Ãë¾àÁ¡ID |
22529 |
À§Çèµµ |
40 |
Æ÷Æ® |
80, ... |
ÇÁ·ÎÅäÄÝ |
TCP |
ºÐ·ù |
CGI |
»ó¼¼¼³¸í |
ÇØ´ç À¥ ¼¹ö´Â 5.3.7 º¸´Ù ´õ ¿À·¡µÈ PHPÀÇ ¹öÀüÀ» °¡µ¿ ÁßÀÌ´Ù. PHP´Â À¥ °³¹ß¿¡ ÀûÇÕÇÏ°í HTML¿¡ ÀÓº£µðµå(embedded) µÉ ¼ö ÀÖ´Â ³Î¸® »ç¿ë ÁßÀÎ ¹ü¿ë ½ºÅ©¸³Æà ¾ð¾îÀÌ´Ù. PHPÀÇ 5.3.7 ÀÌÀüÀÇ ¹öÀüµéÀº ´ÙÁßÀÇ Ãë¾àÁ¡µé¿¡ Ãë¾àÇÑ °ÍÀ¸·Î º¸°íµÇ¾ú´Ù.
- socket_connect() ÇÔ¼ö¿¡ ½ºÅà ¹öÆÛ ¿À¹öÇ÷ο찡 Á¸ÀçÇÑ´Ù. (CVE-2011-1938)
- substr_replace() ÇÔ¼ö¿¡ use-after-free Ãë¾àÁ¡ÀÌ Á¸ÀçÇÑ´Ù. (CVE-2011-1148)
- ZipArchive::addGlob() ¿¡ ÄÚµå ½ÇÇà Ãë¾àÁ¡ÀÌ Á¸ÀçÇÑ´Ù. (CVE-2011-1657)
- crypt_blowfish°¡ 1.2. ·Î ¾÷µ¥ÀÌÆ® µÇ¾ú´Ù.(CVE-2011-2483)
- ´ÙÁß null pointer ÂüÁ¶°¡ Á¸ÀçÇÑ´Ù.
- error_log() ¿¡ Á¤ÀǵÇÁö ¾ÊÀº Å©·¡½¬°¡ Á¸ÀçÇÑ´Ù.
- crypt() ÇÔ¼ö¿¡ ¹öÆÛ ¿À¹öÇ÷ο찡 Á¸ÀçÇÑ´Ù.
* ¾Ë¸²: ÀÌ Á¡°ËÇ׸ñÀº ÀÌ Ãë¾àÁ¡À» Á¡°ËÇϱâ À§ÇØ ÇØ´ç ¿ø°ÝÁö PHP ¼¹öÀÇ ¹öÀü Á¤º¸¸¸À» È®ÀÎÇÑ´Ù. µû¶ó¼ °ÅÁþ ¾ç¼º¹ÝÀÀ(False Positive)À» º¸ÀÏ ¼ö ÀÖ´Ù.
* Âü°í »çÀÌÆ®: http://securityreason.com/achievement_securityalert/101 http://securityreason.com/exploitalert/10738 https://bugs.php.net/bug.php?id=54238 https://bugs.php.net/bug.php?id=54681 https://bugs.php.net/bug.php?id=54939 http://www.php.net/releases/5_3_7.php
* ¿µÇâÀ» ¹Þ´Â Ç÷§Æû: PHP 5.3.7 ÀÌÀüÀÇ 5.3.x ¹öÀüµé Any operating system Any version |
ÇØ°áÃ¥ |
PHP À¥ »çÀÌÆ®ÀÎ http://www.php.net/downloads.php ¿¡¼ ±¸ÇÒ ¼ö ÀÖ´Â PHPÀÇ °¡Àå ÃֽŠ¹öÀü(5.3.7 ȤÀº ÀÌÈÄ)À¸·Î ¾÷±×·¹À̵å ÇÏ¿©¾ß ÇÑ´Ù. |
°ü·Ã URL |
CVE-2011-1148,CVE-2011-1657,CVE-2011-1938,CVE-2011-2202,CVE-2011-2483 (CVE) |
°ü·Ã URL |
46843,47950,48259,49241,49249,49252 (SecurityFocus) |
°ü·Ã URL |
(ISS) |
|