\nphp53-imap-5.3.3-13.el5_8.i386.rpm\nphp53-intl-5.3.3-13.el5_8.i386.rpm\nphp53-ldap-5.3.3-13.el5_8.i386.rpm\nphp53-mbstring-5.3.3-13.el5_8.i386.rpm\nphp53-mysql-5.3.3-13.el5_8.i386.rpm\nphp53-odbc-5.3.3-13.el5_8.i386.rpm\nphp53-pdo-5.3.3-13.el5_8.i386.rpm\nphp53-pgsql-5.3.3-13.el5_8.i386.rpm\nphp53-process-5.3.3-13.el5_8.i386.rpm\nphp53-pspell-5.3.3-13.el5_8.i386.rpm\nphp53-snmp-5.3.3-13.el5_8.i386.rpm\nphp53-soap-5.3.3-13.el5_8.i386.rpm\nphp53-xml-5.3.3-13.el5_8.i386.rpm\nphp53-xmlrpc-5.3.3-13.el5_8.i386.rpm\n\nia64:\nphp53-5.3.3-13.el5_8.ia64.rpm\nphp53-bcmath-5.3.3-13.el5_8.ia64.rpm\nphp53-cli-5.3.3-13.el5_8.ia64.rpm\nphp53-common-5.3.3-13.el5_8.ia64.rpm\nphp53-dba-5.3.3-13.el5_8.ia64.rpm\nphp53-debuginfo-5.3.3-13.el5_8.ia64.rpm\nphp53-devel-5.3.3-13.el5_8.ia64.rpm\nphp53-gd-5.3.3-13.el5_8.ia64.rpm\nphp53-imap-5.3.3-13.el5_8.ia64.rpm\nphp53-intl-5.3.3-13.el5_8.ia64.rpm\nphp53-ldap-5.3.3-13.el5_8.ia64.rpm\nphp53-mbstring-5.3.3-13.el5_8.ia64.rpm\nphp53-mysql-5.3.3-13.el5_8.ia64.rpm\nphp53-odbc-5.3.3-13.el5_8.ia64.rpm\nphp53-pdo-5.3.3-13.el5_8.ia64.rpm\nphp53-pgsql-5.3.3-13.el5_8.ia64.rpm\nphp53-process-5.3.3-13.el5_8.ia64.rpm\nphp53-pspell-5.3.3-13.el5_8.ia64.rpm\nphp53-snmp-5.3.3-13.el5_8.ia64.rpm\nphp53-soap-5.3.3-13.el5_8.ia64.rpm\nphp53-xml-5.3.3-13.el5_8.ia64.rpm\nphp53-xmlrpc-5.3.3-13.el5_8.ia64.rpm\n\nppc:\nphp53-5.3.3-13.el5_8.ppc.rpm\nphp53-bcmath-5.3.3-13.el5_8.ppc.rpm\nphp53-cli-5.3.3-13.el5_8.ppc.rpm\nphp53-common-5.3.3-13.el5_8.ppc.rpm\nphp53-dba-5.3.3-13.el5_8.ppc.rpm\nphp53-debuginfo-5.3.3-13.el5_8.ppc.rpm\nphp53-devel-5.3.3-13.el5_8.ppc.rpm\nphp53-gd-5.3.3-13.el5_8.ppc.rpm\nphp53-imap-5.3.3-13.el5_8.ppc.rpm\nphp53-intl-5.3.3-13.el5_8.ppc.rpm\nphp53-ldap-5.3.3-13.el5_8.ppc.rpm\nphp53-mbstring-5.3.3-13.el5_8.ppc.rpm\nphp53-mysql-5.3.3-13.el5_8.ppc.rpm\nphp53-odbc-5.3.3-13.el5_8.ppc.rpm\nphp53-pdo-5.3.3-13.el5_8.ppc.rpm\nphp53-pgsql-5.3.3-13.el5_8.ppc.rpm\nphp53-process-5.3.3-13.el5_8.ppc.rpm\nphp53-pspell-5.3.3-13.el5_8.ppc.rpm\nphp53-snmp-5.3.3-13.el5_8.ppc.rpm\nphp53-soap-5.3.3-13.el5_8.ppc.rpm\nphp53-xml-5.3.3-13.el5_8.ppc.rpm\nphp53-xmlrpc-5.3.3-13.el5_8.ppc.rpm\n\ns390x:\nphp53-5.3.3-13.el5_8.s390x.rpm\nphp53-bcmath-5.3.3-13.el5_8.s390x.rpm\nphp53-cli-5.3.3-13.el5_8.s390x.rpm\nphp53-common-5.3.3-13.el5_8.s390x.rpm\nphp53-dba-5.3.3-13.el5_8.s390x.rpm\nphp53-debuginfo-5.3.3-13.el5_8.s390x.rpm\nphp53-devel-5.3.3-13.el5_8.s390x.rpm\nphp53-gd-5.3.3-13.el5_8.s390x.rpm\nphp53-imap-5.3.3-13.el5_8.s390x.rpm\nphp53-intl-5.3.3-13.el5_8.s390x.rpm\nphp53-ldap-5.3.3-13.el5_8.s390x.rpm\nphp53-mbstring-5.3.3-13.el5_8.s390x.rpm\nphp53-mysql-5.3.3-13.el5_8.s390x.rpm\nphp53-odbc-5.3.3-13.el5_8.s390x.rpm\nphp53-pdo-5.3.3-13.el5_8.s390x.rpm\nphp53-pgsql-5.3.3-13.el5_8.s390x.rpm\nphp53-process-5.3.3-13.el5_8.s390x.rpm\nphp53-pspell-5.3.3-13.el5_8.s390x.rpm\nphp53-snmp-5.3.3-13.el5_8.s390x.rpm\nphp53-soap-5.3.3-13.el5_8.s390x.rpm\nphp53-xml-5.3.3-13.el5_8.s390x.rpm\nphp53-xmlrpc-5.3.3-13.el5_8.s390x.rpm\n\nx86_64:\nphp53-5.3.3-13.el5_8.x86_64.rpm\nphp53-bcmath-5.3.3-13.el5_8.x86_64.rpm\nphp53-cli-5.3.3-13.el5_8.x86_64.rpm\nphp53-common-5.3.3-13.el5_8.x86_64.rpm\nphp53-dba-5.3.3-13.el5_8.x86_64.rpm\nphp53-debuginfo-5.3.3-13.el5_8.x86_64.rpm\nphp53-devel-5.3.3-13.el5_8.x86_64.rpm\nphp53-gd-5.3.3-13.el5_8.x86_64.rpm\nphp53-imap-5.3.3-13.el5_8.x86_64.rpm\nphp53-intl-5.3.3-13.el5_8.x86_64.rpm\nphp53-ldap-5.3.3-13.el5_8.x86_64.rpm\nphp53-mbstring-5.3.3-13.el5_8.x86_64.rpm\nphp53-mysql-5.3.3-13.el5_8.x86_64.rpm\nphp53-odbc-5.3.3-13.el5_8.x86_64.rpm\nphp53-pdo-5.3.3-13.el5_8.x86_64.rpm\nphp53-pgsql-5.3.3-13.el5_8.x86_64.rpm\nphp53-process-5.3.3-13.el5_8.x86_64.rpm\nphp53-pspell-5.3.3-13.el5_8.x86_64.rpm\nphp53-snmp-5.3.3-13.el5_8.x86_64.rpm\nphp53-soap-5.3.3-13.el5_8.x86_64.rpm\nphp53-xml-5.3.3-13.el5_8.x86_64.rpm\nphp53-xmlrpc-5.3.3-13.el5_8.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security.  Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/#package\n\n7. References:\n\nhttps://www.redhat.com/security/data/cve/CVE-2010-2950.html\nhttps://www.redhat.com/security/data/cve/CVE-2011-4153.html\nhttps://www.redhat.com/security/data/cve/CVE-2012-0057.html\nhttps://www.redhat.com/security/data/cve/CVE-2012-0789.html\nhttps://www.redhat.com/security/data/cve/CVE-2012-1172.html\nhttps://www.redhat.com/security/data/cve/CVE-2012-2143.html\nhttps://www.redhat.com/security/data/cve/CVE-2012-2336.html\nhttps://www.redhat.com/security/data/cve/CVE-2012-2386.html\nhttps://access.redhat.com/security/updates/classification/#moderate\nhttps://rhn.redhat.com/errata/RHSA-2012-0547.html\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e.  