[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: php vulnerabilities



Recently I 've heard about http://www.dotdeb.org/.
They are providing debian packages for php4.3.10. 

Can I use those packages for production environment? 

Plese suggest the best way to secure my php

Regards,

Sarav


--- saravanan G <gsaravanan@adventnet.com> wrote:

> Hai ,
>      I am using php4:4.1.2-7.0.1 on my debian woody.
> I have read that 
> there are some vulnerabilities in php <= 4.3.9 as
> follows
> 
> [01 - pack() - integer overflow leading to heap
> bufferoverflow ]
> [02 - unpack() - integer overflow leading to heap
> info leak ]
> [03 - safe_mode_exec_dir bypass in multithreaded PHP
> ]
> [04 - safe_mode bypass through path truncation ]
> [05 - path truncation in realpath() ]
> [06 - unserialize() - wrong handling of negative
> references ]
> [07 - unserialize() - wrong handling of references
> to freed data ]
> 
> 
> Source url :
> http://www.hardened-php.net/advisories/012004.txt
> 
> How do I secure my php in debian woody?
> 
> Please advice me
> 
> Sarav
> 
> 
> 
> 
> -- 
> To UNSUBSCRIBE, email to
> debian-security-REQUEST@lists.debian.org
> with a subject of "unsubscribe". Trouble? Contact
> listmaster@lists.debian.org
> 
> 


__________________________________________________
Do You Yahoo!?
Tired of spam?  Yahoo! Mail has the best spam protection around 
http://mail.yahoo.com 



Reply to: