全球主机交流论坛

 找回密码
 注册

QQ登录

只需一步,快速开始

CeraNetworks网络延迟测速工具IP归属甄别会员请立即修改密码
查看: 2943|回复: 10

php5漏洞更新 代码注入

[复制链接]
发表于 2012-2-7 15:18:08 | 显示全部楼层 |阅读模式
Debian最新安全更新 php5 代码注入

配置变量有缺陷 允许远程攻击者可以崩溃PHP或潜在的执行代码.
建议更新
Package        : php5
Vulnerability  : code injection
Problem type   : remote
Debian-specific: no
CVE ID         : CVE-2012-0830

Stefan Esser discovered that the implementation of the max_input_vars
configuration variable in a recent PHP security update was flawed such
that it allows remote attackers to crash PHP or potentially execute
code.

This update adds packages for the oldstable distribution, which were
missing from the original advisory. The problem has been fixed in
version 5.2.6.dfsg.1-1+lenny16, installed into the security archive
on 3 Feb 2012.

For the stable distribution (squeeze), this problem has been fixed in
version 5.3.3-7+squeeze7.

For the unstable distribution (sid), this problem has been fixed in
version 5.3.10-1.

We recommend that you upgrade your php5 packages.
发表于 2012-2-7 15:20:04 来自手机 | 显示全部楼层
你妹~PHP连续爆了好几天
发表于 2012-2-7 15:22:29 | 显示全部楼层
你妹  大胡子连续几天爆php漏洞
 楼主| 发表于 2012-2-7 15:24:07 | 显示全部楼层
Kvm 发表于 2012-2-7 15:22
你妹  大胡子连续几天爆php漏洞

发表于 2012-2-7 15:26:08 | 显示全部楼层
你妹  大胡子连续爆几天
 楼主| 发表于 2012-2-7 15:27:29 | 显示全部楼层
minkdog.com 发表于 2012-2-7 15:26
你妹  大胡子连续爆几天

发表于 2012-2-7 15:34:58 | 显示全部楼层
还是用asp+access好 稳定! 省资源 哈!
 楼主| 发表于 2012-2-7 15:38:05 | 显示全部楼层
tnrain 发表于 2012-2-7 15:34
还是用asp+access好 稳定! 省资源 哈!

asp不会玩 windows 系统本身虽然比较耗资源 但是各项兼容做的要好
发表于 2012-2-7 16:03:16 | 显示全部楼层
去看看。。。
发表于 2012-2-7 16:10:12 | 显示全部楼层
好多洞洞哦,蛋疼。。。不过5.2的没问题吧?
您需要登录后才可以回帖 登录 | 注册

本版积分规则

Archiver|手机版|小黑屋|全球主机交流论坛

GMT+8, 2024-5-31 18:01 , Processed in 0.097267 second(s), 12 queries , Gzip On, MemCache On.

Powered by Discuz! X3.4

© 2001-2023 Discuz! Team.

快速回复 返回顶部 返回列表