Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 416821 (CVE-2012-2329) - <dev-lang/php-5.4.3: Buffer overflow leading to DoS (CVE-2012-2329)
Summary: <dev-lang/php-5.4.3: Buffer overflow leading to DoS (CVE-2012-2329)
Status: RESOLVED FIXED
Alias: CVE-2012-2329
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal trivial (vote)
Assignee: Gentoo Security
URL: http://nvd.nist.gov/nvd.cfm?cvename=C...
Whiteboard: ~3 [noglsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2012-05-20 23:48 UTC by GLSAMaker/CVETool Bot
Modified: 2012-05-21 10:55 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description GLSAMaker/CVETool Bot gentoo-dev 2012-05-20 23:48:08 UTC
CVE-2012-2329 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2329):
  Buffer overflow in the apache_request_headers function in
  sapi/cgi/cgi_main.c in PHP 5.4.x before 5.4.3 allows remote attackers to
  cause a denial of service (application crash) via a long string in the
  header of an HTTP request.


Please punt vulnerable versions. Thanks.
Comment 1 Ole Markus With (RETIRED) gentoo-dev 2012-05-21 09:32:04 UTC
Removed in CVS now. Sorry for the delay
Comment 2 Sean Amoss (RETIRED) gentoo-dev Security 2012-05-21 10:55:18 UTC
(In reply to comment #1)
> Removed in CVS now. Sorry for the delay

Thanks!

Closing noglsa for ~arch only (PHP 5.4.x).