Yeah. Apache is vulneralbe to a buffer overflow in the chunked-encoding, and 
PHP has (i think) a buffer overflow in the multipart/form-data POST form 
handling. It might be a format string though... that just came out this week. 
yesterday, i think.

For dev you might want to consider using the CVS version- that's what I do. 
And if you set up a script for the cron-tab or something you could get the 
latest version overnight... Unfortunatly, Apache CVS is not open to the 
public.



On Tuesday 23 July 2002 17:58 pm, you wrote:
> Well, that would be nice! Sort of 'completes-my-day' :>
> So, both are vulnerable, eh? Great.
>
> Thanks for the warning -- but I'm using them for design only. Once the site
> is on-line, I'll be sure to use the upgraded versions. From what I read
> on-list, however, the current 'upgrades' have their problems too. Luckily,
> I'll be on-line later in the fall, so enough time might pass for the new
> PHP to stabilize.
>
> Regards, Andre
>
> On Tuesday 23 July 2002 08:47 pm, you wrote:
> > What do you guys think? Should we tell him he's running a vulnerable
> > version of PHP _and_ of Apache???
> >
> > On Tuesday 23 July 2002 16:26 pm, Andre Dubuc wrote:
> > > Apache 1.3.23 + PHP 4.1.2 + PostgreSQl 7.2
>
> <snipped>

-- 
He who learns must suffer.

Aeschylus


-- 
PHP General Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to