oss-sec mailing list archives

CVE request: PHP heap-based buffer overflow in DNS TXT record parsing


From: Murray McAllister <mmcallis () redhat com>
Date: Thu, 12 Jun 2014 14:57:52 +1000

Good morning,

Stefan Esser pointed out that the following commit fixes a heap-based buffer overflow in DNS TXT record parsing:

https://github.com/php/php-src/commit/b34d7849ed90ced9345f8ea1c59bc8d101c18468

A malicious server or man-in-the-middle attacker could possibly use this flaw to execute arbitrary code as the PHP interpreter if a PHP application uses dns_get_record() to perform a DNS query.

Can a CVE please be assigned if one has not been already?

(Red Hat bug with no further details: https://bugzilla.redhat.com/show_bug.cgi?id=1108447)

Cheers,

--
Murray McAllister / Red Hat Product Security


Current thread: