During the forum shut down today

Started by Rik, Jan 07, 2011, 10:30:12

Previous topic - Next topic

0 Members and 1 Guest are viewing this topic.

Rik

We'll be around to try and help with connection issues in the Broadband, Networking, PC Security, Internet & ISPs board on PC Pals.

http://www.pc-pals.com/smf/index.php
Rik
--------------------

This post reflects my own views, opinions and experience, not those of IDNet.

Simon

We must try think of a more succinct name for that board!  ;D
Simon.
--
This post reflects my own views, opinions and experience, not those of IDNet.

DorsetBoy

#2
STOP RIGHT THERE !!  

Something to get sorted BEFORE any update is made :

QuoteAn extremely serious security flaw has been discovered in PHP, requiring that all affected servers be updated as a matter of urgency.

The flaw allows a remote webserver running an affected version of PHP to be crashed using nothing more than a URL request.

If you are running a 64 bit version of PHP you are unaffected, but if you are running in 32 bit mode, or you are not sure, now would be a good time to drop everything and make sure that your server is not vulnerable, by installing the latest version of PHP either from php.net, or from your own webserver vendor. Zend Server has a hotfix available already.

Due to the massive impact of the flaw and the trivial way in which it can be exploited, news of this bug will spread rapidly so speed is of the essence in getting your server patched.


http://www.php.net/distributions/test_bug53632.txt   PHP script to test vulnerability



http://bugs.php.net/bug.php?id=53632    Bug report detailing the flaw

Simon

Simon.
--
This post reflects my own views, opinions and experience, not those of IDNet.

Rik

The server we run on is 64-bit and, therefore, unaffected.
Rik
--------------------

This post reflects my own views, opinions and experience, not those of IDNet.

DorsetBoy

Quote from: Rik on Jan 07, 2011, 12:54:18
The server we run on is 64-bit and, therefore, unaffected.

you are still be vulnerable if you are running x64 but have an x86 version of PHP  .

It works too, I have tried it out.

Rik

I'm told we're running 64-bit PHP, Dorset.
Rik
--------------------

This post reflects my own views, opinions and experience, not those of IDNet.

Steve

Steve
------------
This post reflects my own views, opinions and experience, not those of IDNet.

Glenn

Glenn
--------------------

This post reflects my own views, opinions and experience, not those of IDNet.

Steve

Steve
------------
This post reflects my own views, opinions and experience, not those of IDNet.

Rik

Rik
--------------------

This post reflects my own views, opinions and experience, not those of IDNet.

Simon

Simon.
--
This post reflects my own views, opinions and experience, not those of IDNet.

Rik

Rik
--------------------

This post reflects my own views, opinions and experience, not those of IDNet.

DorsetBoy

Quote from: Rik on Jan 07, 2011, 13:04:54
I'm told we're running 64-bit PHP, Dorset.

That is what needed checking, the exploit is ridiculously simple, just add 33 characters to a post and the results ,well.........  :red:

Rik

I think we've had quite enough excitement for one week. :)
Rik
--------------------

This post reflects my own views, opinions and experience, not those of IDNet.

esh

PHP is a bit of an embarrassment at times really. Shame there's nothing quite so convenient/flexible out there for quick web apps.
CompuServe 28.8k/33.6k 1994-1998, BT 56k 1998-2001, NTL Cable 512k 2001-2004, 2x F2S 1M 2004-2008, IDNet 8M 2008 - LLU 11M 2011

Gary

Quote from: Simon on Jan 07, 2011, 13:13:55
Gary is  nearer.  :)
I don't want to go there, even if it is close
Damned, if you do damned if you don't