Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAEZPtU7mj+gD_sb_4UKKqt2qdk9_pKZ8DhPcdoV-AxOHjvuQ8A@mail.gmail.com>
Date: Sun, 25 Sep 2011 19:22:19 +0200
From: Pierre Joye <pierre.php@...il.com>
To: Rasmus Lerdorf <rasmus@....net>
Cc: Zeev Suraski <zeev@...d.com>, Vincent Danen <vdanen@...hat.com>, 
	"oss-security@...ts.openwall.com" <oss-security@...ts.openwall.com>, "security@....net" <security@....net>, 
	Stas Malyshev <smalyshev@...arcrm.com>
Subject: Re: CVE request: is_a() function may allow arbitrary code execution
 in PHP 5.3.7/5.3.8

On Sun, Sep 25, 2011 at 6:38 PM, Rasmus Lerdorf <rasmus@....net> wrote:
> So
> are we talking about the tiny number of people who have explicitly
> enabled allow_url_include and are running the code with this bad autoloader?

Yes, and that's why it is a very very minor problem. However it was
not happening before the code change. The few cases where the class
names&co have been sanitize before and the developer did not think
about cases like the one describe in the blog post. I think it is even
more rare combination, but it was not happening before our change.


-- 
Pierre

@pierrejoye | http://blog.thepimp.net | http://www.libgd.org

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.