Nouvelle faille de secu dans PHP

Nouvelle faille de secu dans PHP - Linux et OS Alternatifs

Marsh Posté le 22-07-2002 à 15:49:45    

Kaboom, une nouvelle faille de secu dans PHP a partir de la version 4.2.0 .
 
Allez zou, on upgrade vers la 4.2.2 vite fait (ou on reste a la 4.1.2-audit qui n'a pas cette faille) .

Reply

Marsh Posté le 22-07-2002 à 15:49:45   

Reply

Marsh Posté le 22-07-2002 à 16:01:58    

Code :
  1. PHP Security Advisory: Vulnerability in PHP versions 4.2.0 and 4.2.1
  2. Issued on: July 22, 2002
  3. Software:  PHP versions 4.2.0 and 4.2.1
  4. Platforms: All
  5.    The PHP Group has learned of a serious security vulnerability in PHP
  6.    versions 4.2.0 and 4.2.1. An intruder may be able to execute arbitrary
  7.    code with the privileges of the web server. This vulnerability may be
  8.    exploited to compromise the web server and, under certain conditions,
  9.    to gain privileged access.
  10. Description
  11.    PHP contains code for intelligently parsing the headers of HTTP POST
  12.    requests. The code is used to differentiate between variables and files
  13.    sent by the user agent in a "multipart/form-data" request. This parser
  14.    has insufficient input checking, leading to the vulnerability.
  15.    The vulnerability is exploitable by anyone who can send HTTP POST
  16.    requests to an affected web server. Both local and remote users, even
  17.    from behind firewalls, may be able to gain privileged access.
  18. Impact
  19.    Both local and remote users may exploit this vulnerability to compromise
  20.    the web server and, under certain conditions, to gain privileged access.
  21.    So far only the IA32 platform has been verified to be safe from the
  22.    execution of arbitrary code. The vulnerability can still be used on IA32
  23.    to crash PHP and, in most cases, the web server.
  24. Solution
  25.    The PHP Group has released a new PHP version, 4.2.2, which incorporates
  26.    a fix for the vulnerability. All users of affected PHP versions are
  27.    encouraged to upgrade to this latest version. The downloads web site at
  28.       http://www.php.net/downloads.php
  29.  
  30.    has the new 4.2.2 source tarballs, Windows binaries and source patches
  31.    from 4.2.0 and 4.2.1 available for download.
  32. Workaround
  33.    If the PHP applications on an affected web server do not rely on HTTP
  34.    POST input from user agents, it is often possible to deny POST requests
  35.    on the web server.
  36.    In the Apache web server, for example, this is possible with the
  37.    following code included in the main configuration file or a top-level
  38.    .htaccess file:
  39.       <Limit POST>
  40.           Order deny,allow
  41.           Deny from all
  42.       </Limit>
  43.    
  44.    Note that an existing configuration and/or .htaccess file may have
  45.    parameters contradicting the example given above.
  46. Credits
  47.    The PHP Group would like to thank Stefan Esser of e-matters GmbH for
  48.    discovering this vulnerability.
  49.  
  50. Copyright (c) 2002 The PHP Group.


 
en gros la faille concerne le décodage par PHP des requetes POST multipart et n'est pas exploitable sur du IA32 (x86)


---------------
Don't blink. Don't even blink. Blink and you're dead. They are fast, faster than you could believe, don't turn your back, don't look away, and DON'T BLINK. Good luck.
Reply

Sujets relatifs:

Leave a Replay

Make sure you enter the(*)required information where indicate.HTML code is not allowed