• Announcements

    • Budfred

      IE 11 copy/paste problem

      It has come to our attention that people using Internet Explorer 11 (IE 11) are having trouble with copy/paste to the forum. If you encounter this problem, using a different browser like Firefox or Chrome seems to get around the problem. We do not know what the problem is, but it seems to be specific to IE 11 and we are hopeful that Microsoft will eventually fix it.
    • Budfred

      PLEASE READ - Reversing upgrade   02/23/2017

      We have found that this new upgrade is somewhat of a disaster.  We are finding lots of glitches in being able to post and administer the forum.  Additionally, there are new costs associated with the upgrade that we simply cannot afford.  As a result, we have decided to reverse course and go back to the previous version of our software.  Since this will involve restoring it from a backup, we will lose posts that have been added since January 30 or possibly even some before that.    If you started a topic during that time, we urge you to make backups of your posts and you will need to start the topics over again after the change.  You can simply paste the copies of your posts that you created at that point.    If you joined the forum this month, you will need to re-register since your membership will be lost along with the posts.  Since you have a concealed password, we cannot simply restore your membership for you.   We are going to backup as much as we can so that it will reduce inconvenience for our members.  Unfortunately we cannot back everything up since much will be incompatible with the old version of our software.  We apologize for the confusion and regret the need to do this even though it is not viable to continue with this version of the software.   We plan to begin the process tomorrow evening and, if it goes smoothly, we shouldn't be offline for very long.  However, since we have not done this before, we are not sure how smoothly it will go.  We ask your patience as we proceed.
Sign in to follow this  
Followers 0

PHP 5.2.3 released

2 posts in this topic



- http://isc.sans.org/diary.html?storyid=2900

Last Updated: 2007-06-01 08:20:25 UTC ~ "PHP released PHP version 5.2.3.

From the release notes following security improvements have been made:

* Fixed an integer overflow inside chunk_split() (CVE-2007-2872)

* Fixed possible infinite loop in imagecreatefrompng. (CVE-2007-2756)

* Fixed ext/filter Email Validation Vulnerability (CVE-2007-1900)

* Fixed bug #41492 (open_basedir/safe_mode bypass inside realpath ())

* Improved fix for CVE-2007-1887 to work with non-bundled sqlite2 lib.

* Added mysql_set_charset() to allow runtime altering of connection encoding.

Take care with the fixes not listed as security related as there seem to be at least a few of them that are interesting from either a security application point of view, or just from an availability point of view. E.g.:

* Fixed bug #41353 (crash in openssl_pkcs12_read() on invalid input)

* Fixed bug #41347 (checkdnsrr() segfaults on empty hostname)

If you are on the 5.2 branch best to upgrade ASAP to 5.2.3 .

* Release announcement: http://www.php.net/releases/5_2_3.php

* Changelog: http://www.php.net/ChangeLog-5.php#5.2.3

* Download: http://www.php.net/downloads.php#v5

While recompiling and testing PHP, consider adding in Suhosin* from the hardened PHP project, it'll improve your security stance."

* http://www.hardened-php.net/suhosin.127.html


- http://secunia.com/advisories/25456/

Release Date: 2007-06-01

Critical: Moderately critical

Impact: Unknown, Security Bypass

Where: From remote

Solution Status: Vendor Patch

Software: PHP 5.2.x ...

Solution: Update to version 5.2.3... http://www.php.net/downloads.php#v5

Original Advisory: http://www.php.net/releases/5_2_3.php



Edited by apluswebmaster

Share this post

Link to post
Share on other sites

Secunia advisory updated:


- http://secunia.com/advisories/25456/

Last Update: 2007-06-04

Changelog: 2007-06-04: Added information provided by SEC Consult. Added link to "Original Advisory" section. Updated "Criticality".

Original Advisory: PHP:


SEC Consult: http://www.sec-consult.com/291.html ..."


> http://www.spywareinfoforum.com/index.php?ac...st&p=549349



Edited by apluswebmaster

Share this post

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
Sign in to follow this  
Followers 0