First published: Mon May 21 2012(Updated: )
An integer overflow, leading to heap-based buffer overflow was found in the way Phar extension of the PHP scripting language processed certain fields by manipulating TAR files. A remote attacker could provide a specially-crafted TAR archive file, which once processed in an PHP application using the Phar extension could lead to denial of service (application crash), or, potentially arbitary code execution with the privileges of the user running the application. References: [1] <a href="http://0x1byte.blogspot.com/2011/04/php-phar-extension-heap-overflow.html">http://0x1byte.blogspot.com/2011/04/php-phar-extension-heap-overflow.html</a> [2] <a href="http://secunia.com/advisories/44335">http://secunia.com/advisories/44335</a> Upstream bug (private): [3] <a href="https://bugs.php.net/bug.php?id=61065">https://bugs.php.net/bug.php?id=61065</a> CVE Request: [4] <a href="http://www.openwall.com/lists/oss-security/2012/05/20/5">http://www.openwall.com/lists/oss-security/2012/05/20/5</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
PHP | <=5.3.13 | |
PHP | >=5.4.0<5.4.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-2386 has a moderate severity rating due to the potential for remote code execution through a specially crafted TAR file.
To fix CVE-2012-2386, upgrade to PHP version 5.3.13 or later, or to versions 5.4.4 or above.
CVE-2012-2386 affects PHP versions up to 5.3.13 and versions between 5.4.0 and 5.4.4.
Yes, CVE-2012-2386 can be exploited remotely by attackers supplying malicious TAR archive files to vulnerable PHP applications.
CVE-2012-2386 is categorized as an integer overflow vulnerability leading to a heap-based buffer overflow.