FYI - I know many of you are into PHP, not to be confused with PCP, thought you should know about this. Have a great day.
>>Date: Wed, 27 Feb 2002 16:52:42 -0500 (EST) >>From: CERT Advisory <[EMAIL PROTECTED]> >>To: [EMAIL PROTECTED] >>Organization: CERT(R) Coordination Center - +1 412-268-7090 >>List-Help: <http://www.cert.org/>, <mailto:[EMAIL PROTECTED]?body=help> >>List-Subscribe: <mailto:[EMAIL PROTECTED]?body=subscribe%20cert-advisory> >> >> >> >>-----BEGIN PGP SIGNED MESSAGE----- >> >>CERT Advisory CA-2002-05 Multiple Vulnerabilities in PHP fileupload >> >> Original release date: February 27, 2002 >> Last revised: -- >> Source: CERT/CC >> >> A complete revision history can be found at the end of this file. >> >>Systems Affected >> >> * Web servers running PHP >> >>Overview >> >> Multiple vulnerabilities exist in the PHP scripting language. These >> vulnerabilities could allow a remote attacker to execute arbitrary >> code with the privileges of the PHP process. >> >>I. Description >> >> PHP is a scripting language widely used in web development. PHP can be >> installed on a variety of web servers, including Apache, IIS, Caudium, >> Netscape and iPlanet, OmniHTTPd and others. Vulnerabilities in the >> php_mime_split function may allow an intruder to execute arbitrary >> code with the privileges of the web server. For additional details, >> see >> >> http://security.e-matters.de/advisories/012002.html >> >> Web servers that do not have PHP installed are not affected by this >> vulnerability. >> >> The CERT/CC is tracking this set of vulnerabilities as VU#297363. At >> this time, these vulnerabilities have not been assigned a CVE >> identifier. >> >>II. Impact >> >> Intruders can execute arbitrary code with the privileges of the web >> server, or interrupt normal operations of the web server. >> >>III. Solution >> >>Apply a Patch >> >> Upgrade to PHP version 4.1.2, available from >> >> http://www.php.net/do_download.php?download_file=php-4.1.2.tar.gz >> >> If upgrading is not possible, apply patches as described at >> http://www.php.net/downloads.php: >> * For PHP 4.10/4.11 >> >>http://www.php.net/do_download.php?download_file=rfc1867.c.diff-4.1.x.gz >> * For PHP 4.06 >> >>http://www.php.net/do_download.php?download_file=rfc1867.c.diff-4.0.6.gz >> * For PHP 3.0 >> http://www.php.net/do_download.php?download_file=mime.c.diff-3.0.gz >> >> If you are using version 4.20-dev, you are not affected by this >> vulnerability. Quoting from >> http://security.e-matters.de/advisories/012002.htm: >> >> "[U]sers running PHP 4.2.0-dev from cvs are not vulnerable to any >> of the described bugs because the fileupload code was completly >> rewritten for the 4.2.0 branch." >> >>Disable fileuploads >> >> If upgrading is not possible or a patch cannot be applied, you can >> avoid these vulnerabilities by disabling fileupload support. Edit the >> PHP configuration file php.ini as follows: >> >> file_uploads = off >> >> Note that this setting only applies to version 4.0.3 and above. >> However, this will prevent you from using fileuploads, which may not >> be acceptable in your environment. >> >>Appendix A. - Vendor Information >> >> This appendix contains information provided by vendors for this >> advisory. When vendors report new information to the CERT/CC, we >> update this section and note the changes in our revision history. If a >> particular vendor is not listed below, we have not received their >> comments. >> >>Apache Software Foundation >> >> Information about this vulnerability is available from >> http://www.php.net >> >>FreeBSD >> >> FreeBSD does not include any version of PHP by default, and so is not >> vulnerable. However, the FreeBSD Ports Collection does contain both >> PHP3 and PHP4 packages. Updates to the PHP packages are in progress >> and corrected packages will be available in the near future. >> >>MandrakeSoft >> >> MandrakeSoft distributes PHP in all distributions and we are currently >> working on patching our versions of PHP for Linux-Mandrake 7.1 and >> 7.2; Mandrake Linux 8.0, 8.0/ppc, 8.1, and 8.1/ia64; Single Network >> Firewall 7.2; Corporate