<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
<meta content="text/html; charset=ISO-8859-1"
http-equiv="Content-Type">
</head>
<body bgcolor="#ffffff" text="#000000">
I will take a look and see if it is possible within the current
framework.<br>
<br>
On 27/08/2010 18:37, Duncan, Brian M. wrote:
<blockquote
cite="mid:65234743FE1555428435CE39E6AC40780379519B@CHI-US-EXCH-01.us.kmz.com"
type="cite">
<meta http-equiv="Content-Type" content="text/html;
charset=ISO-8859-1">
<meta content="MSHTML 6.00.6002.18255" name="GENERATOR">
<div dir="ltr" align="left"><span class="090382117-27082010"><font
color="#0000ff" face="Arial" size="2">We have had Zendto in
production for a little over a week now without issue.</font></span></div>
<div dir="ltr" align="left"><span class="090382117-27082010"></span> </div>
<div dir="ltr" align="left"><span class="090382117-27082010"><font
color="#0000ff" face="Arial" size="2">We are still waiting
on the OK to use MyZendto with our users in production.</font></span></div>
<div dir="ltr" align="left"><span class="090382117-27082010"></span> </div>
<div dir="ltr" align="left"><span class="090382117-27082010"><font
color="#0000ff" face="Arial" size="2">Everyone so far seems
to like it much better then using our Firm FTP site. </font></span></div>
<div dir="ltr" align="left"><span class="090382117-27082010"></span> </div>
<div><font color="#0000ff" face="Arial" size="2"><span
class="090382117-27082010">Any chance that every pickup of a
drop-off could be listed in the picked-up on date section?</span></font></div>
<div><font color="#0000ff" face="Arial" size="2"><span
class="090382117-27082010"></span></font> </div>
<div><font color="#0000ff" face="Arial" size="2"><span
class="090382117-27082010"><img
src="cid:part1.01070401.09080504@Zend.To"></span></font></div>
<div><font color="#0000ff" face="Arial" size="2"><span
class="090382117-27082010"></span></font> </div>
<div><font color="#0000ff" face="Arial" size="2"><span
class="090382117-27082010">Like the above drop-off shows the
first time it was picked up. Even though it was picked up
from multiple machines (link was forwarded to other users)</span></font></div>
<div><font color="#0000ff" face="Arial" size="2"><span
class="090382117-27082010"></span></font> </div>
<div><font color="#0000ff" face="Arial" size="2"><span
class="090382117-27082010">The feature request would be:</span></font></div>
<div><font color="#0000ff" face="Arial" size="2"><span
class="090382117-27082010"></span></font> </div>
<div><font color="#0000ff" face="Arial" size="2"><span
class="090382117-27082010">If it was picked up 3 times, it
would show all 3 pickups and list 3 pickups instead of 1
pickup?</span></font></div>
<div><font color="#0000ff" face="Arial" size="2"><span
class="090382117-27082010"></span></font> </div>
<div><font color="#0000ff" face="Arial" size="2"><span
class="090382117-27082010">Thanks</span></font></div>
<!-- Converted from text/plain format -->
<p><font size="2">BRIAN M. DUNCAN<br>
Data Security Administrator<br>
Katten Muchin Rosenman LLP<br>
525 W. Monroe Street / Chicago, IL 60661-3693<br>
p / (312) 577-8045 f / (312) 577-4490<br>
<a class="moz-txt-link-abbreviated" href="mailto:brian.duncan@kattenlaw.com">brian.duncan@kattenlaw.com</a> / <a class="moz-txt-link-abbreviated" href="http://www.kattenlaw.com">www.kattenlaw.com</a><br>
</font></p>
<div> </div>
<br>
<div class="OutlookMessageHeader" dir="ltr" align="left"
lang="en-us">
<hr tabindex="-1">
<font face="Tahoma" size="2"><b>From:</b> <a class="moz-txt-link-abbreviated" href="mailto:zendto-bounces@zend.to">zendto-bounces@zend.to</a>
[<a class="moz-txt-link-freetext" href="mailto:zendto-bounces@zend.to">mailto:zendto-bounces@zend.to</a>] <b>On Behalf Of </b>Jules<br>
<b>Sent:</b> Tuesday, August 24, 2010 9:44 AM<br>
<b>To:</b> ZendTo Users<br>
<b>Subject:</b> [ZendTo] Re: Question related to version of
PHP in CentOS VM's :..<br>
</font><br>
</div>
Back-porting fixes is standard practise amongst all OS vendors.
