Re: php vulnerabilities
Recently I 've heard about http://www.dotdeb.org/.
They are providing debian packages for php4.3.10.
Can I use those packages for production environment?
Plese suggest the best way to secure my php
Regards,
Sarav
--- saravanan G <gsaravanan@adventnet.com> wrote:
> Hai ,
> I am using php4:4.1.2-7.0.1 on my debian woody.
> I have read that
> there are some vulnerabilities in php <= 4.3.9 as
> follows
>
> [01 - pack() - integer overflow leading to heap
> bufferoverflow ]
> [02 - unpack() - integer overflow leading to heap
> info leak ]
> [03 - safe_mode_exec_dir bypass in multithreaded PHP
> ]
> [04 - safe_mode bypass through path truncation ]
> [05 - path truncation in realpath() ]
> [06 - unserialize() - wrong handling of negative
> references ]
> [07 - unserialize() - wrong handling of references
> to freed data ]
>
>
> Source url :
> http://www.hardened-php.net/advisories/012004.txt
>
> How do I secure my php in debian woody?
>
> Please advice me
>
> Sarav
>
>
>
>
> --
> To UNSUBSCRIBE, email to
> debian-security-REQUEST@lists.debian.org
> with a subject of "unsubscribe". Trouble? Contact
> listmaster@lists.debian.org
>
>
__________________________________________________
Do You Yahoo!?
Tired of spam? Yahoo! Mail has the best spam protection around
http://mail.yahoo.com
Reply to: