[PHP] Re: [ANNOUNCE] PHP Security Advisory: Vulnerability in PHP versions 4.2.0 and4.2.1

2002-07-23 Thread Scott Fletcher

Very cute!   Upgrade Now!  It will work well with PHP newbies.  Not!

Richard Lynch [EMAIL PROTECTED] wrote in message
news:[EMAIL PROTECTED]...
 Not being an expert in php..i couldnt understand the vulnerability.
 Can someone shed some light here.

 Very short explanation:

 Upgrade.
 Now!

 Longer one:

 If your web-site has *ANY* FORM tags on it, and you have PHP
 ready-and-waiting to process those FORMs, then somebody could manage to
 create a really icky FORM page and POST to your site and break in.

 Actually, even if you do *NOT* have the FORM tags, but you're allowing
 them in httpd.conf, and PHP is there, they could break in.

 Presumably the precise details of what you'd have to slam into the FORM to
 break in are simply too complex to fit into an Announcement of this
nature.
 I imagine the Details could be dug out of Bugtrak and/or wherever the bug
 was first announced/discussed.  Presumably PHP-Dev and e-matters would be
 good places to start digging for gory details.

 If Upgrading is impossible, *AND* you don't use FORMs with PHP in the
first
 place (highly unlikely) than you could just turn off POST (forms) in
your
 httpd.conf and nobody will be allowed to POST (send a form) anything to
your
 web-site, and then PHP won't ever see the data, since Apache stopped them,
 and the bug wouldn't kick in.

 Upgrade.
 Now!

 --
 Like Music?  http://l-i-e.com/artists.htm




-- 
PHP General Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php




Re: [PHP] Re: [ANNOUNCE] PHP Security Advisory: Vulnerability in PHP versions 4.2.0 and4.2.1

2002-07-23 Thread Jason Wong

On Wednesday 24 July 2002 01:01, Scott Fletcher wrote:
 Very cute!   Upgrade Now!  It will work well with PHP newbies.  Not!

If 'PHP newbies' aren't able to perform the upgrade themselves, they should 
ask someone who can. If it was the 'PHP newbies' who originally did the php 
installation then the upgrade is just a matter of repeating the same steps as 
the original installation. There's nothing difficult about.

-- 
Jason Wong - Gremlins Associates - www.gremlins.com.hk
Open Source Software Systems Integrators
* Web Design  Hosting * Internet  Intranet Applications Development *

/*
Hash table has woodworm
*/


-- 
PHP General Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php




[PHP] Re: [ANNOUNCE] PHP Security Advisory: Vulnerability in PHP versions 4.2.0 and4.2.1

2002-07-23 Thread Richard Lynch

Very cute!   Upgrade Now!  It will work well with PHP newbies.  Not!

If you are on Windoze, just download and run the installer or whatever you
did last time that actually worked, as much as anything on Windoze works.

If on Un*x:

Download 4.2.2 from http://php.net and save it in /usr/src or where-ever you
find convenient.

cd to the directory where php-4.2.2.tar.gz lives.

Untar it:
tar -xzf php-4.2.2.tar.gz

Copy the configure settings you used before:
cp php-4.1.0/config.nice php-4.2.2

Move into the new PHP directory:
cd php-4.2.2

Do the config.nice (it's what you used last time):
./config.nice

Pay attention to the crap that scrolls by, if you can read that fast :-)
Or, instead of just ./config.nice, use:
./config.nice 21  config.output 
Then you can use:
tail -f config.output
to see what's happening as it goes (type control-C to quit tail), or
less config.output
after you come back from your coffee-break.

Compile PHP:
make

(Maybe time for another coffee-break.)

Install PHP:
make install

Stop Apache: ***
/usr/local/apache/bin/apachectl stop

Start Apache:
/usr/local/apache/bin/apachectl start

Confirm the new PHP is working by surfing to a file with:
?php phpinfo();?
in it.

Remove that file phpinfo() file.


Even for a newbie, this should probably take, like, a half hour? if
everything goes well.

Assuming a decently-powered box.  If you're installing on a Pentium1 laptop
or something, those coffee-breaks could turn into lunch and dinner breaks or
something.

*** There may be a better/different way to stop/start Apache on your server.
 Just make 100% sure you stopped it and started it again.

-- 
Like Music?  http://l-i-e.com/artists.htm
I'm looking for a PRO QUALITY two-input sound card supported by Linux (any
major distro).  Need to record live events (mixed already) to stereo
CD-quality.  Soundcard Recommendations?
Software to handle the recording? Don't need fancy mixer stuff.  Zero (0)
post-production time.  Just raw PCM/WAV/AIFF 16+ bit, 44.1KHz, Stereo
audio-to-disk.

-- 
PHP General Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php




[PHP] Re: [ANNOUNCE] PHP Security Advisory: Vulnerability in PHP versions 4.2.0 and4.2.1

2002-07-22 Thread Richard Lynch

Not being an expert in php..i couldnt understand the vulnerability.
Can someone shed some light here.

Very short explanation:

Upgrade.
Now!

Longer one:

If your web-site has *ANY* FORM tags on it, and you have PHP
ready-and-waiting to process those FORMs, then somebody could manage to
create a really icky FORM page and POST to your site and break in.

Actually, even if you do *NOT* have the FORM tags, but you're allowing
them in httpd.conf, and PHP is there, they could break in.

Presumably the precise details of what you'd have to slam into the FORM to
break in are simply too complex to fit into an Announcement of this nature. 
I imagine the Details could be dug out of Bugtrak and/or wherever the bug
was first announced/discussed.  Presumably PHP-Dev and e-matters would be
good places to start digging for gory details.

If Upgrading is impossible, *AND* you don't use FORMs with PHP in the first
place (highly unlikely) than you could just turn off POST (forms) in your
httpd.conf and nobody will be allowed to POST (send a form) anything to your
web-site, and then PHP won't ever see the data, since Apache stopped them,
and the bug wouldn't kick in.

Upgrade.
Now!

-- 
Like Music?  http://l-i-e.com/artists.htm


-- 
PHP General Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php