ID: 10167
Updated by: elixer
Reported By: [EMAIL PROTECTED]
Old-Status: Open
Status: Closed
Bug Type: Unknown/Other Function
Assigned To: 
Comments:

Updated in CVS.  Thank you for your report.

Sean

Previous Comments:
---------------------------------------------------------------------------

[2001-04-04 14:15:42] [EMAIL PROTECTED]
When i was looking through the CVS version of php, i discovered the following piece of 
code in skeleton.c

---snip---

PHP_FUNCTION(confirm_extname_compiled)
{
        zval **arg;
        int len;
        char string[256];
...
...
...
len = sprintf(string, "Congratulations, you have successfully modified ....
t/extname/config.m4, module %s is compiled into PHP", Z_STRVAL_PP(arg));

---snap---

of course the sprintf could be used to perform a standart bufferoverflow. It should be 
better changed into ... %.50s ... or similiar to do not create a potential 
vulnerability.

As far as i can see ircg and cybermut sources still have the compile confirmation in 
them...

ciao,
Stefan Esser


---------------------------------------------------------------------------



ATTENTION! Do NOT reply to this email!
To reply, use the web interface found at http://bugs.php.net/?id=10167&edit=2


-- 
PHP Development Mailing List <http://www.php.net/>
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]
To contact the list administrators, e-mail: [EMAIL PROTECTED]

Reply via email to