First published: Thu Jun 12 2014(Updated: )
Heap-based buffer overflow in the php_parserr function in ext/standard/dns.c in PHP 5.6.0beta4 and earlier allows remote servers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted DNS TXT record, related to the dns_get_record function.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE Linux | =11.3 | |
PHP | >=5.3.0<5.3.29 | |
PHP | >=5.4.0<5.4.30 | |
PHP | >=5.5.0<5.5.14 | |
PHP | =5.6.0-alpha1 | |
PHP | =5.6.0-alpha2 | |
PHP | =5.6.0-alpha3 | |
PHP | =5.6.0-alpha4 | |
PHP | =5.6.0-alpha5 | |
PHP | =5.6.0-beta1 | |
PHP | =5.6.0-beta2 | |
PHP | =5.6.0-beta3 | |
Debian | =7.0 | |
Debian | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-4049 is considered critical as it may lead to denial of service and arbitrary code execution.
To mitigate CVE-2014-4049, upgrade PHP to a version later than 5.6.0beta4, where the vulnerability is resolved.
CVE-2014-4049 affects PHP versions from 5.3.0 up to 5.6.0beta4.
Yes, due to the potential for arbitrary code execution, CVE-2014-4049 could lead to unauthorized access and data breaches.
CVE-2014-4049 impacts PHP installations across various operating systems including openSUSE and Debian.