In association with heise online

07 March 2007, 11:19

The Month of PHP Bugs: intermediate results

  • Twitter
  • Facebook
  • submit to slashdot
  • StumbleUpon
  • submit to reddit

Thirteen holes in seven days: this is the current status of the Month of PHP Bugs (MOPB). So far, however, MOPB has more of a documentary flavour, since the initiators mostly publish information on bugs that have already been fixed. While in contrast to the other Month-of-X projects, MOPB does not come up with surprising news, users have the advantage of having to deal with only a few bugs for which no patches have yet been released; concerns that the MOPB would damage rather than serve the project, seem to be needless.

Since our last news on the MOPB, the project has disclosed a security advisory on holes in the PHP-4 extension Ovrimos, which allow code execution on a system, and also an advisory on a bug in the Apache module mod_security, which allows hackers to fool the filter. Since mod_security is not part of PHP, but only used together with PHP, the initiators have marked this advisory as a "BONUS". Another advisory informs on bugs during the deserialisation of session information in WDDX and php_binary, which may be exploited to spy out information.

However, another bug in the current PHP version 4.4.6 has not been published by the MOPB: a buffer overflow in the functions mssql_connect and mssql_pconnect may be exploited to manipulate the stack. An exploit has already been published; according to reports, this bug may cause the web server to crash.

See also:


Print Version | Send by email | Permalink:

  • July's Community Calendar

The H Open

The H Security

The H Developer

The H Internet Toolkit