Just for the case -  I received 506kb attachment...

Andrey
----- Original Message ----- 
From: "James Cox" <[EMAIL PROTECTED]>
To: "Php-Dev" <[EMAIL PROTECTED]>
Sent: Friday, March 01, 2002 5:30 PM
Subject: [PHP-DEV] FW: [PHP-QA] New Windows Binaries


> Note,
> 
> ezmlm is rejecting the attachment, so I have put it here:
> 
> http://www.php.net/~imajes/windows-php.zip ..
> 
> Thanks,
> 
> James
> 
> -----Original Message-----
> From: James Cox [mailto:[EMAIL PROTECTED]]
> Sent: Friday, March 01, 2002 3:26 PM
> To: Php-Dev
> Cc: Php-Qa
> Subject: [PHP-QA] New Windows Binaries
> 
> 
> Hey All,
> 
> Shane and I worked last night to build Windows versions of 4.1.2, and also
> fix a further vulnerability which exists when you call the cgi directly, for
> example in cgi with apache, it was possible to call
> http://example.com/php/php.exe?c:\winnt\repair\sam to get the equivalent of
> the /etc/passwd file.
> 
> We have patched it so it is no longer possible to call it directly, so this
> vulenerability is at least worked around.
> 
> Due to the fact that some webservers fix this by default anyway, we have 2
> new ini options. (see them in the php.ini in the source).
> 
> The particular one you'll need to set is cgi.force-redirect (0|1) so that
> for servers that are not exploitable (eg, IIS) you override the setting.
> 
> I hope that made sense, check out the attached binaries... let us know if
> there are any problems. if not, i'll put them up on the website with
> detauiled (Thought out) install instructions for all those windows users,
> and add comments to the docs.
> 
> Thanks,
> 
> James
> --
> James Cox :: [EMAIL PROTECTED] :: Landonize It! http://landonize.it/
> Was I helpful?  http://www.amazon.co.uk/exec/obidos/wishlist/23IVGHQ61RJGO/
> 
> 
> -- 
> PHP Development Mailing List <http://www.php.net/>
> To unsubscribe, visit: http://www.php.net/unsub.php
> 
> 


-- 
PHP Development Mailing List <http://www.php.net/>
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to