Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 193799 - dev-lang/php snmp and tidy buffer overflows (CVE-2007-3294)
Summary: dev-lang/php snmp and tidy buffer overflows (CVE-2007-3294)
Status: RESOLVED INVALID
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High normal
Assignee: Gentoo Security
URL: http://secunia.com/advisories/25735/
Whiteboard: B2 [upstream]
Keywords:
Depends on:
Blocks:
 
Reported: 2007-09-25 21:49 UTC by Robert Buchholz (RETIRED)
Modified: 2007-10-07 19:52 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Robert Buchholz (RETIRED) gentoo-dev 2007-09-25 21:49:01 UTC
According to Secunia
  1) A boundary error exists within the tidy extension when processing
  arguments passed to the "tidy_parse_string()" function. This can be
  exploited to cause a stack-based buffer overflow via an overly long
  string passed as the second argument to the affected function.
  (CVE-2007-3294)

  2) A boundary error exists within the snmp extension when processing
  arguments passed to the "snmpget()" function. This can be exploited
  to cause a stack-based buffer overflow via an overly long string
  passed as the third parameter to the affected function.

We ship both extensions as USE-flags to PHP and they still seem unfixed upstream.
Comment 1 Robert Buchholz (RETIRED) gentoo-dev 2007-09-25 21:51:38 UTC
php, please advise
Comment 2 Christian Hoffmann (RETIRED) gentoo-dev 2007-10-07 09:32:58 UTC
Um, sorry, totally forgot about this bug as we discussed it already on IRC...

Current status:
1) I think it's Windows-only; there does not seem to be a patch for it anyway...
2) Same here... original "advisory" is at [1] btw


[1] http://retrogod.altervista.org/php_446_snmpget_local_bof.html
Comment 3 Christian Hoffmann (RETIRED) gentoo-dev 2007-10-07 19:52:42 UTC
I cannot reproduce any of the bugs. The provided exploits contain Windows(-only) shellcode but I think there should be at least some strangeness (segfault or something) on *nix.
Closing as invalid, reopen if you can prove me wrong. ;)