PHP Vulnerability Announced 47
corz writes "Just when you thought you were finished upgrading the webserver, 'The PHP Group has learned of a serious security vulnerability in PHP versions 4.2.0 and 4.2.1. An intruder may be able to execute arbitrary code with the privileges of the web server. This vulnerability may be exploited to compromise the web server and, under certain conditions, to gain privileged access.' Here's the bugtraq announcement." The hole is in the parsing of HTTP POST headers and can allow arbitrary code to be run on vulnerable machines. PHP thoughtfully decided to release a new version, 4.2.2, today with the fix. You can find a copy of it here (mirror).
www.php.net/downloads.php (Score:3, Funny)
Huh??! Bad karma
Re:www.php.net/downloads.php (Score:3, Informative)
For anyone concerned about upgrading (Score:1, Informative)
Why I love freebsd. (Score:1, Interesting)
Since the admins over at NYI.net showed me the light, I have been installing FreeBSD on every machine I can get my hands on, even if they are'nt mine.
Where to get the file (Score:2, Informative)
http://uk.php.net/distributions/php-4.2.2.tar.b
or
http://uk.php.net/distributions/php-4.2.2.
Something tells me I shouldn't be doing this (Score:2)
ftp://anon:anon@closedsrc.org/.
The md5sum file is based on the md5 checksum provided by the FreeBSD port distinfo file.
I know I'm asking for it...
Re:Something tells me I shouldn't be doing this (Score:1)
Re:Shouldn't be a problem (Score:1)
Re:Shouldn't be a problem (Score:2)
Not necessarily. Get the MD5 sum from the official site, then the tarball from the unofficial site. If it bunzips like a duck and md5sums like a duck...
Re:Shouldn't be a problem (Score:1)
Why is this not front-page? (Score:1)
Re:Why is this not front-page? (Score:1)
Re:Why is this not front-page? (Score:3, Interesting)
Impact
Both local and remote users may exploit this vulnerability to compromise
the web server and, under certain conditions, to gain privileged access.
So far only the IA32 platform has been verified to be safe from the
execution of arbitrary code. The vulnerability can still be used on IA32
to crash PHP and, in most cases, the web server.
This isn't really a problem on the most widely used platforms for PHP. I was looking to see if the new Debian package had been uploaded yet, but now I'm not even going to bother. I don't care if someone "may" crash the webserver that much.
Re:Why is this not front-page? (Score:1)
No Root (Score:1)
IA32 "safe" from this? (Score:3, Interesting)
If I read the bugtraq announcement correctly, on IA32 (including, I assume, my K6-2 Linux Box hosting the webserver) is "safe" from remote code execution (but the server can still be crashed by the exploit). Did I read that right?...
now they tell us! (Score:1)
X86 Linux? (Score:3, Funny)
Re:*sigh* (Score:3, Informative)
Gobbles proved them wrong [securityfocus.com].
Re:how do i apply the patch? (Score:1)
You need the source code.... In your newbie case however, I suggest that you wait until your Linux distribution provides an updated package for you. (Hopefully you're running Debian or something similar in which case (apt-get update; apt-get upgrade) may work)
Apache 2.0.39 incompatibility (Score:1)
A patch is publicly accessible via my webserver here [initialized.org] (http://www.initialized.org/patches/php4.2.2-apac
To install the patch on a Unix machine and install PHP using apxs:
(r) designates commands that must be executed as the superuser (root).
-- Scoria
Re:Apache 2.0.39 incompatibility (Score:2)
'make install', however, must be performed as root.
Re:Apache 2.0.39 incompatibility (Score:2, Informative)
chregu
Re:Apache 2.0.39 incompatibility (Score:1)
If you are going to be playing around on the bleeding edge, you mine as well checkout the cvs versions of both, skip the patching, and have some real fun
--Matt
Re:Apache 2.0.39 incompatibility (Score:1)
Simon
420 makes you vulnerable! (Score:3, Funny)
I can understand a certain amount of vulnerability after 420...
Patch, Crack or Post (Score:1)
NOT posting
Re:Woohoo 8=====D (Score:1)
Be Careful!!! (Score:1)