lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <200603281555.24868.tonu@jes.ee>
Date: Tue Mar 28 15:52:40 2006
From: tonu at jes.ee (Tõnu Samuel)
Subject: Critical PHP bug - act ASAP if you are running
	web with sensitive data

Hi everybody!

I want to tell that pretty nasty bug was discovered in PHP (all tested 
versions were vulnerable). I do not want to disclose much details as it may 
hurt many websites. I expect PHP team to make patch first.

There is simple way to protect yourself against this bug if you put some code 
in beginning of every source code looking for weird ASCII bytes before any 
other code. Make some kind of "white-list" for characters you allow and deny 
everything else.

More details to come when we have PHP patches distributed with major 
distributions. I might disclose details before to some IDS vendor or other 
trusted party.

  T?nu

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