Q-321: PHP Security Update


 
Thread Tools Search this Thread
Special Forums Cybersecurity Security Advisories (RSS) Q-321: PHP Security Update
# 1  
Old 03-04-2008
Q-321: PHP Security Update

There are several security vulnerabilities in PHP:1) A response-splitting issue was discovered in the PHP session handling;2) A buffer overflow was discovered in the PHP sscanf() function;3) An interger overflow was discovered in the PHP wordwrap() and str_repeat() functions; 4) A buffer overflow was discovered in the PHP gd extension; and5) A interger overflow was discovered in the PHP memory allocation handling. The risk is LOW. 1) A remote attacker can force a carefully crafted session identifier to be used, a cross-site-scripting or response-splitting attack could be possible;2) A remote attacker sending a carefully crafted request could execute arbitrary code as the 'apache' user;3) A remote attacker sending a carefully crafted request might be able to cause a heap overflow; and4) On 64-bit platforms, the "memory_limit" setting was not enforced correctly, which could allow a denial of service attacker by a remote user.


More...
Login or Register to Ask a Question

Previous Thread | Next Thread
Login or Register to Ask a Question