blob: 3f5511305376e9517044fd2db8dc8edd72169064 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="201006-13">
<title>Smarty: Multiple vulnerabilities</title>
Multiple vulnerabilities in the Smarty template engine might allow remote
attackers to execute arbitrary PHP code.
<product type="ebuild">smarty</product>
<announced>June 02, 2010</announced>
<revised>June 02, 2010: 01</revised>
<package name="dev-php/smarty" auto="yes" arch="*">
<unaffected range="ge">2.6.23</unaffected>
<vulnerable range="lt">2.6.23</vulnerable>
Smarty is a template engine for PHP.
Multiple vulnerabilities have been discovered in Smarty:
<li>The vendor reported that the modifier.regex_replace.php plug-in
contains an input sanitation flaw related to the ASCII NUL character
<li>The vendor reported that the
_expand_quoted_text() function in libs/Smarty_Compiler.class.php
contains an input sanitation flaw via multiple vectors (CVE-2008-4810,
<li>Nine:Situations:Group::bookoo reported that
the smarty_function_math() function in libs/plugins/function.math.php
contains input sanitation flaw (CVE-2009-1669).</li>
<impact type="normal">
These issues might allow a remote attacker to execute arbitrary PHP
There is no known workaround at this time.
All Smarty users should upgrade to an unaffected version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=dev-php/smarty-2.6.23&quot;</code>
NOTE: This is a legacy GLSA. Updates for all affected architectures are
available since June 2, 2009. It is likely that your system is already
no longer affected by this issue.
<uri link="">CVE-2008-1066</uri>
<uri link="">CVE-2008-4810</uri>
<uri link="">CVE-2008-4811</uri>
<uri link="">CVE-2009-1669</uri>
<metadata tag="requester" timestamp="Sat, 15 Mar 2008 21:06:13 +0000">
<metadata tag="bugReady" timestamp="Fri, 19 Sep 2008 19:51:21 +0000">
<metadata tag="submitter" timestamp="Sun, 30 May 2010 11:16:44 +0000">