Page 1 of 1

PHP 5.3.10 with critical security fix

Posted: Fri Feb 03, 2012 6:50 am
by breun
Security Fixes in PHP 5.3.10:

* Fixed arbitrary remote code execution vulnerability reported by Stefan Esser, CVE-2012-0830.

http://www.php.net/archive/2012.php#id2012-02-02-1

Re: PHP 5.3.10 with critical security fix

Posted: Fri Feb 03, 2012 10:00 am
by mikeshinn
ASL protects against this vulnerability. The vulnerability in PHP 5.3.9 is actually in the PHP code that was added to prevent the hash collision attacks (which ASL also protects from). You can ironicly only succeed with the new attack if you send a payload with more than 1000 variables (or whatever you set your max to with PHP). 5.39 added a new limit to prevent the has DOS attack, the default is that if you exceed the limit of 1000 variables (in PHP) that PHP requests is denied. The bug is that the new PHP code has a flaw, which basically lets the 1000+ variables fill up buffers and do nasty things, instead of block them.

ASL independently won't allow above 1000 variables, so the exploit payload is rejected and will never reach the webserver. Additionally, the kernel protects against various types of code injection attacks, which adds another layer.

So, if you are using ASL, you are protected from this exploit so this is not critical for you. If you are using our real time rules or ASL without the ASL kernel, you are protected from remote exploits of this, but thats your only layer (you do not have kernel protection).

If you are not running either, and you are running 5.3.9 then you do have a vulnerability. Even if you arent using 5.3.9 you may need to upgrade if your vendor backported the new code to an older version of PHP.

Re: PHP 5.3.10 with critical security fix

Posted: Fri Feb 03, 2012 2:01 pm
by breun
RHEL/CentOS has already released PHP updates with fixes for this issue. I see 5.3.10 is also already in the atomic channel. People, start your upgrading engines!

Re: PHP 5.3.10 with critical security fix

Posted: Fri Feb 03, 2012 7:47 pm
by mikeshinn
People, start your upgrading engines!
Unless you are running ASL, in which case, no rush. :-)