Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 15 Oct 2006 14:08:03 -0500
From:      Paul Schmehl <pauls@utdallas.edu>
To:        freebsd-questions@freebsd.org
Subject:   Re: PHP new vulnarabilities
Message-ID:  <E00137373E5BAB432E949CD3@paul-schmehls-powerbook59.local>
In-Reply-To: <20061015145034.0f039b05.wmoran@collaborativefusion.com>
References:  <45322A1D.8070204@hadara.ps> <20061015151215.15a4062e@loki.starkstrom.lan> <200610151239.12127.freebsd@dfwlp.com>	<453274C3.7090409@bsdunix.ch> <0F7C0CB4C34ECD44CCF3CDD0@paul-schmehls-powerbook59.local> <20061015145034.0f039b05.wmoran@collaborativefusion.com>

next in thread | previous in thread | raw e-mail | index | archive | help

--On October 15, 2006 2:50:34 PM -0400 Bill Moran 
<wmoran@collaborativefusion.com> wrote:
>
> Have you looked at the vulnerability?  There are only certian coding
> instances that would actually open this up to any attack vector.  Since
> the bug is in unserialize, it's pretty easy audit a program to ensure
> that it isn't vulnerable.
>
> "absolute fool" seems a little extreme.

Perhaps.  How many people are talented enough to understand the 
vulnerability and how it's exploited and know *for certain* that they 
won't have a problem?

It would be different if we were talking about an app that isn't exploited 
much.  Php is exploited every day, even when it's fully patched, due to 
the complexity of the attacks and the lack of understanding of most people 
who code in php.

Paul Schmehl (pauls@utdallas.edu)
Adjunct Information Security Officer
The University of Texas at Dallas
http://www.utdallas.edu/ir/security/


Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?E00137373E5BAB432E949CD3>