homepage Welcome to WebmasterWorld Guest from
register, free tools, login, search, pro membership, help, library, announcements, recent posts, open posts,
Become a Pro Member
Home / Forums Index / Code, Content, and Presentation / PHP Server Side Scripting
Forum Library, Charter, Moderators: coopster & jatar k

PHP Server Side Scripting Forum

PHP 4.3.10 & 5.0.3 released!

 6:26 pm on Dec 15, 2004 (gmt 0)

Check out the ChangeLog [php.net] for 4.3.10

Check out the ChangeLog [php.net] for 5.0.3



 9:26 pm on Dec 15, 2004 (gmt 0)

changed to include the 5.0.3 release that just appeared ;)


 9:34 pm on Dec 15, 2004 (gmt 0)

not much more then bug fixes


 9:34 pm on Dec 15, 2004 (gmt 0)

What I find nice is that some of the updates in 5.0 have been important (or perhaps just simple) enough that the developers have ported the code back a level as well. Note, for instance, this statement in the 4.3.10 changelog:

Backported Marcus' foreach() speedup patch from PHP 5.x.

Anybody running 5.0 in a live environment yet? I'm pushing one in the first week of January, 2005.


 9:40 pm on Dec 15, 2004 (gmt 0)

I was really impressed with the back porting as well.

>> not much more then bug fixes

security issues and that back port for 'foreach' for 4.3.10 got it up on my servers already.

5.0.3 seems to have a bunch of fixes in common functions, though that always depends on your personal view of common. ;)


 4:12 am on Dec 17, 2004 (gmt 0)

In case anyone missed it or needs motivation ...

Date: Thu, 16 Dec 2004 14:57:54 +0100
Subject: [SA13481] PHP Multiple Vulnerabilities
From: Secunia Security Advisories <sec-adv@secunia.com>

PHP Multiple Vulnerabilities



Highly critical

Security Bypass, Exposure of sensitive information, Privilege escalation, System access

From remote

PHP 5.0.x [secunia.com...]
PHP 4.3.x [secunia.com...]

Multiple vulnerabilities have been reported in PHP, which can be exploited to gain escalated privileges, bypass certain security restrictions, gain knowledge of sensitive information, or compromise a vulnerable system.

1) An integer overflow in the "pack()" function can be exploited to cause a heap-based buffer overflow by passing some specially crafted parameters to the function.

Successful exploitation bypasses the safe_mode feature and allows execution of arbitrary code with the privileges of the web server.

2) An integer overflow in the "unpack()" function can be exploited to leak information stored on the heap by passing specially crafted parameters to the function.

In combination with the first vulnerability, this may also allow bypassing of heap canary protection mechanisms.

3) An error within safe_mode when executing commands can be exploited to bypass the safe_mode_exec_dir restriction by injecting shell commands into the current directory name.

Successful exploitation requires that PHP runs on a multi-threaded Unix web server.

4) An error in safe_mode combined with certain implementations of "realpath()" can be exploited to bypass safe_mode via a specially crafted file path.

5) An error within the handling of file paths may potentially lead to file inclusion vulnerabilities. The problem is that "realpath()", which in some implementations truncate filenames, is used in various places to obtain the real path of a file.

6) Various errors within the deserialization code can be exploited to disclose information or execute arbitrary code via specially crafted strings passed to the "unserialize()" function.

7) An unspecified error in the "shmop_write()" function may result in an attempt to write to an out-of-bounds memory location.

8) An unspecified error in the "addslashes()" function causes it to not escape "\0" correctly.

9) An unspecified boundary error exists in the "exif_read_data()" function when handling long section names.

10) An unspecified error within "magic_quotes_gpc" may allow a one-level directory traversal when uploading files.

NOTE: Other potential security issues have also been reported.

Update to version 4.3.10 or 5.0.3.

1-6) Stefan Esser
6) Martin Eiszner
7-10) Reported by vendor.


Stefan Esser:


 4:24 am on Dec 17, 2004 (gmt 0)

Welcome to WebmasterWorld trees


 4:44 pm on Dec 19, 2004 (gmt 0)

It's worth mentioning that 4.3.10 may break older versions of Zend optimiser and Ioncube loader plus any other simmilar type systems. I found this out the hard way after upgrading, had to install the latest version of the Ioncube loader which they rushed out to fix the problem.



 8:13 pm on Dec 19, 2004 (gmt 0)

Backported Marcus' foreach() speedup patch from PHP 5.x.

Anyone know what this entails, or have a link to the patch?


 5:07 pm on Dec 21, 2004 (gmt 0)

I had some problems after upgrading to 4.3.10: some scripts sometimes wouldn't work, and load average sometimes jumped up to 15 or higher. Quite vague. So I deleted all the phpa_* files in /tmp , which are created and used by PHP Accelerator. That was 24 hours ago; the server has been running nicely since... (knocks on wood).

