Re: [SM-USERS] PHP exploit...

2004-12-31 Thread Steve Pirk
On Fri, 31 Dec 2004, Tomas Kuliavas wrote: > > >> > I was wondering if SquirrelMail is vulnerable > >> > to the php explots that are making their way > >> > around the internet? > >> > >> You have to be more specific if you want details. SM has not had any > >> security reports in the past few we

Re: [SM-USERS] PHP exploit...

2004-12-31 Thread Tomas Kuliavas
>> > I was wondering if SquirrelMail is vulnerable >> > to the php explots that are making their way >> > around the internet? >> >> You have to be more specific if you want details. SM has not had any >> security reports in the past few weeks, and in some cases is better >> written than some oth

Re: [SM-USERS] PHP exploit...

2004-12-30 Thread Steve Pirk
Here is a good explanation. I am pretty sure SM v1.4.3a has protected the vulnerable calls (like pack(), unpack() and unserialize()). http://isc.sans.org/diary.php?date=2004-12-26 and http://isc.sans.org/diary.php?date=2004-12-25 -- Steve On Thu, 30 Dec 2004, p dont think wrote: > > I was wonde

Re: [SM-USERS] PHP exploit...

2004-12-30 Thread p dont think
> I was wondering if SquirrelMail is vulnerable > to the php explots that are making their way > around the internet? You have to be more specific if you want details. SM has not had any security reports in the past few weeks, and in some cases is better written than some other "do it all" applic

[SM-USERS] PHP exploit...

2004-12-30 Thread Steve Pirk
I was wondering if SquirrelMail is vulnerable to the php explots that are making their way around the internet? At this point, most exploits go after the File Inclusion flaw in php scripts, and it sounds like SM uses that function. I am waiting for Slackware to release a new php package, but I mi