Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 18 Nov 2008 18:53:07 +0300
From:      Eygene Ryabinkin <rea-fbsd@codelabs.ru>
To:        "Steven M. Christey" <coley@linus.mitre.org>
Cc:        Jille Timmermans <jille@quis.cx>, bug-followup@freebsd.org, freebsd-security@freebsd.org, mloveless@mitre.org, cve@mitre.org, coley@mitre.org
Subject:   Re: ports/128956: [patch] [vuxml] multiple vulnerabilities in PHP 5.2.6
Message-ID:  <HFT9UPqQxMKr5hueUanFpyCwPgI@BWOFZFtpv6375xxU2Y12WR4LQqg>
In-Reply-To: <Pine.GSO.4.51.0811180957530.22800@faron.mitre.org>
References:  <20081118103433.38D5817115@shadow.codelabs.ru> <4922B371.6070002@quis.cx> <TqoTo5jliabZzOUld/zrRy5vtzI@%2BC9avPjAe6kfv7rH%2BxyHzR2RFw8> <4922B6F9.2000408@quis.cx> <9a6isDG2HABVFiTQKRYgHLbugj0@N7cbPDipnvOyJMD9YzFbYf8QNqE> <Pine.GSO.4.51.0811180957530.22800@faron.mitre.org>

next in thread | previous in thread | raw e-mail | index | archive | help

--CxDuMX1Cv2n9FQfo
Content-Type: multipart/mixed; boundary="o7gdRJTuwFmWapyH"
Content-Disposition: inline


--o7gdRJTuwFmWapyH
Content-Type: text/plain; charset=koi8-r
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

Steven,

Tue, Nov 18, 2008 at 10:01:20AM -0500, Steven M. Christey wrote:
> On Tue, 18 Nov 2008, Eygene Ryabinkin wrote:
> It's pretty clear that the description was a typo.  It doesn't follow our
> typical CVE description style of escalating versions when we list version
> ranges.  Most likely I introduced this typo in the original description.
>=20
> I've internally changed it to "5.x through 5.2.6."  This will show up on
> the public CVE web site within a day or two.

OK, thanks a lot!

So, the VuXML entry should be changed accordingly.  New content is
attached.
--=20
Eygene
 _                ___       _.--.   #
 \`.|\..----...-'`   `-._.-'_.-'`   #  Remember that it is hard
 /  ' `         ,       __.--'      #  to read the on-line manual  =20
 )/' _/     \   `-_,   /            #  while single-stepping the kernel.
 `-'" `"\_  ,_.-;_.-\_ ',  fsc/as   #
     _.-'_./   {_.'   ; /           #    -- FreeBSD Developers handbook=20
    {_.-``-'         {_/            #

--o7gdRJTuwFmWapyH
Content-Type: application/xml
Content-Disposition: attachment; filename="vuln.xml"
Content-Transfer-Encoding: quoted-printable

  <vuln vid=3D"">=0A    <topic>PHP 5.x -- buffer overflow in the memnstr()<=
/topic>=0A    <affects>=0A      <package>=0A	<name>php5</name>=0A	<range><l=
t>5.2.6_3</lt></range>=0A      </package>=0A    </affects>=0A    <descripti=
on>=0A      <body xmlns=3D"http://www.w3.org/1999/xhtml">=0A	<p>Entry for C=
VE-2008-3659 says:</p>=0A	<blockquote cite=3D"http://cve.mitre.org/cgi-bin/=
cvename.cgi?name=3DCVE-2008-3659">=0A	<p>Buffer overflow in the memnstr fun=
ction in PHP 4.4.x before=0A	4.4.9 and PHP 5.x through 5.2.6 allows context=
-dependent=0A	attackers to cause a denial of service (crash) and possibly=
=0A	execute arbitrary code via the delimiter argument to the explode=0A	fun=
ction.</p>=0A	<p>NOTE: the scope of this issue is limited since most=0A	app=
lications would not use an attacker-controlled delimiter, but=0A	local atta=
cks against safe_mode are feasible.</p>=0A	</blockquote>=0A      </body>=0A=
    </description>=0A    <references>=0A      <cvename>CVE-2008-3659</cvena=
me>=0A      <url>http://news.php.net/php.cvs/52002</url>=0A      <url>http:=
//www.openwall.com/lists/oss-security/2008/08/08/2</url>=0A    </references=
>=0A    <dates>=0A      <discovery>2008-08-05</discovery>=0A    </dates>=0A=
  </vuln>=0A
--o7gdRJTuwFmWapyH--

--CxDuMX1Cv2n9FQfo
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.9 (FreeBSD)

iEYEARECAAYFAkki5OMACgkQthUKNsbL7Yg/ZACfUBOnoCZnhTol7o/R0AiNLbWt
fzcAoJCykRyPNoySroKYgW0RGvHsH/B5
=u6kz
-----END PGP SIGNATURE-----

--CxDuMX1Cv2n9FQfo--



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?HFT9UPqQxMKr5hueUanFpyCwPgI>