Re: SecurityReason: PHP 5.2.6 SAPI php_getuid() overload

2008-12-08 Thread Eygene Ryabinkin
Maksymilian, Mon, Dec 08, 2008 at 02:14:36PM +0100, Maksymilian Arciemowicz wrote: > > Sat, Dec 06, 2008 at 12:40:48PM -0700, [EMAIL PROTECTED] wrote: > >> [ SecurityReason.com : PHP 5.2.6 SAPI php_getuid() overload ] > > [...] > >> Using PHP 5.2.6, as a Apache module can bypass many security poin

Re: SecurityReason: PHP 5.2.6 SAPI php_getuid() overload

2008-12-08 Thread Maksymilian Arciemowicz
Eygene Ryabinkin wrote: > Maksymilian, good day. > > Sat, Dec 06, 2008 at 12:40:48PM -0700, [EMAIL PROTECTED] wrote: >> [ SecurityReason.com : PHP 5.2.6 SAPI php_getuid() overload ] > [...] >> Using PHP 5.2.6, as a Apache module can bypass many security points. > > Am I right that this vulnerabil

Re: SecurityReason: PHP 5.2.6 SAPI php_getuid() overload

2008-12-08 Thread Eygene Ryabinkin
Maksymilian, good day. Sat, Dec 06, 2008 at 12:40:48PM -0700, [EMAIL PROTECTED] wrote: > [ SecurityReason.com : PHP 5.2.6 SAPI php_getuid() overload ] [...] > Using PHP 5.2.6, as a Apache module can bypass many security points. Am I right that this vulnerability exists only in the Apache 1.x flav

SecurityReason: PHP 5.2.6 SAPI php_getuid() overload

2008-12-06 Thread cxib
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 [ SecurityReason.com : PHP 5.2.6 SAPI php_getuid() overload ] Author: Maksymilian Arciemowicz securityreason.com Date: - - Written: 20.11.2008 - - Public: 05.12.2008 SecurityReason Research SecurityAlert Id: 59 SecurityRisk: High Affected Software: