The developers of PHP have released details regarding a vulnerability with
all versions of PHP prior to their current development stream 4.2.0-dev.

Details of this vulnerability may be seen at

    http://security.e-matters.de/advisories/012002.html

or 

    http://lwn.net/daily/php-upload.php3

The version of PHP shipped with Mitel's SME Server product is subject
to this vulnerability. Both the ServiceLink enabled and free download
versions of Mitel's SME Server product are vulnerable.

There are currently no vendor patches that fix the vulnerability. The
original patch supplied by the PHP developers still contains significant
flaws.

As a work around, Mitel is advising its customers to disable PHP uploads
by performing the following actions:

    Mitel SME Server 5.x, e-smith Server & Gateway 4.1.2

        (1) login to the SME Server as the root user

            Please see our "Frequently asked questions" item for details
            on how to login to the SME Server console

                http://www.e-smith.org/faq.php3#8q3

            If you don't have local access to your SME Server, please
            see our "Frequently asked questions" item for details on
            how to remotely login to your SME Server

                http://www.e-smith.org/faq.php3#8q2

        (2) make a copy of the PHP initialisation file /etc/php.ini
        
        (3) edit the /etc/php.ini file to disable file uploads

            /etc/php.ini contains a line of the form

                file_uploads = On ; Whether to allow HTTP file uploads

            This line should be changed to read

                file_uploads = Off

        (4) restart the Apache web server

        Some sample code to perform steps (2), (3) and (4) is included
        at the end of this advisory.

    e-smith Server & Gateway prior to 4.1.2

        - these versions are no longer supported. Mitel recommends that you
          upgrade to SME Server 5.1.2 and then apply the work around
          discussed above.

Applying this work around will disable the listed vulnerabilities,
however it may have some impact on the operability of your SME Server:

    - webmail users will no longer be able to add attachments to
      messages they send via the IMP web based mail interface

    - any other PHP programs you are currently running that require file
      uploads will not accept the file uploads. Note that Mitel does
      not ship any such programs with the products listed above.

Mitel will be reviewing the situation and will be providing more details
as they come to hand.

Regards
The Mitel SME Server Security Team

---------------------------------------------------------------------------

Sample code you may use to apply the work around

    /usr/bin/perl -i.old -pe 's/(file_uploads\s*=\s*)On/$1Off/' /etc/php.ini

    /etc/e-smith/events/actions/restart-httpd-full

---------------------------------------------------------------------------


--
Please report bugs to [EMAIL PROTECTED]
Please mail [EMAIL PROTECTED] (only) to discuss security issues
Support for registered customers and partners to [EMAIL PROTECTED]
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]
Archives by mail and http://www.mail-archive.com/devinfo%40lists.e-smith.org

Reply via email to