From owner-freebsd-ports@FreeBSD.ORG Thu Sep 16 15:21:33 2010 Return-Path: Delivered-To: freebsd-ports@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 2438B1065780 for ; Thu, 16 Sep 2010 15:21:33 +0000 (UTC) (envelope-from cvs-src@yandex.ru) Received: from forward13.mail.yandex.net (forward13.mail.yandex.net [95.108.130.120]) by mx1.freebsd.org (Postfix) with ESMTP id C70DE8FC0A for ; Thu, 16 Sep 2010 15:21:32 +0000 (UTC) Received: from smtp14.mail.yandex.net (smtp14.mail.yandex.net [95.108.131.192]) by forward13.mail.yandex.net (Yandex) with ESMTP id 0CCB51080722; Thu, 16 Sep 2010 19:21:31 +0400 (MSD) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yandex.ru; s=mail; t=1284650491; bh=KgyP2FdS5Pxo1RVXXA3sezGdAshsfN+qJPyXuM0pzMo=; h=Message-ID:Date:From:MIME-Version:To:CC:Subject:References: In-Reply-To:Content-Type:Content-Transfer-Encoding; b=YF/YGp1VtB8/mUozpDjFHtIqrzKnGS1Gjq8y2ozwkVwbxb26pV03vpc1tL4d+Zsow UoqxFznIR1sDqRdA8l97axPf+7hcGOEI3s4fZcBKTFUVgO5HS6LBM6bUo0Uu4+mt5z eFkyNuq5M0b+TBcKULh6zJo07VqG0+YYa+qGj7k8= Received: from smeshariki2.local (unknown [77.66.145.223]) by smtp14.mail.yandex.net (Yandex) with ESMTPSA id C239D19B807E; Thu, 16 Sep 2010 19:21:30 +0400 (MSD) Message-ID: <4C92358A.8040704@yandex.ru> Date: Thu, 16 Sep 2010 19:19:38 +0400 From: Ruslan Mahmatkhanov User-Agent: Mozilla/5.0 (X11; U; FreeBSD i386; ru-RU; rv:1.9.2.9) Gecko/20100908 Thunderbird/3.1.3 MIME-Version: 1.0 To: Dan Langille References: <4C9176BD.3020903@langille.org> <4C91A6A2.90602@yandex.ru> In-Reply-To: Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit X-Yandex-TimeMark: 1284650490 X-Yandex-Spam: 1 X-Yandex-Front: smtp14.mail.yandex.net Cc: freebsd-ports@freebsd.org Subject: Re: www/openx vuln X-BeenThere: freebsd-ports@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Porting software to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 16 Sep 2010 15:21:33 -0000 16.09.2010 17:59, Dan Langille пишет: > > On Thu, September 16, 2010 1:09 am, Ruslan Mahmatkhanov wrote: >> 16.09.2010 05:45, Dan Langille пишет: >>> This came in last night: http://blog.openx.org/09/security-update/ >>> >>> Port needs to be upgraded to 2.8.8 and a vuln entry created.... Sorry, >>> bags not me. >>> >> >> Until update is not come up, user can apply this workaround: >> >> echo "RemoveType .php"> www/images/.htaccess > > Do you have a reference for this fix? A URL we can refer people to? Not really, but i read there (originally in Russian): http://translate.google.com/translate?js=n&prev=_t&hl=ru&ie=UTF-8&layout=2&eotf=0&sl=ru&tl=en&u=http%3A%2F%2Fwww.opennet.ru%2Fopennews%2Fart.shtml%3Fnum%3D27971 that vulnerable plugin allows to attacker upload php-file into images dir and that disabling handling php in that directory via RemoveHandler or RemoveType successfully closes the bug. -- Regards, Ruslan