CERT Advisory CA-2002-05 Multiple Vulnerabilities in PHP fileupload

2002-02-28 Thread Jeff
I received this CERT Advisory about 6 hours ago, regarding PHP. The php website confirms the details: www.php.net I think this is going to be a problem for us, due to the way the Debian packaging works - We upgraded to Apache 1.3.19-1 for security reasons. Package dependencies meant we ended u

Welcome to Liers_dot_net_Liers_dot_org_auction_notification_list

2002-02-28 Thread auction-request
-- Welcome to the liers.org/liers.net auction notification list. You are receiving this message because you have been subscribed to this list. This list has been setup to notify you when the auction of "liers.org" and "liers.net", on eBay commences. If you do not wish to be on this list you

Re: CERT Advisory CA-2002-05 Multiple Vulnerabilities in PHP fileupload

2002-02-28 Thread Lupe Christoph
On Thursday, 2002-02-28 at 08:37:45 -, Jeff wrote: > I received this CERT Advisory about 6 hours ago, regarding PHP. > The php website confirms the details: www.php.net > I think this is going to be a problem for us, due to the way > the Debian packaging works - > We upgraded to Apache 1.3

Re: CERT Advisory CA-2002-05 Multiple Vulnerabilities in PHP fileupload

2002-02-28 Thread Dmitry Borodaenko
Does apt from potato (0.3.19) support Pinning? I don't think so. Thus, you will need to upgrade your apt manually first. -- Dmitry Borodaenko On Thu, Feb 28, 2002 at 10:37:00AM +0100, Lupe Christoph wrote: > If you want to run more up to date packages, you have to > get them from the "testing",

Re: CERT Advisory CA-2002-05 Multiple Vulnerabilities in PHP fileupload

2002-02-28 Thread Andrew Suffield
On Thu, Feb 28, 2002 at 01:25:25PM +0200, Dmitry Borodaenko wrote: > Does apt from potato (0.3.19) support Pinning? I don't think so. Thus, > you will need to upgrade your apt manually first. > > On Thu, Feb 28, 2002 at 10:37:00AM +0100, Lupe Christoph wrote: > > If you want to run more up to dat

Re: CERT Advisory CA-2002-05 Multiple Vulnerabilities in PHP fileupload

2002-02-28 Thread Wichert Akkerman
Previously Andrew Suffield wrote: > The normal solution in debian is to backport a fix to stable. I see > php.org has a patch for php 4.0.6, this can probably be backported to > 4.0.3/4.0.5 fairly easily. Already done. Before being able to make a php security fix we need to fix the ABI changes in

Netsaint

2002-02-28 Thread Johan Jacobsson
Hello! I am using netsaint_statd on a debian machine and I would like to know what I am doing, eg what security holes may this create? As I understand it, the netsaint_statd deamon makes it possible to extract information about CPU load, disk usage, memory load etc. Is this a security problem? Has

RE: CERT Advisory CA-2002-05 Multiple Vulnerabilities in PHP fileupload

2002-02-28 Thread Jeff
> Andrew Suffield wrote: > Installing unstable packages is in no sense a solution, for > people doing serious security setups. What should be realised of course, is that Apache recommended moving to 1.3.19 and quite some time ago 1.3.23 - so while you might consider the packaging to be unstable,

Re: Netsaint

2002-02-28 Thread Jeremy T. Bouse
I'm not aware of any security holes created by it... I originally start'd using it with Netsaint to monitor 2 networks but then changed over to NPRE as it had built-in mechanics for only allowing the checks to come from a specific host(s) thereby greatly limiting who could access that dat

RE: Netsaint

2002-02-28 Thread James Unitt
Netsaint is actually pretty extensible, if you do a bit of lateral thinking. I implemented it for all of the linux boxes at an isp I was working at about a year ago. However I wasnt particularly happy with the way it implemented remote agents, iirc it used a perl script with sockets to access them

Re: CERT Advisory CA-2002-05 Multiple Vulnerabilities in PHP fileupload

2002-02-28 Thread Dmitry Borodaenko
On Thu, Feb 28, 2002 at 02:56:02PM -, Jeff wrote: > > Andrew Suffield wrote: > > Installing unstable packages is in no sense a solution, for > > people doing serious security setups. > What should be realised of course, is that Apache recommended > moving to 1.3.19 and quite some time ago 1.3.

Re: CERT Advisory CA-2002-05 Multiple Vulnerabilities in PHP fileupload

2002-02-28 Thread Petro
On Thu, Feb 28, 2002 at 08:37:45AM -, Jeff wrote: > I received this CERT Advisory about 6 hours ago, regarding PHP. > The php website confirms the details: www.php.net > I think this is going to be a problem for us, due to the way > the Debian packaging works - > I guess that the immediate s

Security implications of chpasswd.

2002-02-28 Thread Petro
For some very good reasons I had to do a mass change of passwords on one of our exposed login machines (no breach/hack, different reason). There is a utility included in Debian Stable (and the others) to do this called chpasswd. I believe there may be some security issu

Re: Security implications of chpasswd.

2002-02-28 Thread Jean-Francois Dive
hello, chpasswd is in the shadow source package (you can find this out using apt-show commands). You can workaround the problem by using a script which will use the -e option and fill an encrypted passwd, this will also solved this other problem you talk about. There is a bug already reported abo

[ ±¤ °í ]JeeprvÄ«¿ëÇ° Àü±¹ ¾îµð¼­³ª ¹«·áÀåÂø!!!

