Release date:
Updated on:
Affected Systems:
PHP 5.3.3
PHP 5.3.2
PHP 5.3.1
PHP 5.3
Unaffected system:
PHP 5.3.4
Description:
--------------------------------------------------------------------------------
Bugtraq id: 45338
PHP is a widely used scripting language. It is especially suitable for Web development and can be embedded into HTML.
PHP implementation has a vulnerability. Attackers can exploit this vulnerability to execute arbitrary machine code in the PHP process, resulting in Web server crash and DoS attacks.
This vulnerability occurs because the application fails to perform sufficient boundary checks on user input. In versions earlier than 5.3.4, php gd extension does not correctly verify the number of anti-aliasing steps passed to the imagepstext function. The value must be 4 or 16. To hold these values, the 16-digit array aa is located in the stack. Fill the array before the verification step is completed, which will cause stack-based buffer overflow.
<* Source: Martin Barbella
Link: http://seclists.org/fulldisclosure/2010/Dec/180
*>
Test method:
--------------------------------------------------------------------------------
Alert
The following procedures (methods) may be offensive and are intended only for security research and teaching. Users are at your own risk!
Http://www.securityfocus.com/data/vulnerabilities/exploits/45338.php
Suggestion:
--------------------------------------------------------------------------------
Vendor patch:
PHP
---
The vendor has released a patch to fix this security problem. Please download it from the vendor's homepage:
Http://www.php.net