Users login

Create an account »

JOIN XATRIX

Users login

Home » Hacking News » PHP openlog() buffer overflow

PHP openlog() buffer overflow

by Mario Miri on April 9th, 2003 PHP openlog() function is prone to a buffer overflow attack which may result in denial of service or possibly arbitrary command/code execution. Buffer overflow occurs when parameters with an excessive length are passed to the function.


Vulnerable:
PHP 4.3.1


Exploit / Proof of concept:
http://download.xatrix.org/prf/php-openlog.txt


Solution:
Currently there are no official vendor-provided patches.
Suggested workaround is to disable openlog() function.


Solution:
[email protected]


Newsletter signup

Signup to our monthly newsletter and stay in touch with IT news!

Free E-books

We've got ebooks! But they're not online. :( Please give us a few days to bring downloads back.

Contact

Have something to say or just wanna drop us a line? Please keep this in mind: to spam, we reply with spam.

Contact us »