PHP new vulnarabilities

2006-10-15 Thread Khaled J. Hussein
hi all

last time i found this when i run portaudit -Fda

Affected package: php5-5.1.6
Type of problem: php -- _ecalloc Integer Overflow Vulnerability.
Reference:
http://www.FreeBSD.org/ports/portaudit/e329550b-54f7-11db-a5ae-00508d6a62df.html

how can i fix this



-- 
Best regards,


Khaled J. Hussein
System Administrator
Hadara Technologies Group
[EMAIL PROTECTED]
http://www.palnet.com
Tel. +972 2-240-3434
Fax. +972 2-240-3430


___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: PHP new vulnarabilities

2006-10-15 Thread Robert Joosten
Hi Khaled,

 Affected package: php5-5.1.6
 Type of problem: php -- _ecalloc Integer Overflow Vulnerability.
 http://www.FreeBSD.org/ports/portaudit/e329550b-54f7-11db-a5ae-00508d6a62df.html
 how can i fix this

Compile php from source after applying 
http://www.hardened-php.net/files/CVE-2006-4812.patch ?

I dodn't deploy 5 yet, but maybe an other fix is underway ?

Hth.

Regards,
Robert
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: PHP new vulnarabilities

2006-10-15 Thread Joerg Pernfuss
On Sun, 15 Oct 2006 14:31:25 +0200
Khaled J. Hussein [EMAIL PROTECTED] wrote:

 hi all
 
 last time i found this when i run portaudit -Fda
 
 Affected package: php5-5.1.6
 Type of problem: php -- _ecalloc Integer Overflow Vulnerability.
 Reference:
 http://www.FreeBSD.org/ports/portaudit/e329550b-54f7-11db-a5ae-00508d6a62df.html
 
 how can i fix this

update ypur portstree. you'll get php5-5.1.6_1 which fixes the _ecalloc
overflow, but not yet the open_basedir race condition.

Joerg
-- 
| /\   ASCII ribbon   |  GnuPG Key ID | e86d b753 3deb e749 6c3a |
| \ / campaign against |0xbbcaad24 | 5706 1f7d 6cfd bbca ad24 |
|  XHTML in email  |.the next sentence is true.   |
| / \ and news | .the previous sentence was a lie.|


signature.asc
Description: PGP signature


Re: PHP new vulnarabilities

2006-10-15 Thread Jonathan Horne
On Sunday 15 October 2006 08:12, Joerg Pernfuss wrote:
 On Sun, 15 Oct 2006 14:31:25 +0200

 Khaled J. Hussein [EMAIL PROTECTED] wrote:
  hi all
 
  last time i found this when i run portaudit -Fda
 
  Affected package: php5-5.1.6
  Type of problem: php -- _ecalloc Integer Overflow Vulnerability.
  Reference:
  http://www.FreeBSD.org/ports/portaudit/e329550b-54f7-11db-a5ae-00508d6a6
 2df.html
 
  how can i fix this

 update ypur portstree. you'll get php5-5.1.6_1 which fixes the _ecalloc
 overflow, but not yet the open_basedir race condition.

   Joerg

ive been scratching my head on this one for a few days too.  i have a box at 
home, that is running 6.2-PRERELEASE.  when i try to install the lang/php5 
port, i get:

[EMAIL PROTECTED] /usr/ports/lang/php5]# make install clean
===  php5-5.1.6_1 has known vulnerabilities:
= php -- open_basedir Race Condition Vulnerability.
   Reference: 
http://www.FreeBSD.org/ports/portaudit/edabe438-542f-11db-a5ae-00508d6a62df.html
= Please update your ports tree and try again.
*** Error code 1

Stop in /usr/ports/lang/php5.

however, my server is running the same port, with no issue whatsoever.

[EMAIL PROTECTED] /etc/mail]# pkg_info | grep php5
php5-5.1.6_1
(and many extensions too)

perplexing that one box could have it, while another one (using the same 
updated ports tree), refuses it.  could be related to the code branch im 
following on my workstaion versus my server?

thanks,
jonathan
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: PHP new vulnarabilities

2006-10-15 Thread Thomas
Hi Jonathan

Jonathan Horne schrieb:
 On Sunday 15 October 2006 08:12, Joerg Pernfuss wrote:
 On Sun, 15 Oct 2006 14:31:25 +0200

 Khaled J. Hussein [EMAIL PROTECTED] wrote:
 hi all

 last time i found this when i run portaudit -Fda

 Affected package: php5-5.1.6
 Type of problem: php -- _ecalloc Integer Overflow Vulnerability.
 Reference:
 http://www.FreeBSD.org/ports/portaudit/e329550b-54f7-11db-a5ae-00508d6a6
 2df.html

 how can i fix this
 update ypur portstree. you'll get php5-5.1.6_1 which fixes the _ecalloc
 overflow, but not yet the open_basedir race condition.

