[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    Re: [oss-security] CVE request: php 5.2.6 ext/imap buffer overflows
From:       Christian Hoffmann <hoffie () gentoo ! org>
Date:       2008-06-24 9:39:19
Message-ID: 4860C0C7.6080302 () gentoo ! org
[Download RAW message or body]


On 2008-06-23 21:20, Steven M. Christey wrote:
> ======================================================
> Name: CVE-2008-2829
> Status: Candidate
> URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2829
> Reference: MISC:http://bugs.php.net/bug.php?id=42862
> Reference: CONFIRM:https://bugs.gentoo.org/show_bug.cgi?id=221969
> Reference: MLIST:[oss-security] 20080619 CVE request: php 5.2.6 ext/imap buffer overflows
> Reference: URL:http://www.openwall.com/lists/oss-security/2008/06/19/6
> 
> php_imap.c in PHP 5.2.5, 5.2.6, 4.x, and other versions, uses obsolete
> API calls that allow context-dependent attackers to cause a denial of
> service (crash) via a long IMAP request, which triggers an "rfc822.c
> legacy routine buffer overflow" error message.

Thanks. I do not have a deeper understanding of the issue in question, 
but the upstream bug report at bugs.php.net quotes a mail from a 
c-client developer, which says that the abort() will most likely not 
catch all possible buffer overflows, and as such allow for the buffer to 
overflow.
So, according to the information from the bug, this issue might not only 
allow for DoS but possibly for code execution as well, at least this is 
what it looks like to me.
Maybe you did further investigation and found it to be exploitable as a 
DoS only, but if this is not the case the description of the CVE entry 
should be clarified, in my opinion.

Also, I'm not quote sure why you are explicitily mentioning 5.2.5. To me 
it looks like all versions of php are affected, so in my opinion this 
looks a bit confusing. Only a cosmetic thing though.

-- 
Christian Hoffmann


["signature.asc" (application/pgp-signature)]

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic