Novell is now a part of Micro Focus

Security update for PHP4


(Last modified: 28SEP2004)

solutions Security update for PHP4 SuSE Linux Maintenance Web (eeaf995d80f550961f0fa0dd0465e21f)

Applies to

Package: php4
Product(s): SUSE CORE 9 for x86
SUSE CORE 9 for IBM S/390 31bit
SUSE CORE 9 for IBM zSeries 64bit
SUSE CORE 9 for AMD64 and Intel EM64T
Patch: patch-9379
Release: 20040928
Obsoletes: 5ea103964008b25aad2fdf54b94e9a3f


Anyone using PHP4 should update.



Problem description

This update fixes four security issues. The first and less important bug can be exploited by remote attackers to bypass HTML tag filtering (cross-site-scripting prevention) by supplying special tags. These kind of tags should be ignored because they are not valid but they get accepted by some commercial web-browsers. The second bug can be exploited by remote attackers by triggering the memory_limit in unsafe states of a PHP execution path to execute arbitrary code. The third and fourth bug depend in bad array parsing of the user input via GET, POST and COOKIE. One could lead to overwriting variable $_FILES, while the other could expose some pieces of the php memory to the attacker.
Moreover, the dlopen() flag for opening php4 modules has been reverted back to RTLD_GLOBAL, as RTDL_LOCAL had some side effects when extensions like php4-unixODBC load their own libraries (unixODBC uses RTLD_GLOBAL). To make the fix complete, php4-recode now conflicts with php4-imap, php4-mysql and apache2-mod_auth_mysql.


Please install the updates provided at the location noted below.

Installation notes

This update is provided as an RPM package that can easily be installed onto a running system.
First you need to uninstall php4-recode if it's installed with the following command:
rpm -e php4-recode
Then install the update with:
rpm -Fvh php4.rpm apache-mod_php4.rpm apache2-mod_php4.rpm mod_php4-core.rpm mod_php4-servlet.rpm php4-imap.rpm php4-mysql.rpm php4-servlet.rpm php4-session.rpm
After the update you need to restart Apache with the following command:
rcapache restart

links to download packages

Download Source Packages

Download the source code of the patches for maintained products.


The Origin of this information may be internal or external to Novell. Novell makes all reasonable efforts to verify this information. However, the information provided in this document is for your information only. Novell makes no explicit or implied claims to the validity of this information.

Any trademarks referenced in this document are the property of their respective owners. Consult your product manuals for complete trademark information.

© Micro Focus