Users login

Create an account »


Users login

Home » Hacking News » PHP openlog() buffer overflow

PHP openlog() buffer overflow

by Mario Miri on April 9th, 2003 PHP openlog() function is prone to a buffer overflow attack which may result in denial of service or possibly arbitrary command/code execution. Buffer overflow occurs when parameters with an excessive length are passed to the function.

PHP 4.3.1

Exploit / Proof of concept:

Currently there are no official vendor-provided patches.
Suggested workaround is to disable openlog() function.

[email protected]

Newsletter signup

Signup to our monthly newsletter and stay in touch with IT news!

Free E-books

We've got ebooks! But they're not online. :( Please give us a few days to bring downloads back.


Have something to say or just wanna drop us a line? Please keep this in mind: to spam, we reply with spam.

Contact us »