Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 170583 - dev-lang/php-4.4.6 snmpget buffer overflow
Summary: dev-lang/php-4.4.6 snmpget buffer overflow
Status: RESOLVED DUPLICATE of bug 169372
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High normal (vote)
Assignee: Gentoo Security
URL: http://secunia.com/advisories/24440/
Whiteboard: B? [upstream] py
Keywords:
Depends on:
Blocks:
 
Reported: 2007-03-12 15:43 UTC by Pierre-Yves Rofes (RETIRED)
Modified: 2007-03-14 00:44 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Pierre-Yves Rofes (RETIRED) gentoo-dev 2007-03-12 15:43:37 UTC
rgod has reported a vulnerability in PHP4, which can be exploited by
malicious people to bypass certain security restrictions.

The vulnerability is caused due to a boundary error in the
"snmpget()" function. This can be exploited to cause a stack-based
buffer overflow via an overly long argument and execute arbitrary
code, bypassing security restrictions like the "disable_functions"
directive.

The vulnerability is reported in version 4.4.6. Other versions may
also be affected.
Comment 1 Raphael Marichez (Falco) (RETIRED) gentoo-dev 2007-03-14 00:44:31 UTC
that's the MOPB, no need to open several bugs for the same app while noone of them is fixed yet.

*** This bug has been marked as a duplicate of bug 169372 ***