CVE-2014-4049

Heap-based buffer overflow in the php_parserr function in ext/standard/dns.c in PHP 5.6.0beta4 and earlier allows remote servers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted DNS TXT record, related to the dns_get_record function.
References
Link Resource
http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2014-07/msg00001.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2014-07/msg00002.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2014-06/msg00051.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2014-07/msg00032.html Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=141017844705317&w=2 Mailing List Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2014-1765.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2014-1766.html Third Party Advisory
http://secunia.com/advisories/59270 Third Party Advisory
http://secunia.com/advisories/59329 Third Party Advisory
http://secunia.com/advisories/59418 Third Party Advisory
http://secunia.com/advisories/59496 Third Party Advisory
http://secunia.com/advisories/59513 Third Party Advisory
http://secunia.com/advisories/59652 Third Party Advisory
http://secunia.com/advisories/60998 Third Party Advisory
http://support.apple.com/kb/HT6443 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21683486 Third Party Advisory
http://www.debian.org/security/2014/dsa-2961 Third Party Advisory
http://www.openwall.com/lists/oss-security/2014/06/13/4 Mailing List Third Party Advisory
http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html Third Party Advisory
http://www.securityfocus.com/bid/68007 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1030435 Third Party Advisory VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=1108447 Issue Tracking
https://github.com/php/php-src/commit/b34d7849ed90ced9345f8ea1c59bc8d101c18468 Patch Third Party Advisory
https://support.apple.com/HT204659 Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.6.0:alpha1:*:*:*:*:*:*
cpe:2.3:a:php:php:5.6.0:alpha2:*:*:*:*:*:*
cpe:2.3:a:php:php:5.6.0:alpha3:*:*:*:*:*:*
cpe:2.3:a:php:php:5.6.0:alpha4:*:*:*:*:*:*
cpe:2.3:a:php:php:5.6.0:alpha5:*:*:*:*:*:*
cpe:2.3:a:php:php:5.6.0:beta1:*:*:*:*:*:*
cpe:2.3:a:php:php:5.6.0:beta2:*:*:*:*:*:*
cpe:2.3:a:php:php:5.6.0:beta3:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2014-06-18 19:55

Updated : 2024-02-28 12:20


NVD link : CVE-2014-4049

Mitre link : CVE-2014-4049

CVE.ORG link : CVE-2014-4049


JSON object : View

Products Affected

opensuse

  • opensuse

php

  • php

debian

  • debian_linux
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer