---------------------------------------------------------------------- Bist Du interessiert an einem neuen Job in IT-Sicherheit? Secunia hat zwei freie Stellen als Junior und Senior Spezialist in IT- Sicherheit: http://secunia.com/secunia_vacancies/ ---------------------------------------------------------------------- TITLE: Bloodshed Dev-Pascal NULL Character File Display Weakness SECUNIA ADVISORY ID: SA16422 VERIFY ADVISORY: http://secunia.com/advisories/16422/ CRITICAL: Not critical IMPACT: Unknown WHERE: >From remote SOFTWARE: Bloodshed Dev-Pascal 1.x http://secunia.com/product/5533/ DESCRIPTION: rgod has discovered a weakness in Bloodshed Dev-Pascal, which can be exploited by malicious people to hide the contents of certain source files. The weakness is caused due to an error in the handling of NULL characters in text files. When a PHP file containing a NULL character is viewed in the editor, only the text that comes before the NULL character will be displayed. Any PHP script inserted after the NULL character will not be displayed in the editor, but will be run by the PHP interpreter. Successful exploitation allows hiding e.g. malicious script code in a file when viewed using an affected editor. The weakness has been confirmed in version 1.9.2. Other versions may also be affected. SOLUTION: Use another editor to check the file contents. PROVIDED AND/OR DISCOVERED BY: rgod ORIGINAL ADVISORY: http://rgod.altervista.org/syn.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------