First published: Mon May 21 2012(Updated: )
An integer overflow, leading to heap-based buffer overflow was found in the way Phar extension of the PHP scripting language processed certain fields by manipulating TAR files. A remote attacker could provide a specially-crafted TAR archive file, which once processed in an PHP application using the Phar extension could lead to denial of service (application crash), or, potentially arbitary code execution with the privileges of the user running the application. References: [1] <a href="http://0x1byte.blogspot.com/2011/04/php-phar-extension-heap-overflow.html">http://0x1byte.blogspot.com/2011/04/php-phar-extension-heap-overflow.html</a> [2] <a href="http://secunia.com/advisories/44335">http://secunia.com/advisories/44335</a> Upstream bug (private): [3] <a href="https://bugs.php.net/bug.php?id=61065">https://bugs.php.net/bug.php?id=61065</a> CVE Request: [4] <a href="http://www.openwall.com/lists/oss-security/2012/05/20/5">http://www.openwall.com/lists/oss-security/2012/05/20/5</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
PHP PHP | <=5.3.13 | |
PHP PHP | >=5.4.0<5.4.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.