iliaa Wed Aug 27 19:53:16 2003 EDT
Modified files:
/php-src/ext/standard mail.c
Log:
Prevent abrupt script execution when sendmail_path contains invalid
executable.
Add more detail to the warnings regarding execution of sendmail binary.
Index: php-src/ext/standard/mail.c
diff -u php-src/ext/standard/mail.c:1.73 php-src/ext/standard/mail.c:1.74
--- php-src/ext/standard/mail.c:1.73 Tue Jun 10 16:03:38 2003
+++ php-src/ext/standard/mail.c Wed Aug 27 19:53:15 2003
@@ -16,7 +16,7 @@
+----------------------------------------------------------------------+
*/
-/* $Id: mail.c,v 1.73 2003/06/10 20:03:38 imajes Exp $ */
+/* $Id: mail.c,v 1.74 2003/08/27 23:53:15 iliaa Exp $ */
#include <stdlib.h>
#include <ctype.h>
@@ -198,6 +198,13 @@
#ifdef PHP_WIN32
sendmail = popen(sendmail_cmd, "wb");
#else
+ /* make sure that sendmail_path contains a valid executable, failure to do
+ * would make PHP abruptly exit without a useful error message. */
+ if (access(sendmail_path, X_OK)) {
+ php_error_docref(NULL TSRMLS_CC, E_WARNING, "Permission denied: unable
to execute shell to run mail delivery binary '%s'", sendmail_path);
+ return 0;
+ }
+
/* Since popen() doesn't indicate if the internal fork() doesn't work
* (e.g. the shell can't be executed) we explicitely set it to 0 to be
* sure we don't catch any older errno value. */
@@ -210,7 +217,7 @@
if (sendmail) {
#ifndef PHP_WIN32
if (EACCES == errno) {
- php_error_docref(NULL TSRMLS_CC, E_WARNING, "Permission
denied: unable to execute shell to run mail delivery binary");
+ php_error_docref(NULL TSRMLS_CC, E_WARNING, "Permission
denied: unable to execute shell to run mail delivery binary '%s'", sendmail_path);
pclose(sendmail);
return 0;
}
@@ -239,7 +246,7 @@
return 1;
}
} else {
- php_error_docref(NULL TSRMLS_CC, E_WARNING, "Could not execute mail
delivery program");
+ php_error_docref(NULL TSRMLS_CC, E_WARNING, "Could not execute mail
delivery program '%s'", sendmail_path);
return 0;
}
--
PHP CVS Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php