Oh, what does this mean?

 
> Date: Fri, 24 Jul 2009 21:58:21 -0700
> Subject: [Ph4nt0m] Re: 晕,真的假的?PHP未明远程任意文件上传漏洞
> From: [email protected]
> To: [email protected]
> 
> 
> [prev in list] [next in list] [prev in thread] [next in thread]
> 
> List: bugtraq
> Subject: Php Vulnerability N. 2
> From: Stefano Di Paola <stefano.dipaola () wisec ! it>
> Date: 2004-09-15 17:07:37
> Message-ID: 1095268057.2818.20.camel () localhost
> [Download message RAW]
> 
> Let's go for the second one:
> 
> =========================================
> Title: Overwrite $_FILE array in rfc1867 - Mime multipart/form-data
> File
> Upload
> 
> Affected: Php <= 5.0.1
> Not Affected: it seems none
> Vulnerability Type: Possible write of a downloaded file in an
> arbitrary
> location.
> Vendor Status: Vendor has released a fix on cvs.php.net
> 
> ==Summary:
> 
> Bad array parsing in rfc1867.c could lead to overwrite $_FILES array
> elements.
> 
> ==Description:
> 
> I don't know if releasing a POC for this vuln is a good thing because
> php is used widely in the net...
> so if you are interested feel free to contact me.
> 
> 
> ==Solution:
> Authors where contacted and they have released the patch
> that can be found on the CVS
> cvs.php.net
> 
> =================================================
> 
> Regards,
> 
> Stefano
> 
> -..----=oOOo=----=oOOo=---------
> Stefano Di Paola
> Software Engineer
> 
> stefano.dipaola_at_wisec_dot_it
> stefano.dipaola1_at_tin_dot_it
> -------------------------------
> 
> [prev in list] [next in list] [prev in thread] [next in thread]
> 
> 
> 
> 
> Configure | About | News | Donate | Add a list | Sponsors: 10East,
> KoreLogic, Terra-International, Chakpak.com
> 
> > 

_________________________________________________________________
与任何您希望的人分享您的回忆。
http://www.microsoft.com/china/windows/windowslive/products/photos-share.aspx?tab=1
--~--~---------~--~----~------------~-------~--~----~
 要向邮件组发送邮件,请发到 [email protected]
 要退订此邮件,请发邮件至 [email protected]
-~----------~----~----~----~------~----~------~--~---

回复