Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:30886
HistoryJun 17, 2014 - 12:00 a.m.

[oss-security] CVE request: PHP heap-based buffer overflow in DNS TXT record parsing

2014-06-1700:00:00
vulners.com
21

Good morning,

Stefan Esser pointed out that the following commit fixes a heap-based buffer overflow in DNS TXT record parsing:

https://github.com/php/php-src/commit/b34d7849ed90ced9345f8ea1c59bc8d101c18468

A malicious server or man-in-the-middle attacker could possibly use this flaw to execute arbitrary code as the PHP interpreter if a PHP application uses dns_get_record() to perform a DNS query.

Can a CVE please be assigned if one has not been already?

(Red Hat bug with no further details: https://bugzilla.redhat.com/show_bug.cgi?id=1108447)

Cheers,


Murray McAllister / Red Hat Product Security