Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <Pine.GSO.4.51.0808122041310.26550@faron.mitre.org>
Date: Tue, 12 Aug 2008 20:45:58 -0400 (EDT)
From: "Steven M. Christey" <coley@...us.mitre.org>
To: oss-security@...ts.openwall.com
cc: coley@...re.org
Subject: Re: CVE request: php-5.2.6 overflow issues


On Fri, 8 Aug 2008, Christian Hoffmann wrote:

> two security issues, which might possibly allow for arbitrary code
> execution (afaik nobody has analyzed the details...), but at least DoS
> (think of FastCGI setups), were silently fixed in PHP again:
>
>    * Overflow in ext/gd's imageloadfont() function [1] [2] [3]

Use CVE-2008-3658, to be filled in later - I'm assuming this is a distinct
component that doesn't just affect PHP.

>    * Overflow in php's internal memnstr() function which is exposed
>      to userspace as "explode()" [1] [2] [4] [5]

Use CVE-2008-3659.

For the FastCGI "foo..php" issue, use CVE-2008-3660.

These will be filled in later.

> As those functions might take user-supplied data in certain webapps
> (which is a valid use case at least in case of explode()), those issues
> should probably expected to be remotely exploitable.

We use the term "context-dependent" to cover cases where the reachability
and remote/local nature of the issue can vary widely, depending on how the
product is used.  This term typically applies to libraries or interpreters
that are used by third-party applications.

- Steve

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.