Skip to main content

PHP php_quot_print_encode() Buffer Overflow Vulnerability

Last Update Date: 10 Jun 2013 10:25 Release Date: 10 Jun 2013 4054 Views

RISK: Medium Risk

TYPE: Servers - Internet App Servers

TYPE: Internet App Servers

A vulnerability has been identified in PHP, which can be exploited by malicious people to compromise a vulnerable system.  The vulnerability is caused due to an error within the "php_quot_print_encode()" function (ext/standard/quot_print.c) when parsing passed strings, which can be exploited to cause a heap-based buffer overflow.  Successful exploitation may allow execution of arbitrary code.  Additionally, a security issue exists when parsing mimetype for MP3 files, which can be exploited to cause a crash


Impact

  • Remote Code Execution

System / Technologies affected

  • PHP 5.3.x
  • PHP 5.4.x

Solutions

Before installation of the software, please visit the software manufacturer web-site for more details.

  • Update to version 5.4.16 or 5.3.26.

Vulnerability Identifier


Source


Related Link