#VU43908 Heap-based buffer overflow in PHP - CVE-2012-2386
Published: July 7, 2012 / Updated: August 11, 2020
PHP
PHP Group
Description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in Integer overflow in the phar_parse_tarfile function in tar.c in the phar extension in PHP before 5.3.14 and 5.4.x before 5.4.4. A remote attacker can use a crafted tar file that triggers a heap-based buffer overflow. to trigger heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
External links
- http://0x1byte.blogspot.com/2011/04/php-phar-extension-heap-overflow.html
- http://git.php.net/?p=php-src.git;a=commit;h=158d8a6b088662ce9d31e0c777c6ebe90efdc854
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00003.html
- http://openwall.com/lists/oss-security/2012/05/22/10
- http://support.apple.com/kb/HT5501
- http://www.php.net/ChangeLog-5.php
- https://bugs.php.net/bug.php?id=61065
- https://bugzilla.redhat.com/show_bug.cgi?id=823594