|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Gentoo Local Security Checks >> [GLSA-200402-01] PHP setting leaks from .htaccess files on virtual hosts Vulnerability Assessment Details
|
[GLSA-200402-01] PHP setting leaks from .htaccess files on virtual hosts |
||
PHP setting leaks from .htaccess files on virtual hosts Detailed Explanation for this Vulnerability Assessment The remote host is affected by the vulnerability described in GLSA-200402-01 (PHP setting leaks from .htaccess files on virtual hosts) If the server configuration "php.ini" file has "register_globals = on" and a request is made to one virtual host (which has "php_admin_flag register_globals off") and the next request is sent to the another virtual host (which does not have the setting) through the same apache child, the setting will persist. Impact Depending on the server and site, a possible hacker may be able to exploit global variables to gain access to reserved areas, such as MySQL passwords, or this vulnerability may simply cause a lack of functionality. As a result, users are urged to upgrade their PHP installations. Gentoo ships PHP with "register_globals" set to "off" by default. This issue affects both servers running Apache 1.x and servers running Apache 2.x. Workaround No immediate workaround is available a software upgrade is required. References: http://bugs.php.net/bug.php?id=25753 Solution: All users are recommended to upgrade their PHP installation to 4.3.4-r4: # emerge sync # emerge -pv ">=dev-php/mod_php-4.3.4-r4" # emerge ">=dev-php/mod_php-4.3.4-r4" Network Security Threat Level: Medium Networks Security ID: Vulnerability Assessment Copyright: (C) 2005 Michel Arboi |
||
Cables, Connectors |
SFP-10G-LR Compatible 10GBase-LR SFP+ LR Transceiver 10G 1310nm SMF up ot 10km
$45.00
Cisco SG110 24 Port Gigabit Ethernet Switch w/ 2 x SFP SG110-24
$117.00
Allen-Bradley 1783-SFP1GSX Compatible 1000BASE-SX SFP 850nm 550m Transceiver-895
$65.50
SFP+ 10G-T Copper SFP-10G-T GLC-10G-T 10G Base-T RJ45,10GBASE-T SFP+ -9876
$105.00
Genuine Cisco SFP-10G-SR V03 10GBASE-SR SFP+ Transceiver Module 10-2415-03
$8.00
NEW Sealed Cisco SFP-10G-LR 10GBASE-LR SFP+ 1310nm 10km *US Shipping*
$18.00
Cisco SFP-10G-LR-S SFP+ 1310nm 10km DOM Transceiver Module 10-3107-01 - 1 Year
$41.59
CISCO SFP-GE-T Copper Transceiver Module GENUINE
$8.05
LOT OF 20 Genuine Cisco SFP-10G-SR V03 10GBASE-SR SFP+ Transceiver Module
$89.00
Cisco Meraki MA-SFP-10GB-SR 10G SFP+ SR 850nm 300m LC MMF
$29.99
|
||
No Discussions have been posted on this vulnerability. |