Problems with PHP again...

Discussion in 'The Lounge' started by bigal, Aug 24, 2005.

?

Have your forums been hit by a virus attack?

  1. Yes, and I lost everything. Somebody's gonna pay...

    100.0%
  2. I'm not sure. But I lost everything one day, and somebody is still gonna pay....

    0 vote(s)
    0.0%
  3. Not yet. However, somebody will pay if they mess with me....

    0 vote(s)
    0.0%
  1. bigal

    bigal

    Joined:
    Jul 1, 2005
    Messages:
    1,483
    Location:
    Northern Virginia, USA
    PHP hit by another critical flaw -
    Version 1.4.0 of PEAR XML_RPC fixes the problem
    News Story by Matthew Broersma
    AUGUST 23, 2005 (TECHWORLD.COM) - A fresh security flaw has surfaced in the PHP Web service protocol that could allow attackers to take control of vulnerable servers.
    The bug was found in XML-RPC for PHP and PEAR XML_RPC as the result of a security audit by the Hardened-PHP Project. The group said it decided to carry out its own audit after other flaws were disclosed in the two libraries earlier this summer.
    The new flaw takes advantage of a technique similar to the earlier vulnerabilities, which involved eval() statements, according to Hardened-PHP. "To get rid of this and future eval() injection vulnerabilities, the Hardened-PHP Project has developed, together with the maintainers of both libraries, a fix that completely eliminates the use of eval() from the library," Hardened-PHP said in an advisory.
    XML-based Remote Procedure Call (RPC) systems, such as XML-RPC, are used with HTTP to power Web services, a simple and increasingly popular way of providing services online. XML-RPC for PHP (also called PHPXMLRPC) and PEAR XML_RPC use XML-RPC as the PHP scripting language.
    The bug affects a large number of Web applications, particularly PHP-based blogging, Wiki and content management programs, according to security experts. The PHPXMLRPC and PEAR XML_RPC libraries are used in many popular Web applications, such as PostNuke, Drupal, b2evolution and TikiWiki.
    Content-management systems and blogs are increasingly used by large corporations as a way of interacting with customers and other members of the public. IBM even jumped into the enterprise blogging game recently.
    Version 1.4.0 of PEAR XML_RPC fixes the problem in PEAR XML_RPC; it is available from the PEAR Web site.
    PHPXMLRPC is fixed with Version 1.2, which is available at the PHPXMLRPC project site.
    Software projects using the libraries have issued their own updates fixing the problem; these include the PHP packages included with the Red Hat and Ubuntu Linux distributions.
    The French Security Incident Response Team, rated the flaw as "high-risk," while independent security firm Secunia labeled it "highly critical."
    http://www.computerworld.com/securi...10801,104124,00.html?source=NLT_AM&nid=104124 :ahhhh:
    bigal, Aug 24, 2005
    #1
    1. Advertising

Want to reply to this thread or ask your own question?

It takes just 2 minutes to sign up (and it's free!). Just click the sign up button to choose a username and then you can ask your own questions on the forum.
Similar Threads
  1. raviraj joshi
    Replies:
    0
    Views:
    624
    raviraj joshi
    Jul 4, 2009
  2. Lawrence D'Oliveiro

    PHP Fail Again

    Lawrence D'Oliveiro, Apr 5, 2010, in forum: NZ Computing
    Replies:
    0
    Views:
    362
    Lawrence D'Oliveiro
    Apr 5, 2010
  3. EVS
    Replies:
    0
    Views:
    1,850
  4. infocus
    Replies:
    0
    Views:
    873
    infocus
    Jul 19, 2010
  5. EVS
    Replies:
    0
    Views:
    1,658
Loading...

Share This Page