URN Logo
UNIX Resources » BSD » FreeBSD » FreeBSD China » 技术交流 » 353 » PHP因为重大安全漏洞发布新版本4.2.2!!大家可能要再次升级了!
announcement 声明: 本页内容为FreeBSD China的内容镜像,文章的版权以及其他所有的相关权利属于FreeBSD China和相应文章的作者,如果转载,请注明文章来源及相关版权信息。
freebsdchina.org
  中文文档计划
  Chinese Ports 讨论
  初学指南
  技术交流
  设备驱动
  WEB服务
  Proxy服务
  JAVA平台
  软件发布
  休闲话题
  静语轩
  系统编程
  脚本编程
  内核开发技术
  网络安全
  mail系统
  X-Win系统
  信息交流
  历史-文化-设计-实现
  安装-配置-优化-安全
  中文-桌面-开发-调试
   
PHP因为重大安全漏洞发布新版本4.2.2!!大家可能要再次升级了!
Author: webman    Posted: 2002-07-24 14:52:11    Length: 2897 byte(s)
[Original] [Print] [Top]
因为4.2.0和4.2.1中存在的一个安全漏洞,PHP小组于22日发布了4.3之前的一个补丁版4.2.2这个版本只修正了这一安全漏洞--并没有别的改进。这个漏洞允许任何人以web server的运行者身份执行任意代码。
下面是细节:PHP Security Advisory: Vulnerability in PHP versions 4.2.0 and 4.2.1
[ Version Française ]

Issued on: July 22, 2002
Software: PHP versions 4.2.0 and 4.2.1
Platforms: All


The PHP Group has learned of a serious security vulnerability in PHP versions 4.2.0 and 4.2.1. An intruder may be able to execute arbitrary code with the privileges of the web server. This vulnerability may be exploited to compromise the web server and, under certain conditions, to gain privileged access.

Description
PHP contains code for intelligently parsing the headers of HTTP POST requests. The code is used to differentiate between variables and files sent by the user agent in a "multipart/form-data" request. This parser has insufficient input checking, leading to the vulnerability.

The vulnerability is exploitable by anyone who can send HTTP POST requests to an affected web server. Both local and remote users, even from behind firewalls, may be able to gain privileged access.

Impact
Both local and remote users may exploit this vulnerability to compromise the web server and, under certain conditions, to gain privileged access. So far only the IA32 platform has been verified to be safe from the execution of arbitrary code. The vulnerability can still be used on IA32 to crash PHP and, in most cases, the web server.

Solution
The PHP Group has released a new PHP version, 4.2.2, which incorporates a fix for the vulnerability. All users of affected PHP versions are encouraged to upgrade to this latest version. The downloads web site at

http://www.php.net/downloads.php
has the new 4.2.2 source tarballs, Windows binaries and source patches from 4.2.0 and 4.2.1 available for download.

Workaround
If the PHP applications on an affected web server do not rely on HTTP POST input from user agents, it is often possible to deny POST requests on the web server.

In the Apache web server, for example, this is possible with the following code included in the main configuration file or a top-level .htaccess file:


Order deny,allow
Deny from all


Note that an existing configuration and/or .htaccess file may have parameters contradicting the example given above.

Credits
The PHP Group would like to thank Stefan Esser of e-matters GmbH for discovering this vulnerability. e-matters GmbH has also released an independent advisory, describing the vulnerability in more detail.
下载请到:http://us2.php.net//distributions/php-4.2.2.tar.gz
[Original] [Print] [Top]
« Previous thread
Berkeley 二十年Unix历史
技术交流
353
Next thread »
问5:怎样使FBSD成为给别的机器安装的FTP服务器?
     

Copyright © 2007 UNIX Resources Network, All Rights Reserved.      About URN | Privacy & Legal | Help | Contact us
备案序号: 京ICP备05006143    webmaster: webmaster@unixresources.net
This page created on 2007-07-26 13:37:10, cost 0.0090429782867432 ms.