Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Thu, 12 Jun 2014 14:57:52 +1000
From: Murray McAllister <>
Subject: CVE request: PHP heap-based buffer overflow in DNS TXT record parsing

Good morning,

Stefan Esser pointed out that the following commit fixes a heap-based 
buffer overflow in DNS TXT record parsing:

A malicious server or man-in-the-middle attacker could possibly use this 
flaw to execute arbitrary code as the PHP interpreter if a PHP 
application uses dns_get_record() to perform a DNS query.

Can a CVE please be assigned if one has not been already?

(Red Hat bug with no further details:


Murray McAllister / Red Hat Product Security

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