PHP php_quot_print_encode() Buffer Overflow Vulnerability
RISK: Medium Risk
TYPE: Servers - Internet App Servers
A vulnerability has been identified in PHP, which can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to an error within the "php_quot_print_encode()" function (ext/standard/quot_print.c) when parsing passed strings, which can be exploited to cause a heap-based buffer overflow. Successful exploitation may allow execution of arbitrary code. Additionally, a security issue exists when parsing mimetype for MP3 files, which can be exploited to cause a crash
Impact
- Remote Code Execution
System / Technologies affected
- PHP 5.3.x
- PHP 5.4.x
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
- Update to version 5.4.16 or 5.3.26.
Vulnerability Identifier
Source
Related Link
Share with