More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2012 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.4 (GNU/Linux)\n\niD8DBQFP6yyDXlSAg2UNWIIRAu2zAKC8ROcChsz1MkTbSM921azTr7x5vACggc8v\nuQDSWVmKWcYfJwvqolSqJUI=\n=fzOC\n-----END PGP SIGNATURE-----\n\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. ============================================================================\nUbuntu Security Notice USN-1481-1\nJune 19, 2012\n\nphp5 vulnerabilities\n============================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 12.04 LTS\n- Ubuntu 11.10\n- Ubuntu 11.04\n- Ubuntu 10.04 LTS\n- Ubuntu 8.04 LTS\n\nSummary:\n\nSeveral security issues were fixed in PHP. \n\nSoftware Description:\n- php5: HTML-embedded scripting language interpreter\n\nDetails:\n\nIt was discovered that PHP incorrectly handled certain Tidy::diagnose\noperations on invalid objects. (CVE-2012-1172)\n\nRubin Xu and Joseph Bonneau discovered that PHP incorrectly handled certain\nUnicode characters in passwords passed to the crypt() function. \n(CVE-2012-2143)\n\nIt was discovered that a Debian/Ubuntu specific patch caused PHP to\nincorrectly handle empty salt strings. This issue only affected Ubuntu 10.04\nLTS and Ubuntu 11.04. (CVE-2012-2317)\n\nIt was discovered that PHP, when used as a stand alone CGI processor\nfor the Apache Web Server, did not properly parse and filter query\nstrings. Configurations using mod_php5 and FastCGI were not vulnerable. \n(CVE-2012-2386)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 12.04 LTS:\n  php5                            5.3.10-1ubuntu3.2\n\nUbuntu 11.10:\n  php5                            5.3.6-13ubuntu3.8\n\nUbuntu 11.04:\n  php5                            5.3.5-1ubuntu7.10\n\nUbuntu 10.04 LTS:\n  php5                            5.3.2-1ubuntu4.17\n\nUbuntu 8.04 LTS:\n  php5                            5.2.4-2ubuntu5.25\n\nIn general, a standard system update will make all the necessary changes",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2012-2336"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-002395"
      },
      {
        "db": "BID",
        "id": "53388"
      },
      {
        "db": "PACKETSTORM",
        "id": "123310"
      },
      {
        "db": "PACKETSTORM",
        "id": "116800"
      },
      {
        "db": "PACKETSTORM",
        "id": "112598"
      },
      {
        "db": "PACKETSTORM",
        "id": "122468"
      },
      {
        "db": "PACKETSTORM",
        "id": "114259"
      },
      {
        "db": "PACKETSTORM",
        "id": "114260"
      },
      {
        "db": "PACKETSTORM",
        "id": "113885"
      }
    ],
    "trust": 2.52
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2012-2336",
        "trust": 3.4
      },
      {
        "db": "SECUNIA",
        "id": "49014",
        "trust": 1.6
      },
      {
        "db": "CERT/CC",
        "id": "VU#520827",
        "trust": 1.1
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-002395",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201205-209",
        "trust": 0.6
      },
      {
        "db": "JUNIPER",
        "id": "JSA10658",
        "trust": 0.3
      },
      {
        "db": "CERT/CC",
        "id": "VU#673343",
        "trust": 0.3
      },
      {
        "db": "BID",
        "id": "53388",
        "trust": 0.3
      },
      {
        "db": "PACKETSTORM",
        "id": "123310",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "116800",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "112598",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "122468",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "114259",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "114260",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "113885",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "53388"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-002395"
      },
      {
        "db": "PACKETSTORM",
        "id": "123310"
      },
      {
        "db": "PACKETSTORM",
        "id": "116800"
      },
      {
        "db": "PACKETSTORM",
        "id": "112598"
      },
      {
        "db": "PACKETSTORM",
        "id": "122468"
      },
      {
        "db": "PACKETSTORM",
        "id": "114259"
      },
      {
        "db": "PACKETSTORM",
        "id": "114260"
      },
      {
        "db": "PACKETSTORM",
        "id": "113885"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201205-209"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-2336"
      }
    ]
  },
  "id": "VAR-201205-0312",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VARIoT devices database",
