First published: Thu Jun 12 2014(Updated: )
Heap-based buffer overflow in the php_parserr function in ext/standard/dns.c in PHP 5.6.0beta4 and earlier allows remote servers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted DNS TXT record, related to the dns_get_record function.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
openSUSE | =11.3 | |
PHP | >=5.3.0<5.3.29 | |
PHP | >=5.4.0<5.4.30 | |
PHP | >=5.5.0<5.5.14 | |
PHP | =5.6.0-alpha1 | |
PHP | =5.6.0-alpha2 | |
PHP | =5.6.0-alpha3 | |
PHP | =5.6.0-alpha4 | |
PHP | =5.6.0-alpha5 | |
PHP | =5.6.0-beta1 | |
PHP | =5.6.0-beta2 | |
PHP | =5.6.0-beta3 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.