[Fwd: RE: Advisory 012002: PHP remote vulnerabilities (fwd)] - Mailing list pgsql-general

From Justin Clift
Subject [Fwd: RE: Advisory 012002: PHP remote vulnerabilities (fwd)]
Date
Msg-id 3C7E1651.84736A6@postgresql.org
Whole thread Raw
List pgsql-general
Hi everyone,

Just in case people haven't come across this advisory about PHP from
yesterday...

:-)

Regards and best wishes,

Justin Clift


-------- Original Message --------
Subject: RE: Advisory 012002: PHP remote vulnerabilities (fwd)
Date: Wed, 27 Feb 2002 17:17:28 -0800
From: "SoilentG" <soilentg@kovclan.org>
Reply-To: modssl-users@modssl.org
To: <modssl-users@modssl.org>

Thanks.  One note.  I use php 4.0.6 and I had to set

file_uploads = 0

in order for it to take the value, setting it to "Off" showed "no value"
in
phpinfo();

Jeff

> -----Original Message-----
> From: owner-modssl-users@modssl.org
> [mailto:owner-modssl-users@modssl.org]On Behalf Of R. DuFresne
> Sent: Wednesday, February 27, 2002 4:28 PM
> To: modssl-users@modssl.org
> Subject: Advisory 012002: PHP remote vulnerabilities (fwd)
>
>
>
> Considering the plethroa of php users on the list, and the fact many are
> perhaps not reading bugtraq:
>
> ---------- Forwarded message ----------
> From: security@e-matters.de
> Subject: Advisory 012002: PHP remote vulnerabilities
> Date: Wed, 27 Feb 2002 12:30:56 +0100
> To: bugtraq@securityfocus.com, vulnwatch@vulnwatch.org
>
>                            e-matters GmbH
>                           www.e-matters.de
>
>                       -= Security  Advisory =-
>
>
>
>      Advisory: Multiple Remote Vulnerabilites within PHP's fileupload code
>  Release Date: 2002/02/27
> Last Modified: 2002/02/27
>        Author: Stefan Esser [s.esser@e-matters.de]
>
>   Application: PHP v3.10-v3.18, v4.0.1-v4.1.1
>      Severity: Several vulnerabilities in PHP's fileupload code allow
>                remote compromise
>          Risk: Critical
> Vendor Status: Patches Released
>     Reference: http://security.e-matters.de/advisories/012002.html
>
>
>
> Overview:
>
>    We found several flaws in the way PHP handles multipart/form-data POST
>    requests. Each of the flaws could allow an attacker to execute
> arbitrary
>    code on the victim's  system.
>
>
> Details:
>
>    PHP supports multipart/form-data POST requests (as described
> in RFC1867)
>    known as POST fileuploads. Unfourtunately there are several
> flaws in the
>    php_mime_split function that could be used by an attacker to execute
>    arbitrary code. During our research we found out that not only PHP4 but
>    also older versions from the PHP3 tree are vulnerable.
>
>
>    The following is a list of bugs we found:
>
>    PHP 3.10-3.18
>
>       - broken boundary check    (hard to exploit)
>       - arbitrary heap overflow  (easy exploitable)
>
>    PHP 4.0.1-4.0.3pl1
>
>       - broken boundary check    (hard to exploit)
>       - heap off by one          (easy exploitable)
>
>    PHP 4.0.2-4.0.5
>
>       - 2 broken boundary checks (one very easy and one hard to exploit)
>
>    PHP 4.0.6-4.0.7RC2
>
>       - broken boundary check    (very easy to exploit)
>
>    PHP 4.0.7RC3-4.1.1
>
>       - broken boundary check    (hard to exploit)
>
>
>    Finally I want to mention that most of these vulnerabilities are
>    exploitable only on linux or solaris. But the heap off by one is only
>    exploitable on x86 architecture and the arbitrary heap overflow in
>    PHP3 is exploitable on most OS and architectures. (This includes *BSD)
>
>    Users running PHP 4.2.0-dev from cvs are not vulnerable to any of the
>    described bugs because the fileupload code was completly rewritten for
>    the 4.2.0 branch.
>
>
> Proof of Concept:
>
>    e-matters is not going to release exploits for any of the discovered
>    vulnerabilities to the public.
>
>
> Vendor Response:
>
>    Because I am part of the php developer team there is not much I can
>    write here...
>
>    27th February 2002 - An updated version of php and the patch for
>                         these vulnerabilities are now available at:
>                         http://www.php.net/downloads.php
>
>
> Recommendation:
>
>    If you are running PHP 4.0.3 or above one way to workaround these
>    bugs is to disable the fileupload support within your php.ini
>    (file_uploads = Off) If you are running php as module keep in mind
>    to restart the webserver. Anyway you should better install the
>    fixed or a properly patched version to be safe.
>
>
> Sidenotice:
>
>    This advisory is so short because I don't want to give out more info
>    than is needed.
>
>    Users running the developer version of php (4.2.0-dev) are not
>    vulnerable to these bugs because the fileupload support was completly
>    rewritten for that branch.
>
>
> GPG-Key:
>
>    http://security.e-matters.de/gpg_key.asc
>
>    pub  1024D/75E7AAD6 2002-02-26 e-matters GmbH - Securityteam
>    Key fingerprint = 43DD 843C FAB9 832A E5AB  CAEB 81F2 8110 75E7 AAD6
>
>
> Copyright 2002 Stefan Esser. All rights reserved.
>
>
>
> ______________________________________________________________________
> Apache Interface to OpenSSL (mod_ssl)                   www.modssl.org
> User Support Mailing List                      modssl-users@modssl.org
> Automated List Manager                            majordomo@modssl.org
>

______________________________________________________________________
Apache Interface to OpenSSL (mod_ssl)                   www.modssl.org
User Support Mailing List                      modssl-users@modssl.org
Automated List Manager                            majordomo@modssl.org

pgsql-general by date:

Previous
From: Jan Poslusny
Date:
Subject: Re: Drawing databases
Next
From: tony
Date:
Subject: Re: dates and encoding