First published: Thu Jan 27 2011(Updated: )
Kees Cook reported an information leak flaw in the PHP's XMLWriter, triggered by an invalid UTF-8 string passed to the writeAttribute method: <a href="http://thread.gmane.org/gmane.comp.security.oss.general/4122">http://thread.gmane.org/gmane.comp.security.oss.general/4122</a> <a href="http://bugs.php.net/bug.php?id=52998">http://bugs.php.net/bug.php?id=52998</a> <a href="https://bugzilla.gnome.org/show_bug.cgi?id=631551">https://bugzilla.gnome.org/show_bug.cgi?id=631551</a> In the initial report, it was unclear if this is PHP or libxml2 flaw. libxml2 upstream author's reply in the gnome bugzilla bug suggests this issue needs to be addressed in PHP, as the libxml2 API requires input to be valid UTF-8 and \0 terminated string.
Affected Software | Affected Version | How to fix |
---|---|---|
PHP |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-673101 is classified as an information leak vulnerability.
To fix REDHAT-BUG-673101, ensure you sanitize inputs and validate UTF-8 strings before passing them to the writeAttribute method.
The potential impacts of REDHAT-BUG-673101 include exposure of sensitive information due to improper handling of invalid UTF-8 strings.
REDHAT-BUG-673101 affects versions of PHP that implement the XMLWriter class.
The vulnerability REDHAT-BUG-673101 was reported by Kees Cook.