Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 24 Jun 2008 11:39:19 +0200
From: Christian Hoffmann <hoffie@...too.org>
To: oss-security@...ts.openwall.com
CC: coley@...us.mitre.org
Subject: Re: CVE request: php 5.2.6 ext/imap buffer overflows

On 2008-06-23 21:20, Steven M. Christey wrote:
> ======================================================
> Name: CVE-2008-2829
> Status: Candidate
> URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2829
> Reference: MISC:http://bugs.php.net/bug.php?id=42862
> Reference: CONFIRM:https://bugs.gentoo.org/show_bug.cgi?id=221969
> Reference: MLIST:[oss-security] 20080619 CVE request: php 5.2.6 ext/imap buffer overflows
> Reference: URL:http://www.openwall.com/lists/oss-security/2008/06/19/6
> 
> php_imap.c in PHP 5.2.5, 5.2.6, 4.x, and other versions, uses obsolete
> API calls that allow context-dependent attackers to cause a denial of
> service (crash) via a long IMAP request, which triggers an "rfc822.c
> legacy routine buffer overflow" error message.

Thanks. I do not have a deeper understanding of the issue in question, 
but the upstream bug report at bugs.php.net quotes a mail from a 
c-client developer, which says that the abort() will most likely not 
catch all possible buffer overflows, and as such allow for the buffer to 
overflow.
So, according to the information from the bug, this issue might not only 
allow for DoS but possibly for code execution as well, at least this is 
what it looks like to me.
Maybe you did further investigation and found it to be exploitable as a 
DoS only, but if this is not the case the description of the CVE entry 
should be clarified, in my opinion.

Also, I'm not quote sure why you are explicitily mentioning 5.2.5. To me 
it looks like all versions of php are affected, so in my opinion this 
looks a bit confusing. Only a cosmetic thing though.

-- 
Christian Hoffmann


Download attachment "signature.asc" of type "application/pgp-signature" (261 bytes)

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.