FYI...
PHP v5.4.3/v5.3.13 released
-
http://www.php.net/a...#id2012-05-08-1
8-May-2012 - "... immediate availability of PHP 5.4.3 and PHP 5.3.13.
All users are encouraged to upgrade to PHP 5.4.3 or PHP 5.3.13. The releases complete a fix for a vulnerability in CGI-based setups (CVE-2012-2311). Note: mod_php and php-fpm are not vulnerable to this attack. PHP 5.4.3 fixes a buffer overflow vulnerability in the apache_request_headers() (CVE-2012-2329). The PHP 5.3 series is not vulnerable to this issue..."
Downloads
-
http://www.php.net/downloads.php
ChangeLog
-
http://www.php.net/ChangeLog-5.php
-
http://web.nvd.nist....d=CVE-2012-1823 -
7.5 (HIGH)
-
http://web.nvd.nist....d=CVE-2012-2311 -
7.5 (HIGH)
-
http://web.nvd.nist....d=CVE-2012-2335 -
7.5 (HIGH)
-
http://web.nvd.nist....d=CVE-2012-2336 - 5.0
05/11/2012 - "...
before 5.3.13 and 5.4.x
before 5.4.3..."
___
Critical open hole in PHP creates risks
-
http://atlas.arbor.net/briefs/
Severity:
High Severity
Published: Monday, May 07, 2012
A specific configuration and a PHP vulnerability opens the door for a remote attack on vulnerable installations. Public exploit code is available, increasing risks.
Analysis: Further details are provided at http://eindbazen.net...-cve-2012-1823/ and http://www.php.net/a...#id2012-05-06-1 and a more robust patch is to be released on Tuesday, May 8. The prior release did not fully resolve the problem. A Metasploit exploit was made available on May 4. Sites vulnerable to this threat need to take protective action, as the scanning activity for this is likely to be very high considering the popularity of PHP.
Source:
http://h-online.com/-1570916
9 May 2012
Attackers target unpatched PHP bug allowing malicious code execution
-
http://atlas.arbor.net/briefs/
Severity:
Elevated Severity
Published: Thursday, May 10, 2012
PHP bug, just patched on May 8, is
already being used by attackers.
Analysis: While the number of vulnerable sites may be small due to the unique configuration required, such sites could be totally compromised. System admins should also check http://blog.spiderla...by-example.html for further details on the attacks and see the patch release at http://www.php.net/a...#id2012-05-08-1 .
Source:
http://arstechnica.c...code-execution/
PHP-CGI exploitation by example
-
http://blog.spiderla...by-example.html
7 May 2012
PHP-CGI vuln exploited-in-the-Wild
-
http://blog.sucuri.n...n-the-wild.html
May 8, 2012
-
https://www.computer...I_vulnerability
May 9, 2012 - "... Dreamhost has also seen a large number of attacks trying to exploit this vulnerability, according to Trustwave researchers who exchanged information with Dreamhost's security team. In total, the Web hosting company recorded 234,076 exploit attempts against 151,275 unique domains..."
Edited by AplusWebMaster, 13 May 2012 - 08:30 AM.