chiar merge, dar din fericire php 4.03pl1 nu este vulnerabil la atacul asta.


Bogdan

----- Original Message -----
From: "Gushterul" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Monday, 18 December 2000 11:23
Subject: [rlug] php exploit


> > The following security advisory is sent to the securiteam mailing list,
and can be found at the SecuriTeam web site:
> > http://www.securiteam.com
> >
> >
> >   PHP remote format string overflow vulnerability (Exploit code)
> > ------------------------------------------------------------------------
> >
> >
> > SUMMARY
> >
> > A security vulnerability in PHP allows remote attackers with access to a
> > PHP script to cause the PHP interpreter execute arbitrary code by
> > overflowing one of its internal buffers.
> >
> > DETAILS
> >
> > Vulnerable systems:
> > PHP version 3.0.16
> > PHP version 4.0.2
>
>
>
> ---
> Send e-mail to '[EMAIL PROTECTED]' with 'unsubscribe rlug' to
> unsubscribe from this list.


---
Send e-mail to '[EMAIL PROTECTED]' with 'unsubscribe rlug' to 
unsubscribe from this list.

Raspunde prin e-mail lui