        "id": null
      }
    ],
    "trust": 0.47077376
  },
  "last_update_date": "2024-11-29T22:02:51.053000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "SUSE-SU-2012:0840",
        "trust": 0.8,
        "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00003.html"
      },
      {
        "title": "PHP 5.4.3 and PHP 5.3.13 Released!",
        "trust": 0.8,
        "url": "http://www.php.net/archive/2012.php#id2012-05-08-1"
      },
      {
        "title": "PHP 5 ChangeLog - Version 5.4.3",
        "trust": 0.8,
        "url": "http://www.php.net/ChangeLog-5.php#5.4.3"
      },
      {
        "title": "PHP 5.4.3",
        "trust": 0.6,
        "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=43186"
      },
      {
        "title": "PHP 5.4.3",
        "trust": 0.6,
        "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=43185"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-002395"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201205-209"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-20",
        "trust": 1.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-002395"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-2336"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.2,
        "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c03839862"
      },
      {
        "trust": 1.6,
        "url": "http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00004.html"
      },
      {
        "trust": 1.6,
        "url": "https://bugs.php.net/bug.php?id=61910"
      },
      {
        "trust": 1.6,
        "url": "http://www.php.net/archive/2012.php#id2012-05-08-1"
      },
      {
        "trust": 1.6,
        "url": "https://bugs.php.net/patch-display.php?bug_id=61910\u0026patch=cve-2012-1823.patch\u0026revision=1336251592\u0026display=1"
      },
      {
        "trust": 1.6,
        "url": "http://www.php.net/changelog-5.php#5.4.3"
      },
      {
        "trust": 1.6,
        "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00003.html"
      },
      {
        "trust": 1.6,
        "url": "http://secunia.com/advisories/49014"
      },
      {
        "trust": 1.1,
        "url": "http://www.kb.cert.org/vuls/id/520827"
      },
      {
        "trust": 0.9,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-2336"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/cert/jvnvu520827/index.html"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-2336"
      },
      {
        "trust": 0.7,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2012-2336"
      },
      {
        "trust": 0.6,
        "url": "https://access.redhat.com/errata/rhsa-2012:1047"
      },
      {
        "trust": 0.6,
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=820708"
      },
      {
        "trust": 0.6,
        "url": "https://access.redhat.com/errata/rhsa-2012:1045"
      },
      {
        "trust": 0.6,
        "url": "https://access.redhat.com/errata/rhsa-2012:1046"
      },
      {
        "trust": 0.6,
        "url": "https://access.redhat.com/security/cve/cve-2012-2336"
      },
      {
        "trust": 0.5,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2012-2335"
      },
      {
        "trust": 0.5,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1172"
      },
      {
        "trust": 0.3,
        "url": "http://eindbazen.net/2012/05/php-cgi-advisory-cve-2012-1823/"
      },
      {
        "trust": 0.3,
        "url": "http://alerts.hp.com/r?2.1.3kt.2zr.xg7ek.hmj%2asm..t.a4jy.6o9k.bw89mq%5f%5fdmtsfto0"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/software/lotus/products/foundations/start/"
      },
      {
        "trust": 0.3,
        "url": "http://kb.parallels.com/en/113818"
      },
      {
        "trust": 0.3,
        "url": "kb.parallels.com/en/116241"
      },
      {
        "trust": 0.3,
        "url": "https://community.rapid7.com/thread/5174"
      },
      {
        "trust": 0.3,
        "url": "http://www.php.net/"
      },
      {
        "trust": 0.3,
        "url": "http://seclists.org/fulldisclosure/2013/jun/21"
      },
      {
        "trust": 0.3,
        "url": "http://ompldr.org/vzgxxaq"
      },
      {
        "trust": 0.3,
        "url": "http://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10658\u0026cat=sirt_1\u0026actp=list"
      },
      {
        "trust": 0.3,
        "url": "https://downloads.avaya.com/css/p8/documents/100162699"
      },
      {
        "trust": 0.3,
        "url": "https://downloads.avaya.com/css/p8/documents/100165255"
      },
      {
        "trust": 0.3,
