oss-sec mailing list archives

Re: CVE request: PHP heap-based buffer overflow in DNS TXT record parsing


From: cve-assign () mitre org
Date: Fri, 13 Jun 2014 01:56:18 -0400 (EDT)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

A malicious server or man-in-the-middle attacker could possibly use this
flaw to execute arbitrary code
https://github.com/php/php-src/commit/b34d7849ed90ced9345f8ea1c59bc8d101c18468
https://bugzilla.redhat.com/show_bug.cgi?id=1108447

Use CVE-2014-4049.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJTmpHfAAoJEKllVAevmvmsoesIAKZMmR5ccj6QakqSVrPY/ZtZ
qpx5zL9c25w5B4MzyShU6l0pJhmhlN704fg33D8yfb5sgyNabtk0MgIsdd0voIKE
sQVWag0Wu8ARcGkwqHcotSz+UnmkbnyGYs31RJpfd3XPAJEMJkFh8Wyh2ZbRy5C7
zFyC3HAjkO0MRKmSM7UNTXerPYx0GUo3EsPf9KwMSY7vr04KXEqph5OmPkWhztVa
4DqQAmIbnLuoB8ldndSeQXKn90FBsSAe4CjFRrMVlNVrDWOsZizcgSLlWT4s19nV
NolSWwNTbqxGMioXMSyisHMxwuIDPx7ZyFe4Jp9xv8UCm9wyI2BXBpp18fEnL2k=
=ecsW
-----END PGP SIGNATURE-----


Current thread: