Re: PHP new vulnarabilities

2006-10-15 Thread Bill Moran
"jan gestre" <[EMAIL PROTECTED]> wrote:

> so the question is, when will the php port be upgraded? it's been days
> already but i still keep on seeing the vulnerability message even if you say
> that it isn't that critical.

1) The suhosin patchset apparently plugs the hole.  Unfortunately,
   portaudit isn't aware of this and still reports the package as
   vulnerable.
2) The PHP folks haven't release the patch yet, although it's in their
   CVS.
3) Somebody _could_ generate a patchfile for the FreeBSD port -- don't
   know why nobody has.

So, the answer is "I don't know."

-- 
Bill Moran

There's more'n seventy little earth's spinning about the galaxy, and the 
meek have inherited not a one.

Malcom Reynolds

___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: PHP new vulnarabilities

2006-10-15 Thread jan gestre

so the question is, when will the php port be upgraded? it's been days
already but i still keep on seeing the vulnerability message even if you say
that it isn't that critical.
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: PHP new vulnarabilities

2006-10-15 Thread Thomas Vogt


Paul Schmehl schrieb:
> --On October 15, 2006 4:31:48 PM -0400 DAve <[EMAIL PROTECTED]>
> wrote:
>>
>> That is a bit extreme. I have a full workload, I put in about 60 hours a
>> week (I work a lot of weekends, I'm working now). I have servers running
>> all different version of apps. I can't go around upgrading everything at
>> the drop of a hat. I would be divorced within a month.
>>
>> If you read the security alerts carefully you will find many require a
>> shell (We don't offer them to clients), some require a specific app to
>> be running that you may not need (rm -f /usr/local/bin/vulnerable_app),
>> and sometimes a simple code audit will tell you if you are vulnerable.
>> It is also not uncommon that a security alert is issued for a problem
>> that has not be proven in the wild.
>>
>> There are plenty of reasons to not follow a security alert, many of them
>> quite valid. Upgrading mission critical systems without throughly
>> understanding the implications just because someone screamed SECURITY!,
>> now that is foolhardy.
>>
> That wasn't the situation here.
> 
> Look, there are several possible scenarios where installing a vulnerable
> app is less of a risk than not installing the app at all.  Business
> functionality *is* important.  However, to arbitrarily say "Use
> DISABLE_VULNERABILITIES" is the answer to an app that won't install is
> always a wrong answer.  *At a minimum* it should come with a warning of
> the possible risks.  Furthermore *upgrading* from a non-vulnerabile app
> to a vulnerable app simply because "it's the latest" is foolhardy in the
> extreme.
> 
> I don't think my statement was any more extreme than "Just use
> DISABLE_VULNERABILITIES and you can install the app" with no warning of
> the risks.  *Especially* when the app is as highly scrutinized as php is
> (not to mention how vulnerabilities are being found in it all the time.)


Does "DISABLE_VULNERABILITIES" not say enough?
When he tried to install php he already got the vulnerabilities message
including a web link.

I think this knob was made for a reason.

Cheers,
Thomas
-- 
Terry Lambert:
"It is not unix's job to stop you from shooting your foot. If you so
choose to do so, then it is UNIX's job to deliver Mr. Bullet to Mr Foot
in the most efficient way it knows."
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: PHP new vulnarabilities

2006-10-15 Thread Paul Schmehl
--On October 15, 2006 4:31:48 PM -0400 DAve <[EMAIL PROTECTED]> 
wrote:


That is a bit extreme. I have a full workload, I put in about 60 hours a
week (I work a lot of weekends, I'm working now). I have servers running
all different version of apps. I can't go around upgrading everything at
the drop of a hat. I would be divorced within a month.

If you read the security alerts carefully you will find many require a
shell (We don't offer them to clients), some require a specific app to
be running that you may not need (rm -f /usr/local/bin/vulnerable_app),
and sometimes a simple code audit will tell you if you are vulnerable.
It is also not uncommon that a security alert is issued for a problem
that has not be proven in the wild.

There are plenty of reasons to not follow a security alert, many of them
quite valid. Upgrading mission critical systems without throughly
understanding the implications just because someone screamed SECURITY!,
now that is foolhardy.


That wasn't the situation here.

Look, there are several possible scenarios where installing a vulnerable 
app is less of a risk than not installing the app at all.  Business 
functionality *is* important.  However, to arbitrarily say "Use 
DISABLE_VULNERABILITIES" is the answer to an app that won't install is 
always a wrong answer.  *At a minimum* it should come with a warning of 
the possible risks.  Furthermore *upgrading* from a non-vulnerabile app to 
a vulnerable app simply because "it's the latest" is foolhardy in the 
extreme.


