[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: php vulnerability



Hai ,
  I am also worrying about these vulnerabilities.btw I
am using debian php package(4.1.2) on woody. 
  How do I sure that I am out of danger? 

Sarav


--- Florian Weimer <fw@deneb.enyo.de> wrote:

> * Chad Adlawan:
> 
> > Re the PHP bugs announced by the Hardened-PHP
> Project
> >
> (http://www.hardened-php.net/advisories/012004.txt).
> 
> This is very likely not the whole story.  According
> to the PHP 4.3.10
> release announcement, additional bugs were fixed. 
> The following
> vulnerabilities are only mentioned in the 4.3.10
> release notes:
> 
> CAN-2004-1018 - shmop_write() out of bounds memory
> write access.
> CAN-2004-1020 - addslashes() not escaping \0
> correctly.
> CAN-2004-1065 - exif_read_data() overflow on long
> sectionname.
> magic_quotes_gpc could lead to one level directory
> traversal with file uploads.
> 
> > Is the php4 package in Debian stable affected?
> 
> Not sure.  Upstream's security support seems to be
> suboptimal.
> 
> 
> -- 
> To UNSUBSCRIBE, email to
> debian-security-REQUEST@lists.debian.org
> with a subject of "unsubscribe". Trouble? Contact
> listmaster@lists.debian.org
> 
> 



		
__________________________________ 
Do you Yahoo!? 
Yahoo! Mail - Find what you need with new enhanced search.
http://info.mail.yahoo.com/mail_250



Reply to: