CVE-2011-1938
Published: 31 May 2011
Stack-based buffer overflow in the socket_connect function in ext/sockets/sockets.c in PHP 5.3.3 through 5.3.6 might allow context-dependent attackers to execute arbitrary code via a long pathname for a UNIX socket.
Notes
Author | Note |
---|---|
jdstrand | PoC in http://www.exploit-db.com/exploits/17318/ stack-protector should reduce to DoS, downgrading to low |
mdeslaur | says 5.3.3, but reproducer works on lucid also another PoC: http://www.exploit-db.com/exploits/17486/ |
Priority
Status
Package | Release | Status |
---|---|---|
php5 Launchpad, Ubuntu, Debian |
hardy |
Not vulnerable
(5.2.4-2ubuntu5.17)
|
lucid |
Released
(5.3.2-1ubuntu4.10)
|
|
maverick |
Released
(5.3.3-1ubuntu9.6)
|
|
natty |
Released
(5.3.5-1ubuntu7.3)
|
|
oneiric |
Not vulnerable
(5.3.6-13ubuntu1)
|
|
upstream |
Needs triage
|
|
Patches: upstream: http://svn.php.net/viewvc?view=revision&revision=311369 upstream: http://svn.php.net/viewvc?view=revision&revision=311370 debdiff: https://launchpad.net/bugs/813110 |
||
This vulnerability is mitigated in part by the use of gcc's stack protector in Ubuntu. |