oss-sec mailing list archives
Re: CVE request: PHP substr_replace() use-after-free
From: Eugene Teo <eugene () redhat com>
Date: Sun, 13 Mar 2011 23:27:29 +0800
On 03/13/2011 10:00 PM, Felipe Pena wrote:
Hi, I just found an use-after-free in PHP's substr_replace() function caused by passing the same variable multiple times to the function, which makes the PHP to use the same pointer in three variables inside the function, so when the pointer is changed by a type conversion inside the function, it invalids the other variables. The PHP security team has seen noticed, and a bug already was filed in the bugtracker (http://bugs.php.net/bug.php?id=54238 [private]) $ sapi/cli/php ../bug.php array(1) { [0]=> string(5) "0Ȅ y" } array(1) { [0]=> string(1) "0" }
Please use CVE-2011-1148. -- main(i) { putchar(182623909 >> (i-1) * 5&31|!!(i<7)<<6) && main(++i); }
Current thread:
- CVE request: PHP substr_replace() use-after-free Felipe Pena (Mar 13)
- Re: CVE request: PHP substr_replace() use-after-free Eugene Teo (Mar 13)
- Re: CVE request: PHP substr_replace() use-after-free Oden Eriksson (Mar 13)
- Re: CVE request: PHP substr_replace() use-after-free Felipe Pena (Mar 13)
- Re: CVE request: PHP substr_replace() use-after-free Vincent Danen (Mar 18)
- Re: CVE request: PHP substr_replace() use-after-free Felipe Pena (Mar 13)