Ravens PHP Scripts

PHP *sscanf()* Code Execution Safe Mode Bypass
Date: Tuesday, August 08, 2006 @ 12:10:48 UTC
Topic: Security


TITLE: PHP "sscanf()" Code Execution Safe Mode Bypass

SECUNIA ADVISORY ID: SA21403

VERIFY ADVISORY: http://secunia.com/advisories/21403/

CRITICAL: Less critical

IMPACT: Security Bypass

WHERE: Local system

SOFTWARE:
PHP 4.4.x -- http://secunia.com/product/5768/
PHP 5.1.x -- http://secunia.com/product/6796/

DESCRIPTION: Heintz has discovered a vulnerability in PHP, which potentially can be exploited by malicious, local users to bypass certain security restrictions. The vulnerability is caused due to an array boundary error in the "sscanf()" PHP function in the processing of the "$1s" format specifier. This can be exploited to reference freed memory by passing an variable as argument which has been unset. Successful exploitation may e.g. allow bypass of the safe mode protection by executing arbitrary code. The vulnerability has been confirmed in versions 5.1.4 and 4.4.3. Other versions may also be affected.

SOLUTION: The vulnerability has been fixed in the CVS repository. Grant only trusted users access to affected systems.

PROVIDED AND/OR DISCOVERED BY: Heintz

ORIGINAL ADVISORY: http://bugs.php.net/bug.php?id=38322








This article comes from Ravens PHP Scripts
https://www.ravenphpscripts.com

The URL for this story is:
https://www.ravenphpscripts.com/modules.php?name=News&file=article&sid=2298