First published: Mon May 21 2012(Updated: )
A security flaw was found in the way the com_print_typeinfo() routine of the PHP scripting language processed certain COM object arguments. If a PHP language based application remotely accepted untrusted com_print_typeinfo() arguments in order to print out a PHP class definition for a dispatchable interface, a remote attacker could provide a specially-crafted COM object, which once processed by the application could lead to that application crash, or, potentially arbitrary code execution with the privileges of the user running the application. References: [1] <a href="https://isc.sans.edu/diary/PHP+5+4+Remote+Exploit+PoC+in+the+wild/13255">https://isc.sans.edu/diary/PHP+5+4+Remote+Exploit+PoC+in+the+wild/13255</a> [2] <a href="http://packetstormsecurity.org/files/112851/php54-exec.txt">http://packetstormsecurity.org/files/112851/php54-exec.txt</a> [3] <a href="http://www.exploit-db.com/exploits/18861/">http://www.exploit-db.com/exploits/18861/</a> [4] <a href="http://www.reddit.com/r/netsec/comments/tuyp3/isc_diary_php_54_remote_exploit_poc_in_the_wild/">http://www.reddit.com/r/netsec/comments/tuyp3/isc_diary_php_54_remote_exploit_poc_in_the_wild/</a> CVE request: [5] <a href="http://www.openwall.com/lists/oss-security/2012/05/20/1">http://www.openwall.com/lists/oss-security/2012/05/20/1</a> CVE assignment: [6] <a href="http://www.openwall.com/lists/oss-security/2012/05/20/2">http://www.openwall.com/lists/oss-security/2012/05/20/2</a>
Affected Software | Affected Version | How to fix |
---|---|---|
PHP | =5.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
REDHAT-BUG-823464 is classified as a high severity vulnerability due to the potential for remote code execution.
To fix REDHAT-BUG-823464, update PHP to version 5.4.1 or later, as this version includes patches for the vulnerability.
REDHAT-BUG-823464 affects PHP version 5.4 when it processes untrusted COM object arguments.
Yes, REDHAT-BUG-823464 allows attackers to exploit the vulnerability remotely if untrusted arguments are passed to the PHP com_print_typeinfo() function.
The vulnerability in REDHAT-BUG-823464 exists in the com_print_typeinfo() routine of the PHP scripting language.