Moving to a newer version will change the behaviour of existing
features (almost always) which will break customers' working
systems, which is A Very Bad Thing(tm).<br>
So instead you back-port fixes to keep the functional behaviour
the same.<br>
<br>
Jules.<br>
<br>
On 23/08/2010 21:47, Duncan, Brian M. wrote:
<blockquote
cite="mid:65234743FE1555428435CE39E6AC40780379518A@CHI-US-EXCH-01.us.kmz.com"
type="cite">
<meta content="MSHTML 6.00.6002.18255" name="GENERATOR">
<div dir="ltr" align="left"><span class="732284420-23082010"><font
color="#0000ff" face="Arial" size="2">Thanks Jules,</font></span></div>
<div dir="ltr" align="left"><span class="732284420-23082010"></span> </div>
<div dir="ltr" align="left"><span class="732284420-23082010"><font
color="#0000ff" face="Arial" size="2">I did not realize
they back ported fixes for PHP.</font></span></div>
<div dir="ltr" align="left"><span class="732284420-23082010"></span> </div>
<div dir="ltr" align="left"><span class="732284420-23082010"><font
color="#0000ff" face="Arial" size="2">Since Nessus
displays information based on version banner, it is
probably a false positive then. (When advertising version
in the php.ini)</font></span></div>
<div dir="ltr" align="left"><span class="732284420-23082010"></span> </div>
<div dir="ltr" align="left"><span class="732284420-23082010"></span> </div>
<div> </div>
<!-- Converted from text/plain format -->
<p><font size="2">BRIAN M. DUNCAN<br>
Data Security Administrator<br>
Katten Muchin Rosenman LLP<br>
525 W. Monroe Street / Chicago, IL 60661-3693<br>
p / (312) 577-8045 f / (312) 577-4490<br>
<a moz-do-not-send="true" class="moz-txt-link-abbreviated"
href="mailto:brian.duncan@kattenlaw.com">brian.duncan@kattenlaw.com</a>
/ <a moz-do-not-send="true"
class="moz-txt-link-abbreviated"
href="http://www.kattenlaw.com">www.kattenlaw.com</a><br>
</font></p>
<div> </div>
<br>
<div class="OutlookMessageHeader" dir="ltr" align="left"
lang="en-us">
<hr tabindex="-1"> <font face="Tahoma" size="2"><b>From:</b>
<a moz-do-not-send="true" class="moz-txt-link-abbreviated"
href="mailto:zendto-bounces@zend.to">zendto-bounces@zend.to</a>
[<a moz-do-not-send="true" class="moz-txt-link-freetext"
href="mailto:zendto-bounces@zend.to">mailto:zendto-bounces@zend.to</a>]
<b>On Behalf Of </b>Julian Field<br>
<b>Sent:</b> Monday, August 23, 2010 12:53 PM<br>
<b>To:</b> ZendTo Users<br>
<b>Subject:</b> [ZendTo] Re: Question related to version of
PHP in CentOS VM's :..<br>
</font><br>
</div>
<div><br>
RedHat and hence CentOS back port security fixes, so the
version number is a poor indicator of security holes.</div>
<div><br>
--
<div>Jules</div>
</div>
<div><br>
On 18 Aug 2010, at 07:47 PM, "Duncan, Brian M." <<a
href="mailto:brian.duncan@kattenlaw.com"
moz-do-not-send="true">brian.duncan@kattenlaw.com</a>>
wrote:<br>
<br>
</div>
<div><span></span></div>
<blockquote type="cite">
<div>
<div dir="ltr" align="left"><font color="#0000ff"
face="Arial" size="2"><span class="823452818-18082010">I've
always shied away from using PHP with apache on
externally facing web sites in the past due to always
seeing a constant flow of new vulnerabilities.</span></font></div>
<div> </div>
<div><span class="823452818-18082010"><font color="#0000ff"
face="Arial" size="2">Does anyone know if the version
of PHP that is current according to CentOS safe?</font></span></div>
<div><span class="823452818-18082010"></span> </div>
<div><span class="823452818-18082010"><font color="#0000ff"
face="Arial" size="2">I ran a Nessus scan against my
Zendto box and it is listing 6 "HIGH" security risks
so far that are supposedly tied to PHP version. I
just noticed they all refer so far to using PHP 5.2.5
or later. Not sure if any of these are false
positives yet.</font></span></div>
<div><span class="823452818-18082010"></span> </div>
<div><span class="823452818-18082010"></span> </div>
<div><span class="823452818-18082010"><font color="#0000ff"
face="Arial" size="2">Here is some of the Nessus
"HIGH" security scan listed output for any interested:</font></span></div>
<div><span class="823452818-18082010"></span> </div>
<div><span class="823452818-18082010"></span> </div>
<div><span class="823452818-18082010"></span> </div>
<div><span class="823452818-18082010">
<table align="center" border="0" cellpadding="2"
cellspacing="0" width="70%">
<tbody>
<tr class="plugin_sev_high">
<td class="plugin_label" align="left">PHP <
5.2.5 Multiple Vulnerabilities</td>
</tr>
<tr class="info_bg">
<td class="info_text" colspan="2">
<div class="plugin_output"><br>
<b>Synopsis:</b><br>
The remote web server uses a version of PHP
that is affected by multiple flaws.<br>
<br>
<b>Description:</b><br>
According to its banner, the version of PHP
installed on the remote host is older than
5.2.5. Such versions may be affected by
various issues, including but not limited to
several buffer overflows.<br>
<br>
<b>Risk factor:</b><br>
High<br>
<br>
<b>CVSS Base Score:</b>7.5<br>
CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P<br>
<br>
<b>See also:</b><br>
<a
href="http://www.php.net/releases/5_2_5.php"
moz-do-not-send="true">http://www.php.net/releases/5_2_5.php</a><br>
<br>
<b>Solution:</b><br>
Upgrade to PHP version 5.2.5 or later.<br>
<br>
<b>Plugin output:</b><br>
PHP version 5.1.6 appears to be running on the
remote host based on the following
X-Powered-By response header : X-Powered-By:
PHP/5.1.6 <br>
<br>
<b>Plugin ID:</b><br>
<a
href="http://www.nessus.org/plugins/index.php?view=single&id=28181"
moz-do-not-send="true">28181</a><br>
<br>
<b>CVE: </b><br>
CVE-2007-4887, CVE-2007-5898, CVE-2007-5900<br>
<br>
<b>BID: </b><br>
<a
href="http://www.securityfocus.com/bid/26403"
moz-do-not-send="true">26403</a><br>
<br>
<b>Other references: </b><br>
OSVDB:38680, OSVDB:38681, OSVDB:38682,
OSVDB:38683, OSVDB:38684, OSVDB:38685</div>
</td>
</tr>
</tbody>
</table>
<table align="center" border="0" cellpadding="2"
cellspacing="0" width="70%">
<tbody>
<tr class="plugin_sev_high">
<td class="plugin_label" align="left">PHP <
5.2.1 Multiple Vulnerabilities</td>
</tr>
<tr class="info_bg">
<td class="info_text" colspan="2">
<div class="plugin_output"><br>
<b>Synopsis:</b><br>
The remote web server uses a version of PHP
that is affected by multiple flaws.<br>
<br>
<b>Description:</b><br>
According to its banner, the version of PHP
installed on the remote host is older than
5.2.1. Such versions may be affected by
several issues, including buffer overflows,
format string vulnerabilities, arbitrary code
execution, 'safe_mode' and 'open_basedir'
bypasses, and clobbering of super-globals.<br>
<br>
<b>Risk factor:</b><br>
High<br>
<br>
<b>CVSS Base Score:</b>7.5<br>
CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P<br>
<br>
<b>See also:</b><br>
<a
href="http://www.php.net/releases/5_2_1.php"
moz-do-not-send="true">http://www.php.net/releases/5_2_1.php</a><br>
<br>
<b>Solution:</b><br>
Upgrade to PHP version 5.2.1 or later.<br>
<br>
<b>Plugin output:</b><br>
PHP version 5.1.6 appears to be running on the
remote host based on the following
X-Powered-By response header : X-Powered-By:
PHP/5.1.6 <br>
<br>
<b>Plugin ID:</b><br>
<a
href="http://www.nessus.org/plugins/index.php?view=single&id=24907"
moz-do-not-send="true">24907</a><br>
<br>
<b>CVE: </b><br>
CVE-2006-6383, CVE-2007-0905, CVE-2007-0906,