I don't think my statement was any more extreme than "Just use 
DISABLE_VULNERABILITIES and you can install the app" with no warning of 
the risks.  *Especially* when the app is as highly scrutinized as php is 
(not to mention how vulnerabilities are being found in it all the time.)


Paul Schmehl ([EMAIL PROTECTED])
Adjunct Information Security Officer
The University of Texas at Dallas
http://www.utdallas.edu/ir/security/


Re: PHP new vulnarabilities

2006-10-15 Thread DAve

Paul Schmehl wrote:
--On October 15, 2006 7:49:55 PM +0200 Thomas <[EMAIL PROTECTED]> 
wrote:


Maybe the bug was not in your vuxml when you compiled php5-5.1.6_1. You
can use:
make -DDISABLE_VULNERABILITIES install clean
It will ignore the vuxml entry.

No offense, but anybody who *deliberately* installs a vulnerable version 
of php in *today's* world, is an absolute fool.  Some of us are *stuck* 
with the vulnerable version, because we installed before the 
vulnerability was found.  We can't go back because previous versions are 
*also* vulnerable.


But *deliberately* installing it when you *know* it's vulnerable - and 
one of the most attacked applications on the internet?  Foolhardy 
doesn't quite grasp the insanity of that.




That is a bit extreme. I have a full workload, I put in about 60 hours a 
week (I work a lot of weekends, I'm working now). I have servers running 
all different version of apps. I can't go around upgrading everything at 
the drop of a hat. I would be divorced within a month.


If you read the security alerts carefully you will find many require a 
shell (We don't offer them to clients), some require a specific app to 
be running that you may not need (rm -f /usr/local/bin/vulnerable_app), 
and sometimes a simple code audit will tell you if you are vulnerable. 
It is also not uncommon that a security alert is issued for a problem 
that has not be proven in the wild.


There are plenty of reasons to not follow a security alert, many of them 
quite valid. Upgrading mission critical systems without throughly 
understanding the implications just because someone screamed SECURITY!, 
now that is foolhardy.


DAve

--
Three years now I've asked Google why they don't have a
logo change for Memorial Day. Why do they choose to do logos
for other non-international holidays, but nothing for
Veterans?

Maybe they forgot who made that choice possible.
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: PHP new vulnarabilities

2006-10-15 Thread Paul Schmehl
--On October 15, 2006 2:50:34 PM -0400 Bill Moran 
<[EMAIL PROTECTED]> wrote:


Have you looked at the vulnerability?  There are only certian coding
instances that would actually open this up to any attack vector.  Since
the bug is in unserialize, it's pretty easy audit a program to ensure
that it isn't vulnerable.

"absolute fool" seems a little extreme.


Perhaps.  How many people are talented enough to understand the 
vulnerability and how it's exploited and know *for certain* that they 
won't have a problem?


It would be different if we were talking about an app that isn't exploited 
much.  Php is exploited every day, even when it's fully patched, due to 
the complexity of the attacks and the lack of understanding of most people 
who code in php.


Paul Schmehl ([EMAIL PROTECTED])
Adjunct Information Security Officer
The University of Texas at Dallas
http://www.utdallas.edu/ir/security/


Re: PHP new vulnarabilities

2006-10-15 Thread Joerg Pernfuss
On Sun, 15 Oct 2006 13:07:15 -0500
Paul Schmehl <[EMAIL PROTECTED]> wrote:

> --On October 15, 2006 7:49:55 PM +0200 Thomas
> <[EMAIL PROTECTED]> 
> wrote:
> >
> > Maybe the bug was not in your vuxml when you compiled php5-5.1.6_1.
> > You can use:
> > make -DDISABLE_VULNERABILITIES install clean
> > It will ignore the vuxml entry.
> >
> No offense, but anybody who *deliberately* installs a vulnerable
> version of php in *today's* world, is an absolute fool.  Some of us
> are *stuck* with the vulnerable version, because we installed before
> the vulnerability was found.  We can't go back because previous
> versions are *also* vulnerable.
> 
> But *deliberately* installing it when you *know* it's vulnerable -
> and one of the most attacked applications on the internet?  Foolhardy
> doesn't quite grasp the insanity of that.

Completely true, but in this situation, the update is argueably the
better thing to do.

With the update you trade an integer overflow against this open_basedir
hole that is, as far as I know, harder to exploit and the _1 version
is sure to have the suhosin 0.9.5 patch (5.1.6 can be either 0.9.3 or
0.9.5 depending on checkout date - or none at all) - and with suhosin
one can disable symlink(). What may of course very well break the php
"application", but this is simply "choose your poison".

Joerg

-- 
| /"\   ASCII ribbon   |  GnuPG Key ID | e86d b753 3deb e749 6c3a |
| \ / campaign against |0xbbcaad24 | 5706 1f7d 6cfd bbca ad24 |
|  XHTML in email  |.the next sentence is true.   |
| / \ and news | .the previous sentence was a lie.|


signature.asc
Description: PGP signature


Re: PHP new vulnarabilities

2006-10-15 Thread Bill Moran
Paul Schmehl <[EMAIL PROTECTED]> wrote:

> --On October 15, 2006 7:49:55 PM +0200 Thomas <[EMAIL PROTECTED]> 
> wrote:
> >
> > Maybe the bug was not in your vuxml when you compiled php5-5.1.6_1. You
> > can use:
> > make -DDISABLE_VULNERABILITIES install clean
> > It will ignore the vuxml entry.
> >
> No offense, but anybody who *deliberately* installs a vulnerable version 
> of php in *today's* world, is an absolute fool.  Some of us are *stuck* 
> with the vulnerable version, because we installed before the vulnerability 
> was found.  We can't go back because previous versions are *also* 
> vulnerable.

Have you looked at the vulnerability?  There are only certian coding
instances that would actually open this up to any attack vector.  Since
the bug is in unserialize, it's pretty easy audit a program to ensure
that it isn't vulnerable.

"absolute fool" seems a little extreme.

-- 
Bill Moran

Six men came to kill me one time, and the best of them carried this. It's
a Callahan fullbore autolock, customized trigger and double cartridge
thourough-gage.  It's my very favorite gun.

Jayne Cobb

___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: PHP new vulnarabilities

2006-10-15 Thread Paul Schmehl
--On October 15, 2006 7:49:55 PM +0200 Thomas <[EMAIL PROTECTED]> 
wrote:


Maybe the bug was not in your vuxml when you compiled php5-5.1.6_1. You
can use:
make -DDISABLE_VULNERABILITIES install clean
It will ignore the vuxml entry.

No offense, but anybody who *deliberately* installs a vulnerable version 
of php in *today's* world, is an absolute fool.  Some of us are *stuck* 
with the vulnerable version, because we installed before the vulnerability 
was found.  We can't go back because previous versions are *also* 
vulnerable.


But *deliberately* installing it when you *know* it's vulnerable - and one 
of the most attacked applications on the internet?  Foolhardy doesn't 
quite grasp the insanity of that.


Paul Schmehl ([EMAIL PROTECTED])
Adjunct Information Security Officer
The University of Texas at Dallas
http://www.utdallas.edu/ir/security/


Re: PHP new vulnarabilities

2006-10-15 Thread Paul Schmehl
--On October 15, 2006 12:39:11 PM -0500 Jonathan Horne <[EMAIL PROTECTED]> 
wrote:


ive been scratching my head on this one for a few days too.  i have a
box at  home, that is running 6.2-PRERELEASE.  when i try to install the
lang/php5  port, i get:

[EMAIL PROTECTED] /usr/ports/lang/php5]# make install clean
===>  php5-5.1.6_1 has known vulnerabilities:
=> php -- open_basedir Race Condition Vulnerability.
   Reference:
 => Please update your ports tree and try again.
*** Error code 1

Stop in /usr/ports/lang/php5.

however, my server is running the same port, with no issue whatsoever.

That's because you installed the port on the server *before* the 
vulnerability was found.



[EMAIL PROTECTED] /etc/mail]# pkg_info | grep php5
php5-5.1.6_1
(and many extensions too)

perplexing that one box could have it, while another one (using the same
updated ports tree), refuses it.  could be related to the code branch im
following on my workstaion versus my server?

No.  It's related to the timing of when a security vulnerability was 
discovered.


