Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Thu, 12 Jun 2014 14:57:52 +1000
From: Murray McAllister <mmcallis@...hat.com>
To: oss-security@...ts.openwall.com
Subject: CVE request: PHP heap-based buffer overflow in DNS TXT record parsing

Good morning,

Stefan Esser pointed out that the following commit fixes a heap-based 
buffer overflow in DNS TXT record parsing:

https://github.com/php/php-src/commit/b34d7849ed90ced9345f8ea1c59bc8d101c18468

A malicious server or man-in-the-middle attacker could possibly use this 
flaw to execute arbitrary code as the PHP interpreter if a PHP 
application uses dns_get_record() to perform a DNS query.

Can a CVE please be assigned if one has not been already?

(Red Hat bug with no further details: 
https://bugzilla.redhat.com/show_bug.cgi?id=1108447)

Cheers,

--
Murray McAllister / Red Hat Product Security

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