CVE-2007-0907, CVE-2007-0908, CVE-2007-0909,
CVE-2007-0910, CVE-2007-1376, CVE-2007-1380,
CVE-2007-1453, CVE-2007-1700, CVE-2007-1701,
CVE-2007-1824, CVE-2007-1825, CVE-2007-1884,
CVE-2007-1885, CVE-2007-1886, CVE-2007-1887,
CVE-2007-1890<br>
<br>
<b>BID: </b><br>
<a
href="http://www.securityfocus.com/bid/21508"
moz-do-not-send="true">21508</a>, <a
href="http://www.securityfocus.com/bid/22496"
moz-do-not-send="true">22496</a>, <a
href="http://www.securityfocus.com/bid/22805"
moz-do-not-send="true">22805</a>, <a
href="http://www.securityfocus.com/bid/22806"
moz-do-not-send="true">22806</a>, <a
href="http://www.securityfocus.com/bid/22862"
moz-do-not-send="true">22862</a>, <a
href="http://www.securityfocus.com/bid/22922"
moz-do-not-send="true">22922</a>, <a
href="http://www.securityfocus.com/bid/23119"
moz-do-not-send="true">23119</a>, <a
href="http://www.securityfocus.com/bid/23120"
moz-do-not-send="true">23120</a>, <a
href="http://www.securityfocus.com/bid/23219"
moz-do-not-send="true">23219</a>, <a
href="http://www.securityfocus.com/bid/23233"
moz-do-not-send="true">23233</a>, <a
href="http://www.securityfocus.com/bid/23234"
moz-do-not-send="true">23234</a>, <a
href="http://www.securityfocus.com/bid/23235"
moz-do-not-send="true">23235</a>, <a
href="http://www.securityfocus.com/bid/23236"
moz-do-not-send="true">23236</a>, <a
href="http://www.securityfocus.com/bid/23237"
moz-do-not-send="true">23237</a>, <a
href="http://www.securityfocus.com/bid/23238"
moz-do-not-send="true">23238</a><br>
<br>
<b>Other references: </b><br>
OSVDB:32763, OSVDB:32764, OSVDB:32765,
OSVDB:32766, OSVDB:32767, OSVDB:32768,
OSVDB:32776, OSVDB:32781, OSVDB:33269,
OSVDB:33933, OSVDB:33944, OSVDB:33945,
OSVDB:33955, OSVDB:33957, OSVDB:33958,
OSVDB:33959, OSVDB:33960, OSVDB:34767</div>
</td>
</tr>
</tbody>
</table>
<table align="center" border="0" cellpadding="2"
cellspacing="0" width="70%">
<tbody>
<tr class="plugin_sev_high">
<td class="plugin_label" align="left">PHP <
5.2.4 Multiple Vulnerabilities</td>
</tr>
<tr class="info_bg">
<td class="info_text" colspan="2">
<div class="plugin_output"><br>
<b>Synopsis:</b><br>
The remote web server uses a version of PHP
that is affected by multiple flaws.<br>
<br>
<b>Description:</b><br>
According to its banner, the version of PHP
installed on the remote host is older than
5.2.4. Such versions may be affected by
various issues, including but not limited to
several overflows.<br>
<br>
<b>Risk factor:</b><br>
High<br>
<br>
<b>CVSS Base Score:</b>7.5<br>
CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P<br>
<br>
<b>See also:</b><br>
<a
href="http://www.php.net/releases/5_2_4.php"
moz-do-not-send="true">http://www.php.net/releases/5_2_4.php</a><br>
<br>
<b>Solution:</b><br>
Upgrade to PHP version 5.2.4 or later.<br>
<br>
<b>Plugin output:</b><br>
PHP version 5.1.6 appears to be running on the
remote host based on the following
X-Powered-By response header : X-Powered-By:
PHP/5.1.6 <br>
<br>
<b>Plugin ID:</b><br>
<a
href="http://www.nessus.org/plugins/index.php?view=single&id=25971"
moz-do-not-send="true">25971</a><br>
<br>
<b>CVE: </b><br>
CVE-2007-2872, CVE-2007-3378, CVE-2007-3806<br>
<br>
<b>BID: </b><br>
<a
href="http://www.securityfocus.com/bid/24661"
moz-do-not-send="true">24661</a>, <a
href="http://www.securityfocus.com/bid/24261"
moz-do-not-send="true">24261</a>, <a
href="http://www.securityfocus.com/bid/24922"
moz-do-not-send="true">24922</a>, <a
href="http://www.securityfocus.com/bid/25498"
moz-do-not-send="true">25498</a><br>
<br>
<b>Other references: </b><br>
OSVDB:36083, OSVDB:36085, OSVDB:36869</div>
</td>
</tr>
</tbody>
</table>
