Is this patch for Windows already applied 
to CVS's PHP 4_0_7 branch ?

Rui

> Shane and I worked last night to build Windows versions of 4.1.2, and also
> fix a further vulnerability which exists when you call the cgi directly, for
> example in cgi with apache, it was possible to call
> http://example.com/php/php.exe?c:\winnt\repair\sam to get the equivalent of
> the /etc/passwd file.
> 
> We have patched it so it is no longer possible to call it directly, so this
> vulenerability is at least worked around.
> 
> Due to the fact that some webservers fix this by default anyway, we have 2
> new ini options. (see them in the php.ini in the source).
> 
> The particular one you'll need to set is cgi.force-redirect (0|1) so that
> for servers that are not exploitable (eg, IIS) you override the setting.
> 
> I hope that made sense, check out the attached binaries... let us know if
> there are any problems. if not, i'll put them up on the website with
> detauiled (Thought out) install instructions for all those windows users,
> and add comments to the docs.
> 
> Thanks,
> 
> James


-- 
-----------------------------------------------------
Rui Hirokawa <[EMAIL PROTECTED]>
             <[EMAIL PROTECTED]>

-- 
PHP Development Mailing List <http://www.php.net/>
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to