Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 15 Oct 2006 16:08:39 -0500
From:      Paul Schmehl <pauls@utdallas.edu>
To:        freebsd-questions@freebsd.org
Subject:   Re: PHP new vulnarabilities
Message-ID:  <E69EE15A3D5493DD6562EFE1@paul-schmehls-powerbook59.local>
In-Reply-To: <45329AB4.1000508@pixelhammer.com>
References:  <45322A1D.8070204@hadara.ps> <20061015151215.15a4062e@loki.starkstrom.lan> <200610151239.12127.freebsd@dfwlp.com>	<453274C3.7090409@bsdunix.ch> <0F7C0CB4C34ECD44CCF3CDD0@paul-schmehls-powerbook59.local> <45329AB4.1000508@pixelhammer.com>

next in thread | previous in thread | raw e-mail | index | archive | help
--==========9168764B833293E07355==========
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: quoted-printable
Content-Disposition: inline

--On October 15, 2006 4:31:48 PM -0400 DAve <dave.list@pixelhammer.com>=20
wrote:
>
> That is a bit extreme. I have a full workload, I put in about 60 hours a
> week (I work a lot of weekends, I'm working now). I have servers running
> all different version of apps. I can't go around upgrading everything at
> the drop of a hat. I would be divorced within a month.
>
> If you read the security alerts carefully you will find many require a
> shell (We don't offer them to clients), some require a specific app to
> be running that you may not need (rm -f /usr/local/bin/vulnerable_app),
> and sometimes a simple code audit will tell you if you are vulnerable.
> It is also not uncommon that a security alert is issued for a problem
> that has not be proven in the wild.
>
> There are plenty of reasons to not follow a security alert, many of them
> quite valid. Upgrading mission critical systems without throughly
> understanding the implications just because someone screamed SECURITY!,
> now that is foolhardy.
>
That wasn't the situation here.

Look, there are several possible scenarios where installing a vulnerable=20
app is less of a risk than not installing the app at all.  Business=20
functionality *is* important.  However, to arbitrarily say "Use=20
DISABLE_VULNERABILITIES" is the answer to an app that won't install is=20
always a wrong answer.  *At a minimum* it should come with a warning of=20
the possible risks.  Furthermore *upgrading* from a non-vulnerabile app to =

a vulnerable app simply because "it's the latest" is foolhardy in the=20
extreme.

I don't think my statement was any more extreme than "Just use=20
DISABLE_VULNERABILITIES and you can install the app" with no warning of=20
the risks.  *Especially* when the app is as highly scrutinized as php is=20
(not to mention how vulnerabilities are being found in it all the time.)

Paul Schmehl (pauls@utdallas.edu)
Adjunct Information Security Officer
The University of Texas at Dallas
http://www.utdallas.edu/ir/security/

--==========9168764B833293E07355==========--




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?E69EE15A3D5493DD6562EFE1>