<table align="center" border="0" cellpadding="2"
cellspacing="0" width="70%">
<tbody>
<tr class="plugin_sev_high">
<td class="plugin_label" align="left">PHP < 5.2
Multiple Vulnerabilities</td>
</tr>
<tr class="info_bg">
<td class="info_text" colspan="2">
<div class="plugin_output"><br>
<b>Synopsis:</b><br>
The remote web server uses a version of PHP
that is affected by multiple buffer overflows.<br>
<br>
<b>Description:</b><br>
According to its banner, the version of PHP
installed on the remote host is older than
5.2. Such versions may be affected by several
buffer overflows. To exploit these issues, an
attacker would need the ability to upload an
arbitrary PHP script on the remote server, or
to be able to manipulate several variables
processed by some PHP functions such as
htmlentities().<br>
<br>
<b>Risk factor:</b><br>
High<br>
<br>
<b>CVSS Base Score:</b>7.5<br>
CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P<br>
<br>
<b>See also:</b><br>
<a
href="http://www.php.net/releases/5_2_0.php"
moz-do-not-send="true">http://www.php.net/releases/5_2_0.php</a><br>
<br>
<b>Solution:</b><br>
Upgrade to PHP version 5.2.0 or later.<br>
<br>
<b>Plugin output:</b><br>
PHP version 5.1.6 appears to be running on the
remote host based on the following
X-Powered-By response header : X-Powered-By:
PHP/5.1.6 <br>
<br>
<b>Plugin ID:</b><br>
<a
href="http://www.nessus.org/plugins/index.php?view=single&id=31649"
moz-do-not-send="true">31649</a><br>
<br>
<b>CVE: </b><br>
CVE-2006-5465<br>
<br>
<b>BID: </b><br>
<a
href="http://www.securityfocus.com/bid/20879"
moz-do-not-send="true">20879</a><br>
<br>
<b>Other references: </b><br>
OSVDB:30178, OSVDB:30179</div>
</td>
</tr>
</tbody>
</table>
<table align="center" border="0" cellpadding="2"
cellspacing="0" width="70%">
<tbody>
<tr class="plugin_sev_high">
<td class="plugin_label" align="left">PHP 5 <
5.2.7 Multiple Vulnerabilities</td>
</tr>
<tr class="info_bg">
<td class="info_text" colspan="2">
<div class="plugin_output"><br>
<b>Synopsis:</b><br>
The remote web server uses a version of PHP
that is affected by multiple flaws.<br>
<br>
<b>Description:</b><br>
According to its banner, the version of PHP
installed on the remote host is older than
5.2.7. Such versions may be affected by
several security issues : - File truncation
can occur when calling 'dba_replace()' with an
invalid argument. - There is a buffer overflow
in the bundled PCRE library fixed by 7.8.
(CVE-2008-2371) - A buffer overflow in the
'imageloadfont()' function in 'ext/gd/gd.c'
can be triggered when a specially crafted font
is given. (CVE-2008-3658) - There is a buffer
overflow in PHP's internal function
'memnstr()', which is exposed to userspace as
'explode()'. (CVE-2008-3659) - When used as a
FastCGI module, PHP segfaults when opening a
file whose name contains two dots (eg,
'file..php'). (CVE-2008-3660) - Multiple
directory traversal vulnerabilities in
functions such as 'posix_access()', 'chdir()',
'ftok()' may allow a remote attacker to bypass
'safe_mode' restrictions. (CVE-2008-2665 and
CVE-2008-2666). - A buffer overflow may be
triggered when processing long message headers
in 'php_imap.c' due to use of an obsolete API
call. (CVE-2008-2829) - A heap-based buffer
overflow may be triggered via a call to
'mb_check_encoding()', part of the 'mbstring'
extension. (CVE-2008-5557) - Missing
initialization of 'BG(page_uid)' and
'BG(page_gid)' when PHP is used as an Apache
module may allow for bypassing security
restriction due to SAPI 'php_getuid()'
overloading. (CVE-2008-5624) - Incorrect
'php_value' order for Apache configuration may
allow bypassing PHP's 'safe_mode' setting.
