Summary: | dev-lang/php snmp and tidy buffer overflows (CVE-2007-3294) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Robert Buchholz (RETIRED) <rbu> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED INVALID | ||
Severity: | normal | CC: | php-bugs |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://secunia.com/advisories/25735/ | ||
Whiteboard: | B2 [upstream] | ||
Package list: | Runtime testing required: | --- |
Description
Robert Buchholz (RETIRED)
![]() php, please advise Um, sorry, totally forgot about this bug as we discussed it already on IRC... Current status: 1) I think it's Windows-only; there does not seem to be a patch for it anyway... 2) Same here... original "advisory" is at [1] btw [1] http://retrogod.altervista.org/php_446_snmpget_local_bof.html I cannot reproduce any of the bugs. The provided exploits contain Windows(-only) shellcode but I think there should be at least some strangeness (segfault or something) on *nix. Closing as invalid, reopen if you can prove me wrong. ;) |