Hi, Thanks heaps for the info. Passed it on to the PostgreSQL "General" mailing list.
:) Regards and best wishes, Justin Clift "R. DuFresne" wrote: > > Considering the plethroa of php users on the list, and the fact many are > perhaps not reading bugtraq: > > ---------- Forwarded message ---------- > From: [EMAIL PROTECTED] > Subject: Advisory 012002: PHP remote vulnerabilities > Date: Wed, 27 Feb 2002 12:30:56 +0100 > To: [EMAIL PROTECTED], [EMAIL PROTECTED] > > e-matters GmbH > www.e-matters.de > > -= Security Advisory =- > > Advisory: Multiple Remote Vulnerabilites within PHP's fileupload code > Release Date: 2002/02/27 > Last Modified: 2002/02/27 > Author: Stefan Esser [[EMAIL PROTECTED]] > > Application: PHP v3.10-v3.18, v4.0.1-v4.1.1 > Severity: Several vulnerabilities in PHP's fileupload code allow > remote compromise > Risk: Critical > Vendor Status: Patches Released > Reference: http://security.e-matters.de/advisories/012002.html > > Overview: > > We found several flaws in the way PHP handles multipart/form-data POST > requests. Each of the flaws could allow an attacker to execute arbitrary > code on the victim's system. > > > Details: > > PHP supports multipart/form-data POST requests (as described in RFC1867) > known as POST fileuploads. Unfourtunately there are several flaws in the > php_mime_split function that could be used by an attacker to execute > arbitrary code. During our research we found out that not only PHP4 but > also older versions from the PHP3 tree are vulnerable. > > > The following is a list of bugs we found: > > PHP 3.10-3.18 > > - broken boundary check (hard to exploit) > - arbitrary heap overflow (easy exploitable) > > PHP 4.0.1-4.0.3pl1 > > - broken boundary check (hard to exploit) > - heap off by one (easy exploitable) > > PHP 4.0.2-4.0.5 > > - 2 broken boundary checks (one very easy and one hard to exploit) > > PHP 4.0.6-4.0.7RC2 > > - broken boundary check (very easy to exploit) > > PHP 4.0.7RC3-4.1.1 > > - broken boundary check (hard to exploit) > > Finally I want to mention that most of these vulnerabilities are > exploitable only on linux or solaris. But the heap off by one is only > exploitable on x86 architecture and the arbitrary heap overflow in > PHP3 is exploitable on most OS and architectures. (This includes *BSD) > > Users running PHP 4.2.0-dev from cvs are not vulnerable to any of the > described bugs because the fileupload code was completly rewritten for > the 4.2.0 branch. > > > Proof of Concept: > > e-matters is not going to release exploits for any of the discovered > vulnerabilities to the public. > > > Vendor Response: > > Because I am part of the php developer team there is not much I can > write here... > > 27th February 2002 - An updated version of php and the patch for > these vulnerabilities are now available at: > http://www.php.net/downloads.php > > > Recommendation: > > If you are running PHP 4.0.3 or above one way to workaround these > bugs is to disable the fileupload support within your php.ini > (file_uploads = Off) If you are running php as module keep in mind > to restart the webserver. Anyway you should better install the > fixed or a properly patched version to be safe. > > > Sidenotice: > > This advisory is so short because I don't want to give out more info > than is needed. > > Users running the developer version of php (4.2.0-dev) are not > vulnerable to these bugs because the fileupload support was completly > rewritten for that branch. > > GPG-Key: > > http://security.e-matters.de/gpg_key.asc > > pub 1024D/75E7AAD6 2002-02-26 e-matters GmbH - Securityteam > Key fingerprint = 43DD 843C FAB9 832A E5AB CAEB 81F2 8110 75E7 AAD6 > > Copyright 2002 Stefan Esser. All rights reserved. > > ______________________________________________________________________ > Apache Interface to OpenSSL (mod_ssl) www.modssl.org > User Support Mailing List [EMAIL PROTECTED] > Automated List Manager [EMAIL PROTECTED] -- "My grandfather once told me that there are two kinds of people: those who work and those who take the credit. He told me to try to be in the first group; there was less competition there." - Indira Gandhi ______________________________________________________________________ Apache Interface to OpenSSL (mod_ssl) www.modssl.org User Support Mailing List [EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED]