Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Thu, 12 Jun 2014 14:57:52 +1000
From: Murray McAllister <mmcallis@...hat.com>
To: oss-security@...ts.openwall.com
Subject: CVE request: PHP heap-based buffer overflow in DNS TXT record parsing

Good morning,

Stefan Esser pointed out that the following commit fixes a heap-based 
buffer overflow in DNS TXT record parsing:

https://github.com/php/php-src/commit/b34d7849ed90ced9345f8ea1c59bc8d101c18468

A malicious server or man-in-the-middle attacker could possibly use this 
flaw to execute arbitrary code as the PHP interpreter if a PHP 
application uses dns_get_record() to perform a DNS query.

Can a CVE please be assigned if one has not been already?

(Red Hat bug with no further details: 
https://bugzilla.redhat.com/show_bug.cgi?id=1108447)

Cheers,

--
Murray McAllister / Red Hat Product Security

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.