  Joerg
 
 ive been scratching my head on this one for a few days too.  i have a box at 
 home, that is running 6.2-PRERELEASE.  when i try to install the lang/php5 
 port, i get:
 
 [EMAIL PROTECTED] /usr/ports/lang/php5]# make install clean
 ===  php5-5.1.6_1 has known vulnerabilities:
 = php -- open_basedir Race Condition Vulnerability.
Reference: 
 http://www.FreeBSD.org/ports/portaudit/edabe438-542f-11db-a5ae-00508d6a62df.html
 = Please update your ports tree and try again.
 *** Error code 1
 
 Stop in /usr/ports/lang/php5.
 
 however, my server is running the same port, with no issue whatsoever.
 
 [EMAIL PROTECTED] /etc/mail]# pkg_info | grep php5
 php5-5.1.6_1
 (and many extensions too)
 
 perplexing that one box could have it, while another one (using the same 
 updated ports tree), refuses it.  could be related to the code branch im 
 following on my workstaion versus my server?

Maybe the bug was not in your vuxml when you compiled php5-5.1.6_1. You
can use:
make -DDISABLE_VULNERABILITIES install clean
It will ignore the vuxml entry.

Cheers,
Thomas


___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: PHP new vulnarabilities

2006-10-15 Thread Paul Schmehl
--On October 15, 2006 12:39:11 PM -0500 Jonathan Horne [EMAIL PROTECTED] 
wrote:


ive been scratching my head on this one for a few days too.  i have a
box at  home, that is running 6.2-PRERELEASE.  when i try to install the
lang/php5  port, i get:

[EMAIL PROTECTED] /usr/ports/lang/php5]# make install clean
===  php5-5.1.6_1 has known vulnerabilities:
= php -- open_basedir Race Condition Vulnerability.
   Reference:
http://www.FreeBSD.org/ports/portaudit/edabe438-542f-11db-a5ae-00508d6a
62df.html = Please update your ports tree and try again.
*** Error code 1

Stop in /usr/ports/lang/php5.

however, my server is running the same port, with no issue whatsoever.

That's because you installed the port on the server *before* the 
vulnerability was found.



[EMAIL PROTECTED] /etc/mail]# pkg_info | grep php5
php5-5.1.6_1
(and many extensions too)

perplexing that one box could have it, while another one (using the same
updated ports tree), refuses it.  could be related to the code branch im
following on my workstaion versus my server?

No.  It's related to the timing of when a security vulnerability was 
discovered.


Paul Schmehl ([EMAIL PROTECTED])
Adjunct Information Security Officer
The University of Texas at Dallas
http://www.utdallas.edu/ir/security/


Re: PHP new vulnarabilities

2006-10-15 Thread Paul Schmehl
--On October 15, 2006 7:49:55 PM +0200 Thomas [EMAIL PROTECTED] 
wrote:


Maybe the bug was not in your vuxml when you compiled php5-5.1.6_1. You
can use:
make -DDISABLE_VULNERABILITIES install clean
It will ignore the vuxml entry.

No offense, but anybody who *deliberately* installs a vulnerable version 
of php in *today's* world, is an absolute fool.  Some of us are *stuck* 
with the vulnerable version, because we installed before the vulnerability 
was found.  We can't go back because previous versions are *also* 
vulnerable.


But *deliberately* installing it when you *know* it's vulnerable - and one 
of the most attacked applications on the internet?  Foolhardy doesn't 
quite grasp the insanity of that.


Paul Schmehl ([EMAIL PROTECTED])
Adjunct Information Security Officer
The University of Texas at Dallas
http://www.utdallas.edu/ir/security/


Re: PHP new vulnarabilities

2006-10-15 Thread Bill Moran
Paul Schmehl [EMAIL PROTECTED] wrote:

 --On October 15, 2006 7:49:55 PM +0200 Thomas [EMAIL PROTECTED] 
 wrote:
 
  Maybe the bug was not in your vuxml when you compiled php5-5.1.6_1. You
  can use:
  make -DDISABLE_VULNERABILITIES install clean
  It will ignore the vuxml entry.
 
 No offense, but anybody who *deliberately* installs a vulnerable version 
 of php in *today's* world, is an absolute fool.  Some of us are *stuck* 
 with the vulnerable version, because we installed before the vulnerability 
 was found.  We can't go back because previous versions are *also* 
 vulnerable.

Have you looked at the vulnerability?  There are only certian coding
instances that would actually open this up to any attack vector.  Since
the bug is in unserialize, it's pretty easy audit a program to ensure
that it isn't vulnerable.

absolute fool seems a little extreme.

-- 
Bill Moran

Six men came to kill me one time, and the best of them carried this. It's
a Callahan fullbore autolock, customized trigger and double cartridge
thourough-gage.  It's my very favorite gun.

