PHP 4.1.2 available in source (RE: Multiple PHP Security Vulnerabilies)

Rod Gammon AEG-Inc at hawaii.rr.com
Wed Feb 27 13:32:58 PST 2002


PHP 4.1.2 (or most recent stable subsequent) here:
http://www.php.net/downloads.php

This fixes/addresses Warren's post.

-rg

-----Original Message-----
From: Warren Togami [mailto:warren at togami.com]
Sent: Wednesday, February 27, 2002 9:33 AM
To: Linux & Unix Advocates & Users
Subject: [luau] Multiple PHP Security Vulnerabilies


For those of you running PHP on Linux or Solaris web servers you may want to
heed this security warning.  At least do the quick work-around by editing
php.ini and disabling file_upload, then restart your web server for the
change to take effect.

http://www.linuxsecurity.com/articles/server_security_article-4515.html

e-matters GmbH
                           www.e-matters.de

                       -= Security  Advisory =-



      Advisory: Multiple Remote Vulnerabilites within PHP's fileupload code
  Release Date: 2002/02/27
 Last Modified: 2002/02/27
        Author: Stefan Esser [s.esser at e-matters.de]

   Application: PHP v3.10-v3.18, v4.0.1-v4.1.1
      Severity: Several vulnerabilities in PHP's fileupload code allow
                remote compromise
          Risk: Critical
 Vendor Status: Patches Released
     Reference: http://security.e-matters.de/advisories/012002.html



 Overview:

    We found several flaws in the way PHP handles multipart/form-data POST
    requests. Each of the flaws could allow an attacker to execute arbitrary
    code on the victim's  system.


 Details:

    PHP supports multipart/form-data POST requests (as described in RFC1867)
    known as POST fileuploads. Unfourtunately there are several flaws in the
    php_mime_split function that could be used by an attacker to execute
    arbitrary code. During our research we found out that not only PHP4 but
    also older versions from the PHP3 tree are vulnerable.


    The following is a list of bugs we found:

    PHP 3.10-3.18

       - broken boundary check    (hard to exploit)
       - arbitrary heap overflow  (easy exploitable)

    PHP 4.0.1-4.0.3pl1

       - broken boundary check    (hard to exploit)
       - heap off by one          (easy exploitable)

    PHP 4.0.2-4.0.5

       - 2 broken boundary checks (one very easy and one hard to exploit)

    PHP 4.0.6-4.0.7RC2

       - broken boundary check    (very easy to exploit)

    PHP 4.0.7RC3-4.1.1

       - broken boundary check    (hard to exploit)


    Finally I want to mention that most of these vulnerabilities are
    exploitable only on linux or solaris. But the heap off by one is only
    exploitable on x86 architecture and the arbitrary heap overflow in
    PHP3 is exploitable on most OS and architectures. (This includes *BSD)

    Users running PHP 4.2.0-dev from cvs are not vulnerable to any of the
    described bugs because the fileupload code was completly rewritten for
    the 4.2.0 branch.


 Proof of Concept:

    e-matters is not going to release exploits for any of the discovered
    vulnerabilities to the public.


 Vendor Response:

    Because I am part of the php developer team there is not much I can
    write here...

    27th February 2002 - An updated version of php and the patch for
                         these vulnerabilities are now available at:
                         http://www.php.net/downloads.php


 Recommendation:

    If you are running PHP 4.0.3 or above one way to workaround these
    bugs is to disable the fileupload support within your php.ini
    (file_uploads = Off) If you are running php as module keep in mind
    to restart the webserver. Anyway you should better install the
    fixed or a properly patched version to be safe.


 Sidenotice:

    This advisory is so short because I don't want to give out more info
    than is needed.

    Users running the developer version of php (4.2.0-dev) are not
    vulnerable to these bugs because the fileupload support was completly
    rewritten for that branch.


 GPG-Key:

    http://security.e-matters.de/gpg_key.asc

    pub  1024D/75E7AAD6 2002-02-26 e-matters GmbH - Securityteam
    Key fingerprint = 43DD 843C FAB9 832A E5AB  CAEB 81F2 8110 75E7 AAD6


 Copyright 2002 Stefan Esser. All rights reserved.



---
You are currently subscribed to luau as: AEG-Inc at hawaii.rr.com
To unsubscribe send a blank email to $subst('Email.Unsub')



More information about the LUAU mailing list