PHP 'zero-day' hole found

Powered by SC Magazine
 

Bugged patch fails to fix flaw.

A dangerous vulnerability has been discovered in PHP-CGI which grants attackers remote code execution and the ability to steal source code.

The hole was publicly disclosed reportedly in error to Reddit following a patch issued by PHP Group, but the fix was later discovered by researcher Steffan Esser to have failed.

Researchers from Dutch security firm De Eindbazen discovered the vulnerability during a capture-the-flag event at the Nullcon event last year.

 

 

A workaround fix on which the failed patches (PHP versions 5.3.12 and 5.4.2) were based was posted to De Eindbbazen's web site which included technical details on the flaw.

Researchers warned that users not follow “homebrew” fixes posted in online comments about the flaw.

The flaw affected classic CGI servers and was centred on a query string that issued a “-s” command argument pushed to PHP. It had existed since 2004, researchers said.

The research firm recommended users use a wrapper binary around the php-cgi binary until a permanent fix is released.

Copyright © SC Magazine, Australia


PHP 'zero-day' hole found
 
 
 
Top Stories
Photos: iTnews Benchmark Awards countdown begins
Just a few days left until entries close for 2014.
 
Australian Govt to rethink cyber security strategy
Six-year old policy to be refreshed.
 
The failure of the antivirus industry
[Blog post] Insights from AVAR 2014.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Who do you trust most to protect your private data?







   |   View results
Your bank
  38%
 
Your insurance company
  3%
 
A technology company (Google, Facebook et al)
  8%
 
Your telco, ISP or utility
  7%
 
A retailer (Coles, Woolworths et al)
  2%
 
A Federal Government agency (ATO, Centrelink etc)
  20%
 
An Australian law enforcement agency (AFP, ASIO et al)
  15%
 
A State Government agency (Health dept, etc)
  5%
TOTAL VOTES: 1071

Vote