Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <4CE224F2.2090709@redhat.com>
Date: Tue, 16 Nov 2010 12:00:10 +0530
From: Huzaifa Sidhpurwala <huzaifas@...hat.com>
To: oss-security@...ts.openwall.com
CC: Pierre Joye <pierre.php@...il.com>
Subject: utf-8 security issue in php - 2 CVEs?

Hi,
This is regarding the "utf-8 security issue in php", which was discussed
on this list[1]
>From the php bug[2], it is clear that this issue has been assigned
CVE-2010-3870

However yesterday another CVE was assigned to this bug i.e. CVE-2009-5016[3]

The upstream bug report, describes two issues:
a. An integer overflow
b. flaw in handling ill-formed UTF8 characters.

The integer overflow issue was solved somewhere in year 2009, which was
however not a complete fix since the ill-formed UTF8 chars., were still
not properly validated. The rest of the issues were solved sometime back.

It seems that the integer overflow is not exploitable on its own, you
need to couple it with the second issue for the exploit to really work.

Therefore do we really need two CVEs for this issue?

[1] http://thread.gmane.org/gmane.comp.security.oss.general
[2] http://bugs.php.net/bug.php?id=49687
[3] http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-5016


-- 

Huzaifa Sidhpurwala / Red Hat Security Response Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.