Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 28 Feb 2002 13:47:34 +0100
From:      Dirk Froemberg <dirk@FreeBSD.org>
To:        Konrad Heuer <kheuer@gwdg.de>
Cc:        freebsd-ports@FreeBSD.org
Subject:   Re: PHP remote vulnerabilities
Message-ID:  <20020228134734.C50105@physik.TU-Berlin.DE>
In-Reply-To: <20020228130151.Y12301-100000@gwdu60.gwdg.de>; from kheuer@gwdg.de on Thu, Feb 28, 2002 at 01:09:19PM %2B0100
References:  <20020228130151.Y12301-100000@gwdu60.gwdg.de>

next in thread | previous in thread | raw e-mail | index | archive | help
Hi Konrad!

Both mod_php3 and mod_php4 have been fixed yesterday.

	Regards Dirk

On Thu, Feb 28, 2002 at 01:09:19PM +0100, Konrad Heuer wrote:
> 
> Probably you already will have recognized that serious remote
> vulnerabilities have been announced in different php versions yesterday:
> 
> http://security.e-matters.de/advisories/012002.html
> 
> Since I (still) use php3 I fetched the corresponding patch from
> http://www.php.net/downloads.php which applied to the code below
> /usr/ports/www/mod_php3 after make extract. I rebuilt and reinstalled the
> module.
> 
> Maybe you want to modify your FreeBSD port to include the patch
> automatically?
> 
> I didn't try to see what happens in the php4 directory.

-- 
Dirk Froemberg

FreeBSD: The Power to Serve!		http://www.FreeBSD.org/

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-ports" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20020228134734.C50105>