Presumably the PHP interpreter is in the same memory space. So you could also
steal session cookies, database credentials, possibly form data, maybe even
credit card data as it passed through.

On Tue, Apr 08, 2014 at 12:51:36PM PDT, David Lang spake thusly:
> On Tue, 8 Apr 2014, David Blank-Edelman wrote:
> 
> >On Apr 8, 2014, at 9:48 AM, Paul Graydon <p...@paulgraydon.co.uk> wrote:
> >
> >>There is ample proof this morning that it can be used to acquire yahoo
> >>credentials with ease as Yahoo remains unpatched.
> >
> >So I’ve seen the screen shot too that went around, but I have to admit,
> >I’m curious about the mechanics behind that. Would anyone care to
> >speculate just how you use this bug to grab credentials in that way from
> >them? I can hazard a partial guess, but I’d like to hear if others have
> >any more technical detailed thoughts on how this was done.
> 
> Basically, this bug allows you to dump the entire address space of the
> server and then go digging through it.
> 
> So anything the server knows at that instant (including end-user passwords
> and other form data) can be dug out by the attacker if they are determined
> enough.
> 
> How hard or easy this is depends on a lot of things, but certs are stored in
> fairly standard places, so you should create new certs (and new passphrases
> to go along with them) if you think you may be a target of _anyone_
> 
> David Lang

> _______________________________________________
> Tech mailing list
> Tech@lists.lopsa.org
> https://lists.lopsa.org/cgi-bin/mailman/listinfo/tech
> This list provided by the League of Professional System Administrators
>  http://lopsa.org/


-- 
Tracy Reed

Attachment: pgpZg4QMQ71aq.pgp
Description: PGP signature

_______________________________________________
Tech mailing list
Tech@lists.lopsa.org
https://lists.lopsa.org/cgi-bin/mailman/listinfo/tech
This list provided by the League of Professional System Administrators
 http://lopsa.org/

Reply via email to