(CVE-2008-5625) - The ZipArchive:extractTo()
method in the ZipArchive extension fails to
filter directory traversal sequences from file
names. (CVE-2008-5658)<br>
<br>
<b>Risk factor:</b><br>
High<br>
<br>
<b>CVSS Base Score:</b>7.5<br>
CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P<br>
<br>
<b>See also:</b><br>
<a
href="http://securityreason.com/achievement_securityalert/57"
moz-do-not-send="true">http://securityreason.com/achievement_securityalert/57</a><br>
<br>
<b>See also:</b><br>
<a moz-do-not-send="true"
class="moz-txt-link-freetext"
href="http://securityreason.com/achievement_securityalert/58">http://securityreason.com/achievement_securityalert/58</a><br>
<br>
<b>See also:</b><br>
<a moz-do-not-send="true"
class="moz-txt-link-freetext"
href="http://securityreason.com/achievement_securityalert/59">http://securityreason.com/achievement_securityalert/59</a><br>
<br>
<b>See also:</b><br>
<a moz-do-not-send="true"
class="moz-txt-link-freetext"
href="http://www.sektioneins.de/advisories/SE-2008-06.txt">http://www.sektioneins.de/advisories/SE-2008-06.txt</a><br>
<br>
<b>See also:</b><br>
<a moz-do-not-send="true"
class="moz-txt-link-freetext"
href="http://archives.neohapsis.com/archives/fulldisclosure/2008-06/0238.html">http://archives.neohapsis.com/archives/fulldisclosure/2008-06/0238.html</a><br>
<br>
<b>See also:</b><br>
<a moz-do-not-send="true"
class="moz-txt-link-freetext"
href="http://archives.neohapsis.com/archives/fulldisclosure/2008-06/0239.html">http://archives.neohapsis.com/archives/fulldisclosure/2008-06/0239.html</a><br>
<br>
<b>See also:</b><br>
<a moz-do-not-send="true"
class="moz-txt-link-freetext"
href="http://www.openwall.com/lists/oss-security/2008/08/08/2">http://www.openwall.com/lists/oss-security/2008/08/08/2</a><br>
<br>
<b>See also:</b><br>
<a moz-do-not-send="true"
class="moz-txt-link-freetext"
href="http://www.openwall.com/lists/oss-security/2008/08/13/8">http://www.openwall.com/lists/oss-security/2008/08/13/8</a><br>
<br>
<b>See also:</b><br>
<a moz-do-not-send="true"
class="moz-txt-link-freetext"
href="http://archives.neohapsis.com/archives/fulldisclosure/2008-11/0433.html">http://archives.neohapsis.com/archives/fulldisclosure/2008-11/0433.html</a><br>
<br>
<b>See also:</b><br>
<a moz-do-not-send="true"
class="moz-txt-link-freetext"
href="http://archives.neohapsis.com/archives/fulldisclosure/2008-12/0089.html">http://archives.neohapsis.com/archives/fulldisclosure/2008-12/0089.html</a><br>
<br>
<b>See also:</b><br>
<a moz-do-not-send="true"
class="moz-txt-link-freetext"
href="http://bugs.php.net/bug.php?id=42862">http://bugs.php.net/bug.php?id=42862</a><br>
<br>
<b>See also:</b><br>
<a moz-do-not-send="true"
class="moz-txt-link-freetext"
href="http://bugs.php.net/bug.php?id=45151">http://bugs.php.net/bug.php?id=45151</a><br>
<br>
<b>See also:</b><br>
<a moz-do-not-send="true"
class="moz-txt-link-freetext"
href="http://bugs.php.net/bug.php?id=45722">http://bugs.php.net/bug.php?id=45722</a><br>
<br>
<b>See also:</b><br>
<a moz-do-not-send="true"
class="moz-txt-link-freetext"
href="http://www.php.net/releases/5_2_7.php">http://www.php.net/releases/5_2_7.php</a><br>
<br>
<b>See also:</b><br>
<a moz-do-not-send="true"
class="moz-txt-link-freetext"
href="http://www.php.net/ChageLog-5.php#5.2.7">http://www.php.net/ChageLog-5.php#5.2.7</a><br>
<br>
<b>Solution:</b><br>
Upgrade to PHP version 5.2.8 or later. Note
that 5.2.7 was been removed from distribution
because of a regression in that version that
results in the 'magic_quotes_gpc' setting
remaining off even if it was set to on.<br>
<br>
<b>Plugin output:</b><br>
PHP version 5.1.6 appears to be running on the
remote host based on the following
X-Powered-By response header : X-Powered-By:
PHP/5.1.6 <br>
<br>
<b>Plugin ID:</b><br>
<a
href="http://www.nessus.org/plugins/index.php?view=single&id=35043"
moz-do-not-send="true">35043</a><br>
<br>
<b>CVE: </b><br>
CVE-2008-2371, CVE-2008-2665, CVE-2008-2666,
CVE-2008-2829, CVE-2008-3658, CVE-2008-3659,
CVE-2008-3660, CVE-2008-5557, CVE-2008-5624,
CVE-2008-5625, CVE-2008-5658<br>
<br>
<b>BID: </b><br>
<a
href="http://www.securityfocus.com/bid/29796"
moz-do-not-send="true">29796</a>, <a
href="http://www.securityfocus.com/bid/29797"
moz-do-not-send="true">29797</a>, <a
href="http://www.securityfocus.com/bid/29829"
moz-do-not-send="true">29829</a>, <a
href="http://www.securityfocus.com/bid/30087"
moz-do-not-send="true">30087</a>, <a
href="http://www.securityfocus.com/bid/30649"
