Koozali.org: home of the SME Server

PHP vulnerability workaround - exact procedure please

Lars

PHP vulnerability workaround - exact procedure please
« on: March 02, 2002, 01:55:15 PM »
Hi!

I would be grateful if someone would provide me with the exact syntax for the workaround after I have logged in as root. I run an SME 5.1.2 with the MP3 blade installed, otherwise it´s not reconfigured.

Thank you in advance!

Regards
Lars

Rich Lafferty

Re: PHP vulnerability workaround - exact procedure please
« Reply #1 on: March 03, 2002, 02:43:38 AM »
Step-by-step instructions are available in the advisory at

http://www.e-smith.org/article.php3

The specific commands to modify php.ini are at the bottom of the advisory.

Cheers,

 -- Rich

Lars

Re: PHP vulnerability workaround - exact procedure please
« Reply #2 on: March 03, 2002, 05:31:39 AM »
Thank you! My mistake, I misunderstood some of the advisory.

Regards
Lars

Ronald Tanis

Re: PHP vulnerability workaround - exact procedure please
« Reply #3 on: March 05, 2002, 10:47:15 AM »
Hi,

How can I solve the problem when my server is already infected by the php security

It says Boot request form ...... via eth0 (non-rfc1048)

no applicable record for Bootp host .....


With regards,
Ronald TanisRich Lafferty wrote:
>
> Step-by-step instructions are available in the advisory at
>
> http://www.e-smith.org/article.php3
>
> The specific commands to modify php.ini are at the bottom of
> the advisory.
>
> Cheers,
>
>  -- Rich

Rich Lafferty

Re: PHP vulnerability workaround - exact procedure please
« Reply #4 on: March 05, 2002, 06:37:23 PM »
Ronald,

I'm afraid I'm not sure what you mean -- the vulnerability, if exploited,
would give someone access to your running server as the "www" user.
It wouldn't give them access as the "root" user, and it has nothing to do
with bootp at all.

(We're talking about the potential for a human to break into your machine;
this isn't like a virus. Even then, there's no known exploit in the wild, so the
probability of a successful attack is very low, and is 0 after following the
instructions in the advisory.)

It sounds as though a machine on your network is issuing bootp requests.
But since SME Server doesn't include a bootp daemon, I don't know what
might be answering bootp requests, unless you've installed a bootp daemon
yourself.

What does this command give you:

ps ww $( fuser 67/tcp | cut -b22-27 )

--Rich

Les Mikesell

Re: PHP vulnerability workaround - exact procedure please
« Reply #5 on: March 06, 2002, 09:42:55 AM »
The ISC dhcpd that SME uses will answer bootp requests, but only if a specific config entry is made for the requesting ethernet address.  The log entry is normal for a request with no matching entry.  Filling in the ethernet address in the 'hostnames and addresses' form should make a suitable entry in the dhcp config as well as dns if you want to provide the device with an IP address.