Jayne Cobb

___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: PHP new vulnarabilities

2006-10-15 Thread Joerg Pernfuss
On Sun, 15 Oct 2006 13:07:15 -0500
Paul Schmehl [EMAIL PROTECTED] wrote:

 --On October 15, 2006 7:49:55 PM +0200 Thomas
 [EMAIL PROTECTED] 
 wrote:
 
  Maybe the bug was not in your vuxml when you compiled php5-5.1.6_1.
  You can use:
  make -DDISABLE_VULNERABILITIES install clean
  It will ignore the vuxml entry.
 
 No offense, but anybody who *deliberately* installs a vulnerable
 version of php in *today's* world, is an absolute fool.  Some of us
 are *stuck* with the vulnerable version, because we installed before
 the vulnerability was found.  We can't go back because previous
 versions are *also* vulnerable.
 
 But *deliberately* installing it when you *know* it's vulnerable -
 and one of the most attacked applications on the internet?  Foolhardy
 doesn't quite grasp the insanity of that.

Completely true, but in this situation, the update is argueably the
better thing to do.

With the update you trade an integer overflow against this open_basedir
hole that is, as far as I know, harder to exploit and the _1 version
is sure to have the suhosin 0.9.5 patch (5.1.6 can be either 0.9.3 or
0.9.5 depending on checkout date - or none at all) - and with suhosin
one can disable symlink(). What may of course very well break the php
application, but this is simply choose your poison.

Joerg

-- 
| /\   ASCII ribbon   |  GnuPG Key ID | e86d b753 3deb e749 6c3a |
| \ / campaign against |0xbbcaad24 | 5706 1f7d 6cfd bbca ad24 |
|  XHTML in email  |.the next sentence is true.   |
| / \ and news | .the previous sentence was a lie.|


signature.asc
Description: PGP signature


Re: PHP new vulnarabilities

2006-10-15 Thread Paul Schmehl
--On October 15, 2006 2:50:34 PM -0400 Bill Moran 
[EMAIL PROTECTED] wrote:


Have you looked at the vulnerability?  There are only certian coding
instances that would actually open this up to any attack vector.  Since
the bug is in unserialize, it's pretty easy audit a program to ensure
that it isn't vulnerable.

absolute fool seems a little extreme.


Perhaps.  How many people are talented enough to understand the 
vulnerability and how it's exploited and know *for certain* that they 
won't have a problem?


It would be different if we were talking about an app that isn't exploited 
much.  Php is exploited every day, even when it's fully patched, due to 
the complexity of the attacks and the lack of understanding of most people 
who code in php.


Paul Schmehl ([EMAIL PROTECTED])
Adjunct Information Security Officer
The University of Texas at Dallas
http://www.utdallas.edu/ir/security/


Re: PHP new vulnarabilities

2006-10-15 Thread DAve

Paul Schmehl wrote:
--On October 15, 2006 7:49:55 PM +0200 Thomas [EMAIL PROTECTED] 
wrote:


Maybe the bug was not in your vuxml when you compiled php5-5.1.6_1. You
can use:
make -DDISABLE_VULNERABILITIES install clean
It will ignore the vuxml entry.

No offense, but anybody who *deliberately* installs a vulnerable version 
of php in *today's* world, is an absolute fool.  Some of us are *stuck* 
with the vulnerable version, because we installed before the 
vulnerability was found.  We can't go back because previous versions are 
*also* vulnerable.


But *deliberately* installing it when you *know* it's vulnerable - and 
one of the most attacked applications on the internet?  Foolhardy 
doesn't quite grasp the insanity of that.




That is a bit extreme. I have a full workload, I put in about 60 hours a 
week (I work a lot of weekends, I'm working now). I have servers running 
all different version of apps. I can't go around upgrading everything at 
the drop of a hat. I would be divorced within a month.


If you read the security alerts carefully you will find many require a 
shell (We don't offer them to clients), some require a specific app to 
be running that you may not need (rm -f /usr/local/bin/vulnerable_app), 
and sometimes a simple code audit will tell you if you are vulnerable. 
It is also not uncommon that a security alert is issued for a problem 
that has not be proven in the wild.


There are plenty of reasons to not follow a security alert, many of them 
quite valid. Upgrading mission critical systems without throughly 
understanding the implications just because someone screamed SECURITY!, 
now that is foolhardy.


DAve

--
Three years now I've asked Google why they don't have a
logo change for Memorial Day. Why do they choose to do logos
for other non-international holidays, but nothing for
Veterans?

Maybe they forgot who made that choice possible.
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: PHP new vulnarabilities

2006-10-15 Thread Paul Schmehl
--On October 15, 2006 4:31:48 PM -0400 DAve [EMAIL PROTECTED] 
wrote:


That is a bit extreme. I have a full workload, I put in about 60 hours a
week (I work a lot of weekends, I'm working now). I have servers running
all different version of apps. I can't go around upgrading everything at
the drop of a hat. I would be divorced within a month.

