  <vuln vid="">
    <topic>PHP 5.x -- buffer overflow in the memnstr()</topic>
    <affects>
      <package>
	<name>php5</name>
	<range><lt>5.2.6_3</lt></range>
      </package>
    </affects>
    <description>
      <body xmlns="http://www.w3.org/1999/xhtml">
	<p>Entry for CVE-2008-3659 says:</p>
	<blockquote cite="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3659">
	<p>Buffer overflow in the memnstr function in PHP 4.4.x before
	4.4.9 and PHP 5.x through 5.2.6 allows context-dependent
	attackers to cause a denial of service (crash) and possibly
	execute arbitrary code via the delimiter argument to the explode
	function.</p>
	<p>NOTE: the scope of this issue is limited since most
	applications would not use an attacker-controlled delimiter, but
	local attacks against safe_mode are feasible.</p>
	</blockquote>
      </body>
    </description>
    <references>
      <cvename>CVE-2008-3659</cvename>
      <url>http://news.php.net/php.cvs/52002</url>
      <url>http://www.openwall.com/lists/oss-security/2008/08/08/2</url>
    </references>
    <dates>
      <discovery>2008-08-05</discovery>
    </dates>
  </vuln>
