oss-sec mailing list archives
CVE request: PHP heap-based buffer overflow in DNS TXT record parsing
From: Murray McAllister <mmcallis () redhat com>
Date: Thu, 12 Jun 2014 14:57:52 +1000
Good morning,Stefan Esser pointed out that the following commit fixes a heap-based buffer overflow in DNS TXT record parsing:
https://github.com/php/php-src/commit/b34d7849ed90ced9345f8ea1c59bc8d101c18468A malicious server or man-in-the-middle attacker could possibly use this flaw to execute arbitrary code as the PHP interpreter if a PHP application uses dns_get_record() to perform a DNS query.
Can a CVE please be assigned if one has not been already?(Red Hat bug with no further details: https://bugzilla.redhat.com/show_bug.cgi?id=1108447)
Cheers, -- Murray McAllister / Red Hat Product Security
Current thread:
- CVE request: PHP heap-based buffer overflow in DNS TXT record parsing Murray McAllister (Jun 11)
- Re: CVE request: PHP heap-based buffer overflow in DNS TXT record parsing cve-assign (Jun 12)