Hai ,
I am using php4:4.1.2-7.0.1 on my debian woody. I have read that there are some vulnerabilities in php <= 4.3.9 as follows


[01 - pack() - integer overflow leading to heap bufferoverflow ]
[02 - unpack() - integer overflow leading to heap info leak ]
[03 - safe_mode_exec_dir bypass in multithreaded PHP ]
[04 - safe_mode bypass through path truncation ]
[05 - path truncation in realpath() ]
[06 - unserialize() - wrong handling of negative references ]
[07 - unserialize() - wrong handling of references to freed data ]


Source url : http://www.hardened-php.net/advisories/012004.txt

How do I secure my php in debian woody?

Please advice me

Sarav




-- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Reply via email to