Ilia Alshanetsky:
> And here is your first exploit, let's say we say  
> mysql_real_escape_string() takes tainted data and makes it untainted,  
> what happens when this "safe" data is passed to exec().

You need a malicous code writer to have an exploit. As far as I
know, PHP is not a platform for secuerly executing hostile code.

> You are going  
> to need to deal with different levels of taint-untainted and 1 bit is  
> not going to give you that flexibility. You are going to need an int/ 
> long, maybe even a long long.

Sandboxing malicious code requires a lot more than taint levels.

I'll be happy to provide that, but it's outside of the contribution
that I'm trying to make for 2007. Right now I am merely targeting
the non-malicious programmers.

        Wuietse

-- 
PHP Internals - PHP Runtime Development Mailing List
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to