moz-do-not-send="true">30649</a>, <a
href="http://www.securityfocus.com/bid/31612"
moz-do-not-send="true">31612</a>, <a
href="http://www.securityfocus.com/bid/32383"
moz-do-not-send="true">32383</a>, <a
href="http://www.securityfocus.com/bid/32625"
moz-do-not-send="true">32625</a>, <a
href="http://www.securityfocus.com/bid/32688"
moz-do-not-send="true">32688</a>, <a
href="http://www.securityfocus.com/bid/32948"
moz-do-not-send="true">32948</a><br>
<br>
<b>Other references: </b><br>
OSVDB:46584, OSVDB:46638, OSVDB:46639,
OSVDB:46641, OSVDB:46690, OSVDB:47796,
OSVDB:47797, OSVDB:47798, OSVDB:50480,
OSVDB:51477, OSVDB:52205, OSVDB:52206,
OSVDB:52207</div>
</td>
</tr>
</tbody>
</table>
<table align="center" border="0" cellpadding="2"
cellspacing="0" width="70%">
<tbody>
<tr class="plugin_sev_high">
<td class="plugin_label" align="left">PHP <
5.2.6 Multiple Vulnerabilities</td>
</tr>
<tr class="info_bg">
<td class="info_text" colspan="2">
<div class="plugin_output"><br>
<b>Synopsis:</b><br>
The remote web server uses a version of PHP
that is affected by multiple flaws.<br>
<br>
<b>Description:</b><br>
According to its banner, the version of PHP
installed on the remote host is older than
5.2.6. Such versions may be affected by the
following issues : - A stack buffer overflow
in FastCGI SAPI. - An integer overflow in
printf(). - An security issue arising from
improper calculation of the length of
PATH_TRANSLATED in cgi_main.c. - A safe_mode
bypass in cURL. - Incomplete handling of
multibyte chars inside escapeshellcmd(). -
Issues in the bundled PCRE fixed by version
7.6.<br>
<br>
<b>Risk factor:</b><br>
High<br>
<br>
<b>CVSS Base Score:</b>7.5<br>
CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P<br>
<br>
<b>See also:</b><br>
<a
href="http://archives.neohapsis.com/archives/bugtraq/2008-03/0321.html"
moz-do-not-send="true">http://archives.neohapsis.com/archives/bugtraq/2008-03/0321.html</a><br>
<br>
<b>See also:</b><br>
<a moz-do-not-send="true"
class="moz-txt-link-freetext"
href="http://archives.neohapsis.com/archives/fulldisclosure/2008-05/0103.html">http://archives.neohapsis.com/archives/fulldisclosure/2008-05/0103.html</a><br>
<br>
<b>See also:</b><br>
<a moz-do-not-send="true"
class="moz-txt-link-freetext"
href="http://archives.neohapsis.com/archives/fulldisclosure/2008-05/0107.html">http://archives.neohapsis.com/archives/fulldisclosure/2008-05/0107.html</a><br>
<br>
<b>See also:</b><br>
<a moz-do-not-send="true"
class="moz-txt-link-freetext"
href="http://www.php.net/releases/5_2_6.php">http://www.php.net/releases/5_2_6.php</a><br>
<br>
<b>Solution:</b><br>
Upgrade to PHP version 5.2.6 or later.<br>
<br>
<b>Plugin output:</b><br>
PHP version 5.1.6 appears to be running on the
remote host based on the following
X-Powered-By response header : X-Powered-By:
PHP/5.1.6 <br>
<br>
<b>Plugin ID:</b><br>
<a
href="http://www.nessus.org/plugins/index.php?view=single&id=32123"
moz-do-not-send="true">32123</a><br>
<br>
<b>CVE: </b><br>
CVE-2007-4850, CVE-2008-0599, CVE-2008-1384,
CVE-2008-2050, CVE-2008-2051<br>
<br>
<b>BID: </b><br>
<a
href="http://www.securityfocus.com/bid/27413"
moz-do-not-send="true">27413</a>, <a
href="http://www.securityfocus.com/bid/28392"
moz-do-not-send="true">28392</a>, <a
href="http://www.securityfocus.com/bid/29009"
moz-do-not-send="true">29009</a><br>
<br>
<b>Other references: </b><br>
OSVDB:43219, OSVDB:44057, OSVDB:44906,
OSVDB:44907, OSVDB:44908, Secunia:30048</div>
</td>
</tr>
</tbody>
</table>
</span></div>
<div><span class="823452818-18082010"></span> </div>
<!-- Converted from text/plain format -->
<p><font size="2">BRIAN M. DUNCAN<br>
Data Security Administrator<br>
Katten Muchin Rosenman LLP<br>
525 W. Monroe Street / Chicago, IL 60661-3693<br>
p / (312) 577-8045 f / (312) 577-4490<br>
<a href="mailto:brian.duncan@kattenlaw.com"
moz-do-not-send="true">brian.duncan@kattenlaw.com</a>
/ <a href="http://www.kattenlaw.com"
moz-do-not-send="true">www.kattenlaw.com</a><br>
</font></p>
<div class="moz-signature">
<center> </center>
</div>
<table>
<tbody>
<tr>
<td bgcolor="#ffffff"><font color="#000000">
<pre>===========================================================
CIRCULAR 230 DISCLOSURE: Pursuant to Regulations Governing Practice Before the Internal Revenue
Service, any tax advice contained herein is not intended or written to be used and cannot be used
by a taxpayer for the purpose of avoiding tax penalties that may be imposed on the taxpayer.
