lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <200603281555.24868.tonu@jes.ee>
Date: Tue, 28 Mar 2006 15:55:24 +0300
From: Tõnu Samuel <tonu@....ee>
To: full-disclosure@...ts.grok.org.uk,
 bugtraq@...urityfocus.com
Subject: Critical PHP bug - act ASAP if you are running
	web with sensitive data


Hi everybody!

I want to tell that pretty nasty bug was discovered in PHP (all tested 
versions were vulnerable). I do not want to disclose much details as it may 
hurt many websites. I expect PHP team to make patch first.

There is simple way to protect yourself against this bug if you put some code 
in beginning of every source code looking for weird ASCII bytes before any 
other code. Make some kind of "white-list" for characters you allow and deny 
everything else.

More details to come when we have PHP patches distributed with major 
distributions. I might disclose details before to some IDS vendor or other 
trusted party.

  Tõnu

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