|
Message-ID: <4CE224F2.2090709@redhat.com> Date: Tue, 16 Nov 2010 12:00:10 +0530 From: Huzaifa Sidhpurwala <huzaifas@...hat.com> To: oss-security@...ts.openwall.com CC: Pierre Joye <pierre.php@...il.com> Subject: utf-8 security issue in php - 2 CVEs? Hi, This is regarding the "utf-8 security issue in php", which was discussed on this list[1] >From the php bug[2], it is clear that this issue has been assigned CVE-2010-3870 However yesterday another CVE was assigned to this bug i.e. CVE-2009-5016[3] The upstream bug report, describes two issues: a. An integer overflow b. flaw in handling ill-formed UTF8 characters. The integer overflow issue was solved somewhere in year 2009, which was however not a complete fix since the ill-formed UTF8 chars., were still not properly validated. The rest of the issues were solved sometime back. It seems that the integer overflow is not exploitable on its own, you need to couple it with the second issue for the exploit to really work. Therefore do we really need two CVEs for this issue? [1] http://thread.gmane.org/gmane.comp.security.oss.general [2] http://bugs.php.net/bug.php?id=49687 [3] http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-5016 -- Huzaifa Sidhpurwala / Red Hat Security Response Team
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.