        "url": "http://www.h-online.com/security/news/item/critical-open-hole-in-php-creates-risks-update-1567532.html"
      },
      {
        "trust": 0.3,
        "url": "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?objectid=c03360041"
      },
      {
        "trust": 0.3,
        "url": "http://www.php.net/archive/2012.php#id2012-05-03-1"
      },
      {
        "trust": 0.3,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21620314"
      },
      {
        "trust": 0.3,
        "url": "http://www.turbolinux.co.jp/security-e/2012/tlsa-2012-14.txt"
      },
      {
        "trust": 0.3,
        "url": "http://www.kb.cert.org/vuls/id/673343"
      },
      {
        "trust": 0.3,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2012-2311"
      },
      {
        "trust": 0.3,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0057"
      },
      {
        "trust": 0.3,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2012-2143"
      },
      {
        "trust": 0.3,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2012-2386"
      },
      {
        "trust": 0.3,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0789"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-2358"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-2357"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-2362"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-2361"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-2364"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-2363"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-2359"
      },
      {
        "trust": 0.2,
        "url": "http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2012-2329"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3389"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-2356"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2012-2110"
      },
      {
        "trust": 0.2,
        "url": "http://h18013.www1.hp.com/products/servers/management/agents/index.html"
      },
      {
        "trust": 0.2,
        "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/"
      },
      {
        "trust": 0.2,
        "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0883"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-2355"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-2360"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0788"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2011-4885"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0831"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0830"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3379"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2011-4566"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1823"
      },
      {
        "trust": 0.2,
        "url": "https://www.redhat.com/security/data/cve/cve-2012-0057.html"
      },
      {
        "trust": 0.2,
        "url": "https://www.redhat.com/security/data/cve/cve-2012-2336.html"
      },
      {
        "trust": 0.2,
        "url": "https://www.redhat.com/security/data/cve/cve-2011-4153.html"
      },
      {
        "trust": 0.2,
        "url": "https://www.redhat.com/security/data/cve/cve-2012-1172.html"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/team/contact/"
      },
      {
        "trust": 0.2,
        "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2011-4153"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/knowledge/articles/11258"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/team/key/#package"
      },
      {
        "trust": 0.2,
        "url": "https://www.redhat.com/security/data/cve/cve-2012-0789.html"
      },
      {
        "trust": 0.2,
        "url": "http://bugzilla.redhat.com/):"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-4821"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2012-5217"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2012-2688"
      },
      {
        "trust": 0.1,
        "url": "http://security.gentoo.org/glsa/glsa-201209-03.xml"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-4566"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2688"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1398"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0789"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-1398"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0831"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2336"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2335"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0057"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2012-3450"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3450"