Server 1.0.1. >> >> We anticipate having the updates out by the end of the week. >> >>Microsoft >> >> We do not use PHP in any products. >> >>NCSA >> >> NCSA does not include PHP as an add-in or bundled component in any >> products distributed. >> >>Red Hat >> >> Red Hat was notified of this issue on 27th February 2002. All >> supported versions of Red Hat Linux ship with PHP packages that are >> affected by these vulnerabilities. We will shortly be releasing errata >> packages which contain patched versions that are not vulnerable. The >> errata packages and our advisory will be available on our web site at >> the URL below. At the same time users of the Red Hat Network will be >> able to update their systems to patched versions using the up2date >> tool. >> >> http://www.redhat.com/support/errata/RHSA-2002-035.html >> _________________________________________________________________ >> >> The CERT Coordination Center thanks Stefan Esser, upon whose advisory >> this document is largely based. >> _________________________________________________________________ >> >> Author: Shawn V. Hernan >> _________________________________________________________________ >> >>Appendix B. - References >> >> 1. http://www.kb.cert.org/vuls/id/297363 >> 2. http://security.e-matters.de/advisories/012002.html >> 3. http://www.iss.net/security_center/static/8281.php >> ______________________________________________________________________ >> >> This document is available from: >> http://www.cert.org/advisories/CA-2002-05.html >> ______________________________________________________________________ >> >>CERT/CC Contact Information >> >> Email: [EMAIL PROTECTED] >> Phone: +1 412-268-7090 (24-hour hotline) >> Fax: +1 412-268-6989 >> Postal address: >> CERT Coordination Center >> Software Engineering Institute >> Carnegie Mellon University >> Pittsburgh PA 15213-3890 >> U.S.A. >> >> CERT/CC personnel answer the hotline 08:00-17:00 EST(GMT-5) / >> EDT(GMT-4) Monday through Friday; they are on call for emergencies >> during other hours, on U.S. holidays, and on weekends. >> >> Using encryption >> >> We strongly urge you to encrypt sensitive information sent by email. >> Our public PGP key is available from >> >> http://www.cert.org/CERT_PGP.key >> >> If you prefer to use DES, please call the CERT hotline for more >> information. >> >> Getting security information >> >> CERT publications and other security information are available from >> our web site >> >> http://www.cert.org/ >> >> To subscribe to the CERT mailing list for advisories and bulletins, >> send email to [EMAIL PROTECTED] Please include in the body of your >> message >> >> subscribe cert-advisory >> >> * "CERT" and "CERT Coordination Center" are registered in the U.S. >> Patent and Trademark Office. >> ______________________________________________________________________ >> >> NO WARRANTY >> Any material furnished by Carnegie Mellon University and the Software >> Engineering Institute is furnished on an "as is" basis. Carnegie >> Mellon University makes no warranties of any kind, either expressed or >> implied as to any matter including, but not limited to, warranty of >> fitness for a particular purpose or merchantability, exclusivity or >> results obtained from use of the material. Carnegie Mellon University >> does not make any warranty of any kind with respect to freedom from >> patent, trademark, or copyright infringement. >> _________________________________________________________________ >> >> Conditions for use, disclaimers, and sponsorship information >> >> Copyright 2002 Carnegie Mellon University. >> >> Revision History >>February 27, 2002: Initial release >> >>-----BEGIN PGP SIGNATURE----- >>Version: PGP 6.5.8 >> >>iQCVAwUBPH1T3KCVPMXQI2HJAQGMbwP+NglOFSnTqmCynobjzrF8Onalm5cHNePn >>+fTVP3JVrw5ktpyxtjnqveoMzaai0utVMlIDh4K34MOyipSD37W0ZLRezs0okyN0 >>bQt1UTW+pfBQX8CsZ1anCncEmF0/+fBcl3iNtp7jAT99PJveRCsH8GJVpHx/4nT1 >>pHvl8ng0VWs= >>=+NsK >>-----END PGP SIGNATURE----- _______________________________________________ cobalt-developers mailing list [EMAIL PROTECTED] http://list.cobalt.com/mailman/listinfo/cobalt-developers