has the new 4.2.2 source tarballs, Windows binaries and source patches
from 4.2.0 and 4.2.1 available for download.
Workaround
If the PHP applications on an affected web server do not rely on HTTP
POST input from user agents, it is often possible to deny POST requests
on the web server.
In the Apache web server, for example, this is possible with the
following code included in the main configuration file or a top-level
.htaccess file:
<Limit POST>
Order deny,allow
Deny from all
</Limit>
Note that an existing configuration and/or .htaccess file may have
parameters contradicting the example given above.
Credits
The PHP Group would like to thank Stefan Esser of e-matters GmbH for
discovering this vulnerability.
Copyright (c) 2002 The PHP Group.
en gros la faille concerne le décodage par PHP des requetes POST multipart et n'est pas exploitable sur du IA32 (x86)
--------------- Don't blink. Don't even blink. Blink and you're dead. They are fast, faster than you could believe, don't turn your back, don't look away, and DON'T BLINK. Good luck.
Marsh Posté le 22-07-2002 à 15:49:45
Kaboom, une nouvelle faille de secu dans PHP a partir de la version 4.2.0 .
Allez zou, on upgrade vers la 4.2.2 vite fait (ou on reste a la 4.1.2-audit qui n'a pas cette faille) .