      },
      {
        "trust": 0.1,
        "url": "http://creativecommons.org/licenses/by-sa/2.5"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0830"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3379"
      },
      {
        "trust": 0.1,
        "url": "http://security.gentoo.org/"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1172"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-4885"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1823"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0788"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2311"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3365"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2143"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2012-3365"
      },
      {
        "trust": 0.1,
        "url": "https://bugs.gentoo.org."
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2386"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-4566"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-0831"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1148"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-4885"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3182"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-1938"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-0830"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-2483"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-1823"
      },
      {
        "trust": 0.1,
        "url": "http://www.mandriva.com/security/advisories?name=mdva-2012:004"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2202"
      },
      {
        "trust": 0.1,
        "url": "http://www.mandriva.com/security/advisories?name=mdvsa-2011:166"
      },
      {
        "trust": 0.1,
        "url": "http://lists.grok.org.uk/full-disclosure-charter.html"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-0788"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-0807"
      },
      {
        "trust": 0.1,
        "url": "http://www.mandriva.com/security/"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-1148"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1938"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-3267"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3268"
      },
      {
        "trust": 0.1,
        "url": "http://www.mandriva.com/security/advisories?name=mdvsa-2011:165"
      },
      {
        "trust": 0.1,
        "url": "http://www.mandriva.com/security/advisories?name=mdvsa-2012:065"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-3182"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-3268"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-2202"
      },
      {
        "trust": 0.1,
        "url": "http://www.mandriva.com/security/advisories"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2483"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1657"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0807"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-1172"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-3379"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3267"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-1657"
      },
      {
        "trust": 0.1,
        "url": "http://www.mandriva.com/security/advisories?name=mdvsa-2012:068-1"
      },
      {
        "trust": 0.1,
        "url": "http://www.mandriva.com/security/advisories?name=mdvsa-2011:197"
      },
      {
        "trust": 0.1,
        "url": "http://www.mandriva.com/security/advisories?name=mdvsa-2011:180"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-2335"
      },
      {
        "trust": 0.1,
        "url": "http://www.mandriva.com/security/advisories?name=mdvsa-2012:068"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-5217"
      },
      {
        "trust": 0.1,
        "url": "https://www.redhat.com/security/data/cve/cve-2012-2143.html"
      },
      {
        "trust": 0.1,
        "url": "https://www.redhat.com/security/data/cve/cve-2010-2950.html"
      },
      {
        "trust": 0.1,
        "url": "https://rhn.redhat.com/errata/rhsa-2012-0547.html"
      },
      {
        "trust": 0.1,
        "url": "https://rhn.redhat.com/errata/rhsa-2012-1047.html"
      },
      {
        "trust": 0.1,
        "url": "https://www.redhat.com/security/data/cve/cve-2012-2386.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2950"
      },
      {
        "trust": 0.1,
        "url": "https://rhn.redhat.com/errata/rhsa-2012-1045.html"