Maybe I should look into an alternative for the accelerator that does get updated.


 11:50 pm on Dec 22, 2004 (gmt 0)

Sorry if this seems naive ... but doing the upgrade in the way I usually do killed my Apache2 httpd daemon. Can someone give me a tip?

Here's what I did (from 4.3.3 to 4.3.10 on RH9):

apachectl stop
cd php-4.3.3
make clean
cd ..
tar -xzvf php-4.3.10.tar.gz
cd php-4.3.10
./configure --with-my-various-options-from-4.3.3-install
make install

I then executed the libtool update command as instructed during the installation routine.

Killed me. I had to "make clean" in php-4.3.10 and reinstall php-4.3.3, then I restored my Apache2 binaries, modules, and config files from my daily backup to get the server up again.

The httpd daemon simply wouldn't start, and threw no errors at me.

Note that this isn't an RPM installation (so no rpm -Uvf) and it's not Slackware (so no updatepkg).

I didn't upgrade any Zend stuff, as I don't use it specifically. (The PHP and Zend sites said to upgrade if you used Zend Optimizer.)

From Zend:
Due to incompatibility of the previous version of Zend Optimizer with PHP 4.3.10, it is strongly recommended that owners of Zend Performance Suite, Zend Accelerator, Zend Studio Server, and Zend WinEnabler, upgrade to Zend Optimizer 2.5.7.

Did I err? Is there a 1-2-3 upgrade process other than the above? Thanks for any help.


 11:10 am on Dec 23, 2004 (gmt 0)

Any of you guys heard about this?

It looks like PHP has a nasty bug, and one that can cause some potentially wicked problems with unwanted database access. Itís been discovered that PHP versions prior to 4.3.10 or 5.0.3 have problems connected with the way that serialisation and realpath commands are handled to gain escalated privileges. The result is that many web administrators are suffering problems from hackers. Fortunately, the problem has now been fixed.

The solution to the exploit is to upgrade to the latest version of PHP - either 4.3.10 or 5.0.3, depending on which thread you are running. The 4.3.10 build also includes some 5.x bugfixes and features which have been ported backwards.


 11:28 am on Dec 23, 2004 (gmt 0)

Hello dreamcatcher. You may have missed reading Message #6 in this thread. Do you have a specific question?

Any of you guys heard about this?

[edited by: engine at 11:04 am (utc) on Jan. 14, 2005]
[edit reason] formatting [/edit]


 4:06 pm on Dec 23, 2004 (gmt 0)

Thanks trees. So, you covered it already? Oh ok. :)


 11:35 am on Dec 24, 2004 (gmt 0)

YVW dreamcatcher, our understanding is that we're supposed to help each other out wherever possible :).

Numerous threads do exist on WWorld and elsewhere containing warnings about upgrading tp PHP 4.3.10, and without doubt PHP.NET will be teeming with discussion about PHP 4.3.11 at the moment.

Apparently the only really urgent concern is to remove/update any phpBBB installation/s you may have, otherwise I'm cautiously confident that most other current PHP security warnings are no more than knee-jerk reactions ;)

Keeping a watchful eyte on WWorld Forum88 seems to be a wise move over the holidays ( [webmasterworld.com...] ). Speaking of holidays, we're shutting down early this morning to allow time for backups and other hooiday precautions.

Merry Crimble to all, and to all a Good Knight!

[edited by: engine at 11:05 am (utc) on Jan. 14, 2005]
[edit reason] formatting [/edit]


 2:11 pm on Dec 24, 2004 (gmt 0)

Yes, my web hosting company (who are security conscious) have told all account holders that if they don`t upgrade their PHPBB boards, they will have them removed.

They have already banned PHP Nuke and Coppermine Photo Gallery from their servers because of numerous security problems.



 10:55 am on Dec 26, 2004 (gmt 0)

Same as my webhosting company too, though I have several domains on different hosting providers. I think I'll be better off making my own board (just kidding ^^). Hey but who knows...


 7:32 pm on Dec 27, 2004 (gmt 0)

Welcome to WebmasterWorld genusapiens


 5:22 pm on Dec 28, 2004 (gmt 0)

Thank you very much jatar ^^ its both an honor and my pleasure to be here.

Global Options:
 top home search open messages active posts  

Home / Forums Index / Code, Content, and Presentation / PHP Server Side Scripting
rss feed

All trademarks and copyrights held by respective owners. Member comments are owned by the poster.
Home ¦ Free Tools ¦ Terms of Service ¦ Privacy Policy ¦ Report Problem ¦ About ¦ Library ¦ Newsletter
WebmasterWorld is a Developer Shed Community owned by Jim Boykin.
© Webmaster World 1996-2014 all rights reserved