First published: Thu Jan 29 2015(Updated: )
It was reported that pcre_exec in PHP pcre extension partially initialize a buffer when an invalid regex is processed, which can information disclosure. A mitigation fix have been applied in PHP 5.4+ <a href="http://git.php.net/?p=php-src.git;a=commitdiff;h=c351b47ce85a3a147cfa801fa9f0149ab4160834">http://git.php.net/?p=php-src.git;a=commitdiff;h=c351b47ce85a3a147cfa801fa9f0149ab4160834</a> Upstream bug report (with a patch proposal): <a href="http://bugs.exim.org/show_bug.cgi?id=1537">http://bugs.exim.org/show_bug.cgi?id=1537</a>
Affected Software | Affected Version | How to fix |
---|---|---|
PHP PCRE Extension | <5.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
REDHAT-BUG-1187225 has a potential for information disclosure due to improper buffer initialization.
To fix REDHAT-BUG-1187225, upgrade the PHP PCRE extension to version 5.4 or higher.
The vulnerability REDHAT-BUG-1187225 affects the PHP PCRE extension versions up to but not including 5.4.
The vulnerability REDHAT-BUG-1187225 is caused by the pcre_exec function partially initializing a buffer when processing an invalid regex.
Yes, a mitigation fix has been applied in PHP version 5.4 and above for REDHAT-BUG-1187225.