      },
      {
        "trust": 0.1,
        "url": "https://rhn.redhat.com/errata/rhsa-2012-0546.html"
      },
      {
        "trust": 0.1,
        "url": "http://www.ubuntu.com/usn/usn-1481-1"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/php5/5.3.5-1ubuntu7.10"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/php5/5.3.10-1ubuntu3.2"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0781"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/php5/5.3.6-13ubuntu3.8"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/php5/5.3.2-1ubuntu4.17"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/php5/5.2.4-2ubuntu5.25"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2012-2317"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "53388"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-002395"
      },
      {
        "db": "PACKETSTORM",
        "id": "123310"
      },
      {
        "db": "PACKETSTORM",
        "id": "116800"
      },
      {
        "db": "PACKETSTORM",
        "id": "112598"
      },
      {
        "db": "PACKETSTORM",
        "id": "122468"
      },
      {
        "db": "PACKETSTORM",
        "id": "114259"
      },
      {
        "db": "PACKETSTORM",
        "id": "114260"
      },
      {
        "db": "PACKETSTORM",
        "id": "113885"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201205-209"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-2336"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "BID",
        "id": "53388"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-002395"
      },
      {
        "db": "PACKETSTORM",
        "id": "123310"
      },
      {
        "db": "PACKETSTORM",
        "id": "116800"
      },
      {
        "db": "PACKETSTORM",
        "id": "112598"
      },
      {
        "db": "PACKETSTORM",
        "id": "122468"
      },
      {
        "db": "PACKETSTORM",
        "id": "114259"
      },
      {
        "db": "PACKETSTORM",
        "id": "114260"
      },
      {
        "db": "PACKETSTORM",
        "id": "113885"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201205-209"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-2336"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2012-05-04T00:00:00",
        "db": "BID",
        "id": "53388"
      },
      {
        "date": "2012-05-14T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2012-002395"
      },
      {
        "date": "2013-09-19T22:22:00",
        "db": "PACKETSTORM",
        "id": "123310"
      },
      {
        "date": "2012-09-24T15:02:14",
        "db": "PACKETSTORM",
        "id": "116800"
      },
      {
        "date": "2012-05-10T15:28:01",
        "db": "PACKETSTORM",
        "id": "112598"
      },
      {
        "date": "2013-07-18T18:51:07",
        "db": "PACKETSTORM",
        "id": "122468"
      },
      {
        "date": "2012-06-28T03:31:01",
        "db": "PACKETSTORM",
        "id": "114259"
      },
      {
        "date": "2012-06-28T03:31:24",
        "db": "PACKETSTORM",
        "id": "114260"
      },
      {
        "date": "2012-06-20T02:58:04",
        "db": "PACKETSTORM",
        "id": "113885"
      },
      {
        "date": "2012-05-14T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201205-209"
      },
      {
        "date": "2012-05-11T10:15:48.527000",
        "db": "NVD",
        "id": "CVE-2012-2336"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2015-04-13T22:15:00",
        "db": "BID",
        "id": "53388"
      },
      {
        "date": "2012-07-26T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2012-002395"
      },
      {
        "date": "2023-04-21T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201205-209"
      },
      {
        "date": "2024-11-21T01:38:54.937000",
        "db": "NVD",
        "id": "CVE-2012-2336"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "116800"
      },
      {
        "db": "PACKETSTORM",
        "id": "114259"
      },
      {
        "db": "PACKETSTORM",
        "id": "114260"
      },
      {
        "db": "PACKETSTORM",
        "id": "113885"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201205-209"
      }
    ],
    "trust": 1.0
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "PHP of  sapi/cgi/cgi_main.c Service disruption in  ( Resource consumption ) Vulnerabilities",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-002395"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "input validation error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201205-209"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.