OpenPKG CVS Repository
  http://cvs.openpkg.org/
  ____________________________________________________________________________

  Server: cvs.openpkg.org                  Name:   Ralf S. Engelschall
  Root:   /e/openpkg/cvs                   Email:  [EMAIL PROTECTED]
  Module: openpkg-web                      Date:   18-Feb-2003 17:22:02
  Branch: HEAD                             Handle: 2003021816220100

  Modified files:
    openpkg-web/security    OpenPKG-SA-2003.010-php.txt

  Log:
    final signing

  Summary:
    Revision    Changes     Path
    1.3         +30 -19     openpkg-web/security/OpenPKG-SA-2003.010-php.txt
  ____________________________________________________________________________

  patch -p0 <<'@@ .'
  Index: openpkg-web/security/OpenPKG-SA-2003.010-php.txt
  ============================================================================
  $ cvs diff -u -r1.2 -r1.3 OpenPKG-SA-2003.010-php.txt
  --- openpkg-web/security/OpenPKG-SA-2003.010-php.txt  18 Feb 2003 13:39:36 -0000     
 1.2
  +++ openpkg-web/security/OpenPKG-SA-2003.010-php.txt  18 Feb 2003 16:22:01 -0000     
 1.3
  @@ -1,3 +1,5 @@
  +-----BEGIN PGP SIGNED MESSAGE-----
  +Hash: SHA1
   
   ________________________________________________________________________
   
  @@ -17,28 +19,29 @@
                        >= apache-1.3.27-20021228   >= apache-1.3.27-20030218
   OpenPKG 1.2          == php-4.3.0-1.2.0          >= php-4.3.0-1.2.1
                        == apache-1.3.27-1.2.0      >= apache-1.3.27-1.2.1
  -OpenPKG 1.1          none                        n.a.
  +OpenPKG 1.1          none                        N.A.
   
   Dependent Packages:  none
   
   Description:
  -  Kosmas Skiadopoulos discovered a serious security vulnerability [0] in
  -  the CGI SAPI of PHP version 4.3.0. PHP [1] contains code for preventing
  -  direct access to the CGI binary with configure option
  -  '--enable-force-cgi-redirect' and php.ini option 'cgi.force_redirect'.
  -  In PHP 4.3.0 there is a bug which renders these options useless. Please
  -  note that this bug does NOT affect any of the other SAPI modules such as
  -  the Apache or ISAPI modules.
  -
  -  Anyone with access to websites hosted on a web server which employs the
  -  CGI module may exploit this vulnerability to gain access to any file
  -  readable by the user under which the webserver runs. A remote attacker
  -  could also trick PHP into executing arbitrary PHP code if attacker is
  -  able to inject the code into files accessible by the CGI. This could be
  -  for example the web server access-logs.
  -
  -  Please check whether you are affected by running '<prefix>/bin/rpm -qa |
  -  grep php'. If you have either the 'php' or 'apache with mod_php'
  +  Kosmas Skiadopoulos discovered a serious security vulnerability [0]
  +  in the CGI SAPI of PHP version 4.3.0. PHP [1] contains code for
  +  preventing direct access to the CGI binary with configure option
  +  "--enable-force-cgi-redirect" and php.ini option "cgi.force_redirect".
  +  In PHP 4.3.0 there is a bug which renders these options useless.
  +  Please note that this bug does NOT affect any of the other SAPI
  +  modules such as the Apache or ISAPI modules.
  +
  +  Anyone with access to websites hosted on a web server which employs
  +  the CGI module may exploit this vulnerability to gain access to any
  +  file readable by the user under which the webserver runs. A remote
  +  attacker could also trick PHP into executing arbitrary PHP code if
  +  attacker is able to inject the code into files accessible by the CGI.
  +  This could be for example the web server access-logs.
  +
  +  Please check whether you are affected by running "<prefix>/bin/rpm -q
  +  php apache" and "<prefix>/bin/rpm -qi apache | grep with_mod_php".
  +  If you have either the "php" or "apache" with option "with_mod_php"
     packages installed and their version is affected (see above), we
     recommend that you immediately upgrade (see Solution) [2][3].
   
  @@ -57,7 +60,8 @@
     ftp> get apache-1.3.27-1.2.1.src.rpm
     ftp> bye
     $ <prefix>/bin/rpm -v --checksig apache-1.3.27-1.2.1.src.rpm
  -  $ <prefix>/bin/rpm --rebuild apache-1.3.27-1.2.1.src.rpm --define 'with_mod_php 
yes'
  +  $ <prefix>/bin/rpm --rebuild --define 'with_mod_php yes' \
  +        apache-1.3.27-1.2.1.src.rpm 
     $ su -
     # <prefix>/bin/rpm -Fvh <prefix>/RPM/PKG/apache-1.3.27-1.2.1.*.rpm
   ________________________________________________________________________
  @@ -82,3 +86,10 @@
   the command "gpg --verify --keyserver keyserver.pgp.com".
   ________________________________________________________________________
   
  +-----BEGIN PGP SIGNATURE-----
  +Comment: OpenPKG <[EMAIL PROTECTED]>
  +
  +iD8DBQE+Ul0CgHWT4GPEy58RAiylAJ0UMcYLUNYbOOl1oFIuqfAxWALcagCgxUsx
  +I0CUzWnNLnX57B9wHXCwWWQ=
  +=dpIT
  +-----END PGP SIGNATURE-----
  @@ .
______________________________________________________________________
The OpenPKG Project                                    www.openpkg.org
CVS Repository Commit List                     [EMAIL PROTECTED]

Reply via email to