On Sun, Jan 12, 2003 at 12:12:39AM +0100, Sascha Schumann wrote:
>     As many past security advisories have shown, signedness
>     issues are the frequent cause for severe vulnerabilities in
>     software (recent examples include MySQL, OpenBSD kernel).

Actually codes like below produce vulnerble runtimes because
the length of string is expected to be a positive integer value...

int maxlen;
...
if ((int)Z_STRLEN_P(length) > maxlen) {
        RETURN_FALSE;
} 
memcpy(allocated_buf, Z_STRVAL_P(length), Z_STRLEN_P(length));
 
>     Any objections?

No objection from me.

Moriyoshi 

-- 
PHP Development Mailing List <http://www.php.net/>
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to