|
php.net | support | documentation | report a bug | advanced search | search howto | statistics | random bug | login |
PatchesPull RequestsHistoryAllCommentsChangesGit/SVN commits
[2001-04-06 11:00 UTC] elixer@php.net
|
|||||||||||||||||||||||||||
Copyright © 2001-2025 The PHP GroupAll rights reserved. |
Last updated: Tue Oct 28 04:00:01 2025 UTC |
When i was looking through the CVS version of php, i discovered the following piece of code in skeleton.c ---snip--- PHP_FUNCTION(confirm_extname_compiled) { zval **arg; int len; char string[256]; ... ... ... len = sprintf(string, "Congratulations, you have successfully modified .... t/extname/config.m4, module %s is compiled into PHP", Z_STRVAL_PP(arg)); ---snap--- of course the sprintf could be used to perform a standart bufferoverflow. It should be better changed into ... %.50s ... or similiar to do not create a potential vulnerability. As far as i can see ircg and cybermut sources still have the compile confirmation in them... ciao, Stefan Esser