2002-02-28 Thread ÇÑä¿Á
Title: 대원지프랜드 소식지     이러한 메일을 받지 않으시려면 수신거부를 눌러 주세요.    장착전문점 찾아가ê¸

CERT Advisory CA-2002-05 Multiple Vulnerabilities in PHP fileupload

2002-02-28 Thread Jeff
I received this CERT Advisory about 6 hours ago, regarding PHP. The php website confirms the details: www.php.net I think this is going to be a problem for us, due to the way the Debian packaging works - We upgraded to Apache 1.3.19-1 for security reasons. Package dependencies meant we ended up

Welcome to Liers_dot_net_Liers_dot_org_auction_notification_list

2002-02-28 Thread auction-request
-- Welcome to the liers.org/liers.net auction notification list. You are receiving this message because you have been subscribed to this list. This list has been setup to notify you when the auction of "liers.org" and "liers.net", on eBay commences. If you do not wish to be on this list you

Re: CERT Advisory CA-2002-05 Multiple Vulnerabilities in PHP fileupload

2002-02-28 Thread Lupe Christoph
On Thursday, 2002-02-28 at 08:37:45 -, Jeff wrote: > I received this CERT Advisory about 6 hours ago, regarding PHP. > The php website confirms the details: www.php.net > I think this is going to be a problem for us, due to the way > the Debian packaging works - > We upgraded to Apache 1.3.

Re: CERT Advisory CA-2002-05 Multiple Vulnerabilities in PHP fileupload

2002-02-28 Thread Dmitry Borodaenko
Does apt from potato (0.3.19) support Pinning? I don't think so. Thus, you will need to upgrade your apt manually first. -- Dmitry Borodaenko On Thu, Feb 28, 2002 at 10:37:00AM +0100, Lupe Christoph wrote: > If you want to run more up to date packages, you have to > get them from the "testing",

Re: CERT Advisory CA-2002-05 Multiple Vulnerabilities in PHP fileupload

2002-02-28 Thread Andrew Suffield
On Thu, Feb 28, 2002 at 01:25:25PM +0200, Dmitry Borodaenko wrote: > Does apt from potato (0.3.19) support Pinning? I don't think so. Thus, > you will need to upgrade your apt manually first. > > On Thu, Feb 28, 2002 at 10:37:00AM +0100, Lupe Christoph wrote: > > If you want to run more up to date

Re: CERT Advisory CA-2002-05 Multiple Vulnerabilities in PHP fileupload

2002-02-28 Thread Wichert Akkerman
Previously Andrew Suffield wrote: > The normal solution in debian is to backport a fix to stable. I see > php.org has a patch for php 4.0.6, this can probably be backported to > 4.0.3/4.0.5 fairly easily. Already done. Before being able to make a php security fix we need to fix the ABI changes in

Netsaint

2002-02-28 Thread Johan Jacobsson
Hello! I am using netsaint_statd on a debian machine and I would like to know what I am doing, eg what security holes may this create? As I understand it, the netsaint_statd deamon makes it possible to extract information about CPU load, disk usage, memory load etc. Is this a security problem? Has

RE: CERT Advisory CA-2002-05 Multiple Vulnerabilities in PHP fileupload

2002-02-28 Thread Jeff
> Andrew Suffield wrote: > Installing unstable packages is in no sense a solution, for > people doing serious security setups. What should be realised of course, is that Apache recommended moving to 1.3.19 and quite some time ago 1.3.23 - so while you might consider the packaging to be unstable, t

Re: Netsaint

2002-02-28 Thread Jeremy T. Bouse
I'm not aware of any security holes created by it... I originally start'd using it with Netsaint to monitor 2 networks but then changed over to NPRE as it had built-in mechanics for only allowing the checks to come from a specific host(s) thereby greatly limiting who could access that data

RE: Netsaint

2002-02-28 Thread James Unitt
Netsaint is actually pretty extensible, if you do a bit of lateral thinking. I implemented it for all of the linux boxes at an isp I was working at about a year ago. However I wasnt particularly happy with the way it implemented remote agents, iirc it used a perl script with sockets to access them.

Re: CERT Advisory CA-2002-05 Multiple Vulnerabilities in PHP fileupload

2002-02-28 Thread Dmitry Borodaenko
On Thu, Feb 28, 2002 at 02:56:02PM -, Jeff wrote: > > Andrew Suffield wrote: > > Installing unstable packages is in no sense a solution, for > > people doing serious security setups. > What should be realised of course, is that Apache recommended > moving to 1.3.19 and quite some time ago 1.3.2

Re: CERT Advisory CA-2002-05 Multiple Vulnerabilities in PHP fileupload

2002-02-28 Thread Petro
On Thu, Feb 28, 2002 at 08:37:45AM -, Jeff wrote: > I received this CERT Advisory about 6 hours ago, regarding PHP. > The php website confirms the details: www.php.net > I think this is going to be a problem for us, due to the way > the Debian packaging works - > I guess that the immediate so

Security implications of chpasswd.

2002-02-28 Thread Petro
For some very good reasons I had to do a mass change of passwords on one of our exposed login machines (no breach/hack, different reason). There is a utility included in Debian Stable (and the others) to do this called chpasswd. I believe there may be some security issue

Re: Security implications of chpasswd.

2002-02-28 Thread Jean-Francois Dive
hello, chpasswd is in the shadow source package (you can find this out using apt-show commands). You can workaround the problem by using a script which will use the -e option and fill an encrypted passwd, this will also solved this other problem you talk about. There is a bug already reported abou