If you read the security alerts carefully you will find many require a
shell (We don't offer them to clients), some require a specific app to
be running that you may not need (rm -f /usr/local/bin/vulnerable_app),
and sometimes a simple code audit will tell you if you are vulnerable.
It is also not uncommon that a security alert is issued for a problem
that has not be proven in the wild.

There are plenty of reasons to not follow a security alert, many of them
quite valid. Upgrading mission critical systems without throughly
understanding the implications just because someone screamed SECURITY!,
now that is foolhardy.


That wasn't the situation here.

Look, there are several possible scenarios where installing a vulnerable 
app is less of a risk than not installing the app at all.  Business 
functionality *is* important.  However, to arbitrarily say Use 
DISABLE_VULNERABILITIES is the answer to an app that won't install is 
always a wrong answer.  *At a minimum* it should come with a warning of 
the possible risks.  Furthermore *upgrading* from a non-vulnerabile app to 
a vulnerable app simply because it's the latest is foolhardy in the 
extreme.


I don't think my statement was any more extreme than Just use 
DISABLE_VULNERABILITIES and you can install the app with no warning of 
the risks.  *Especially* when the app is as highly scrutinized as php is 
(not to mention how vulnerabilities are being found in it all the time.)


Paul Schmehl ([EMAIL PROTECTED])
Adjunct Information Security Officer
The University of Texas at Dallas
http://www.utdallas.edu/ir/security/


Re: PHP new vulnarabilities

2006-10-15 Thread Thomas Vogt


Paul Schmehl schrieb:
 --On October 15, 2006 4:31:48 PM -0400 DAve [EMAIL PROTECTED]
 wrote:

 That is a bit extreme. I have a full workload, I put in about 60 hours a
 week (I work a lot of weekends, I'm working now). I have servers running
 all different version of apps. I can't go around upgrading everything at
 the drop of a hat. I would be divorced within a month.

 If you read the security alerts carefully you will find many require a
 shell (We don't offer them to clients), some require a specific app to
 be running that you may not need (rm -f /usr/local/bin/vulnerable_app),
 and sometimes a simple code audit will tell you if you are vulnerable.
 It is also not uncommon that a security alert is issued for a problem
 that has not be proven in the wild.

 There are plenty of reasons to not follow a security alert, many of them
 quite valid. Upgrading mission critical systems without throughly
 understanding the implications just because someone screamed SECURITY!,
 now that is foolhardy.

 That wasn't the situation here.
 
 Look, there are several possible scenarios where installing a vulnerable
 app is less of a risk than not installing the app at all.  Business
 functionality *is* important.  However, to arbitrarily say Use
 DISABLE_VULNERABILITIES is the answer to an app that won't install is
 always a wrong answer.  *At a minimum* it should come with a warning of
 the possible risks.  Furthermore *upgrading* from a non-vulnerabile app
 to a vulnerable app simply because it's the latest is foolhardy in the
 extreme.
 
 I don't think my statement was any more extreme than Just use
 DISABLE_VULNERABILITIES and you can install the app with no warning of
 the risks.  *Especially* when the app is as highly scrutinized as php is
 (not to mention how vulnerabilities are being found in it all the time.)


Does DISABLE_VULNERABILITIES not say enough?
When he tried to install php he already got the vulnerabilities message
including a web link.

I think this knob was made for a reason.

Cheers,
Thomas
-- 
Terry Lambert:
It is not unix's job to stop you from shooting your foot. If you so
choose to do so, then it is UNIX's job to deliver Mr. Bullet to Mr Foot
in the most efficient way it knows.
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: PHP new vulnarabilities

2006-10-15 Thread jan gestre

so the question is, when will the php port be upgraded? it's been days
already but i still keep on seeing the vulnerability message even if you say
that it isn't that critical.
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: PHP new vulnarabilities

2006-10-15 Thread Bill Moran
jan gestre [EMAIL PROTECTED] wrote:

 so the question is, when will the php port be upgraded? it's been days
 already but i still keep on seeing the vulnerability message even if you say
 that it isn't that critical.

1) The suhosin patchset apparently plugs the hole.  Unfortunately,
   portaudit isn't aware of this and still reports the package as
   vulnerable.
2) The PHP folks haven't release the patch yet, although it's in their
   CVS.
3) Somebody _could_ generate a patchfile for the FreeBSD port -- don't
   know why nobody has.

So, the answer is I don't know.

-- 
Bill Moran

There's more'n seventy little earth's spinning about the galaxy, and the 
meek have inherited not a one.

Malcom Reynolds

___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to [EMAIL PROTECTED]