PHP 4.3.8 Released, Fixing Remote Security Hole 30
christian klink writes "While it was already reported on Slashdot, that PHP5 was released, it was not mentioned that the PHP developers have also announced the release of PHP 4.3.8 which is supposed to fix a major remote security hole in nearly all PHP installations. Additionally this new version adds a workaround for another Internet Explorer bug. The bugs were found by security specialist Stefan Esser of e-matters who is also a member of the PHP developers."
Not frontpage? (Score:3, Insightful)
not exploitable everywhere? (Score:3, Interesting)
Re:not exploitable everywhere? (Score:4, Informative)
And sessions are also very commonly used.
Basicly everyone who uses PHP uses one if not both of these.
Temporary solution? (Score:3, Informative)
what does this cover? (Score:3)
Are there PHP config options to address this scenario?
Re:what does this cover? (Score:3, Informative)
As people are going to be recompiling PHP it's probably timely to recommend the "--enable-inline-optimization" switch which should be passed to the configure script. More to be found here [phplens.com] Oh, and get yourself an accelerator. I use PHP Accelerator [php-accelerator.co.uk] although it's not open sourse unfortunately.
Secure yourself with this... (Score:1)
Re:Secure yourself with this... (Score:1, Informative)
I turned off memory_limit and set max_execution to 2 seconds for our sites but this still leaves us open to DOS attack (entire server is being swapped out for one running PHP5 - tommorow). We are a special case, everybody else should patch ASAP.
This is a serious hole, please don't give out incorrect information.
Re:Secure yourself with this... (Score:1)
Re:Secure yourself with this... (Score:2)
HHOS. That poster's advice is like saying "Since car thieves like your radio so much, put a sign on your car saying 'No radio'."
Mac OS X / Marc Liyanage distribution (Score:2)
As far as I can tell, the popular PHP distribution from Marc Liyanage for Mac OS X [entropy.ch] (still at version 4.3.6) is not vulnerable: it seems to be compiled without memory_limit support. ini_get_all() does not return a value for memory_limit, and memory_get_usage() returns Fatal error: Call to undefined function: memory_get_usage().
I haven't tested the built-in Mac OS X php version.
JP
Disappointed (Score:1, Redundant)
Re:Disappointed (Score:2)
Re:Disappointed (Score:2)
Re:Disappointed (Score:2)
Ballmer - Xbox 'Can Take Sony' In Next Generation
And the Atak worm.
sigh
OSS elitism (Score:2)
I use linux too, like most people here, and would have really appreciated seeing this earlier.
Re:OSS elitism (Score:2)
Hype? (Score:1)
Re:Hype? (Score:1, Informative)
Additionally Stefan Esser from e-matters is one of the PHP Developers and one of their securiy team members, so he is the source itself.
Hardened PHP (Score:1)
Written by the same guy that discovered the php4 exploit, he's also a php developer.