Paul Schmehl ([EMAIL PROTECTED])
Adjunct Information Security Officer
The University of Texas at Dallas
http://www.utdallas.edu/ir/security/


Re: PHP new vulnarabilities

2006-10-15 Thread Thomas
Hi Jonathan

Jonathan Horne schrieb:
> On Sunday 15 October 2006 08:12, Joerg Pernfuss wrote:
>> On Sun, 15 Oct 2006 14:31:25 +0200
>>
>> "Khaled J. Hussein" <[EMAIL PROTECTED]> wrote:
>>> hi all
>>>
>>> last time i found this when i run portaudit -Fda
>>>
>>> Affected package: php5-5.1.6
>>> Type of problem: php -- _ecalloc Integer Overflow Vulnerability.
>>> Reference:
>>> >> 2df.html>
>>>
>>> how can i fix this
>> update ypur portstree. you'll get php5-5.1.6_1 which fixes the _ecalloc
>> overflow, but not yet the open_basedir race condition.
>>
>>  Joerg
> 
> ive been scratching my head on this one for a few days too.  i have a box at 
> home, that is running 6.2-PRERELEASE.  when i try to install the lang/php5 
> port, i get:
> 
> [EMAIL PROTECTED] /usr/ports/lang/php5]# make install clean
> ===>  php5-5.1.6_1 has known vulnerabilities:
> => php -- open_basedir Race Condition Vulnerability.
>Reference: 
> 
> => Please update your ports tree and try again.
> *** Error code 1
> 
> Stop in /usr/ports/lang/php5.
> 
> however, my server is running the same port, with no issue whatsoever.
> 
> [EMAIL PROTECTED] /etc/mail]# pkg_info | grep php5
> php5-5.1.6_1
> (and many extensions too)
> 
> perplexing that one box could have it, while another one (using the same 
> updated ports tree), refuses it.  could be related to the code branch im 
> following on my workstaion versus my server?

Maybe the bug was not in your vuxml when you compiled php5-5.1.6_1. You
can use:
make -DDISABLE_VULNERABILITIES install clean
It will ignore the vuxml entry.

Cheers,
Thomas


___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: PHP new vulnarabilities

2006-10-15 Thread Jonathan Horne
On Sunday 15 October 2006 08:12, Joerg Pernfuss wrote:
> On Sun, 15 Oct 2006 14:31:25 +0200
>
> "Khaled J. Hussein" <[EMAIL PROTECTED]> wrote:
> > hi all
> >
> > last time i found this when i run portaudit -Fda
> >
> > Affected package: php5-5.1.6
> > Type of problem: php -- _ecalloc Integer Overflow Vulnerability.
> > Reference:
> >  >2df.html>
> >
> > how can i fix this
>
> update ypur portstree. you'll get php5-5.1.6_1 which fixes the _ecalloc
> overflow, but not yet the open_basedir race condition.
>
>   Joerg

ive been scratching my head on this one for a few days too.  i have a box at 
home, that is running 6.2-PRERELEASE.  when i try to install the lang/php5 
port, i get:

[EMAIL PROTECTED] /usr/ports/lang/php5]# make install clean
===>  php5-5.1.6_1 has known vulnerabilities:
=> php -- open_basedir Race Condition Vulnerability.
   Reference: 

=> Please update your ports tree and try again.
*** Error code 1

Stop in /usr/ports/lang/php5.

however, my server is running the same port, with no issue whatsoever.

[EMAIL PROTECTED] /etc/mail]# pkg_info | grep php5
php5-5.1.6_1
(and many extensions too)

perplexing that one box could have it, while another one (using the same 
updated ports tree), refuses it.  could be related to the code branch im 
following on my workstaion versus my server?

thanks,
jonathan
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: PHP new vulnarabilities

2006-10-15 Thread Joerg Pernfuss
On Sun, 15 Oct 2006 14:31:25 +0200
"Khaled J. Hussein" <[EMAIL PROTECTED]> wrote:

> hi all
> 
> last time i found this when i run portaudit -Fda
> 
> Affected package: php5-5.1.6
> Type of problem: php -- _ecalloc Integer Overflow Vulnerability.
> Reference:
> 
> 
> how can i fix this

update ypur portstree. you'll get php5-5.1.6_1 which fixes the _ecalloc
overflow, but not yet the open_basedir race condition.

Joerg
-- 
| /"\   ASCII ribbon   |  GnuPG Key ID | e86d b753 3deb e749 6c3a |
| \ / campaign against |0xbbcaad24 | 5706 1f7d 6cfd bbca ad24 |
|  XHTML in email  |.the next sentence is true.   |
| / \ and news | .the previous sentence was a lie.|


signature.asc
Description: PGP signature


Re: PHP new vulnarabilities

2006-10-15 Thread Robert Joosten
Hi Khaled,

> Affected package: php5-5.1.6
> Type of problem: php -- _ecalloc Integer Overflow Vulnerability.
> 
> how can i fix this

Compile php from source after applying 
http://www.hardened-php.net/files/CVE-2006-4812.patch ?

I dodn't deploy 5 yet, but maybe an other fix is underway ?

Hth.

Regards,
Robert
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"