===========================================================
CONFIDENTIALITY NOTICE:
This electronic mail message and any attached files contain information intended for the exclusive
use of the individual or entity to whom it is addressed and may contain information that is
proprietary, privileged, confidential and/or exempt from disclosure under applicable law. If you
are not the intended recipient, you are hereby notified that any viewing, copying, disclosure or
distribution of this information may be subject to legal restriction or sanction. Please notify
the sender, by electronic mail or telephone, of any unintended recipients and delete the original
message without making any copies.
===========================================================
NOTIFICATION: Katten Muchin Rosenman LLP is an Illinois limited liability partnership that has
elected to be governed by the Illinois Uniform Partnership Act (1997).
===========================================================</pre>
</font></td>
</tr>
</tbody>
</table>
</div>
<div><span>_______________________________________________</span><br>
<span>ZendTo mailing list</span><br>
<span><a href="mailto:ZendTo@zend.to" moz-do-not-send="true">ZendTo@zend.to</a></span><br>
<span><a
href="http://mailman.ecs.soton.ac.uk/mailman/listinfo/zendto"
moz-do-not-send="true">http://mailman.ecs.soton.ac.uk/mailman/listinfo/zendto</a></span></div>
</blockquote>
<pre wrap=""><fieldset class="mimeAttachmentHeader"></fieldset>
_______________________________________________
ZendTo mailing list
<a moz-do-not-send="true" class="moz-txt-link-abbreviated" href="mailto:ZendTo@zend.to">ZendTo@zend.to</a>
<a moz-do-not-send="true" class="moz-txt-link-freetext" href="http://mailman.ecs.soton.ac.uk/mailman/listinfo/zendto">http://mailman.ecs.soton.ac.uk/mailman/listinfo/zendto</a></pre>
</blockquote>
<br>
<pre class="moz-signature" cols="72">Jules
--
Julian Field MEng CITP CEng
<a moz-do-not-send="true" class="moz-txt-link-abbreviated" href="http://www.Zend.To">www.Zend.To</a>
Need help fixing or optimising your systems?
Contact me!
Need help getting you started solving new requirements from your boss?
Contact me!
PGP footprint: EE81 D763 3DB0 0BFD E1DC 7222 11F6 5947 1415 B654
Follow me at twitter.com/JulesFM
</pre>
<pre wrap="">
<fieldset class="mimeAttachmentHeader"></fieldset>
_______________________________________________
ZendTo mailing list
<a class="moz-txt-link-abbreviated" href="mailto:ZendTo@zend.to">ZendTo@zend.to</a>
<a class="moz-txt-link-freetext" href="http://mailman.ecs.soton.ac.uk/mailman/listinfo/zendto">http://mailman.ecs.soton.ac.uk/mailman/listinfo/zendto</a></pre>
</blockquote>
<br>
<pre class="moz-signature" cols="72">Jules
--
Julian Field MEng CITP CEng
<a class="moz-txt-link-abbreviated" href="http://www.Zend.To">www.Zend.To</a>
Need help fixing or optimising your systems?
Contact me!
Need help getting you started solving new requirements from your boss?
Contact me!
PGP footprint: EE81 D763 3DB0 0BFD E1DC 7222 11F6 5947 1415 B654
Follow me at twitter.com/JulesFM
</pre>
</body>
</html>