Vigil@nce - PHP: denial of service via phar_make_dirstream
October 2015 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can force an invalid pointer to be dereferenced in the
phar_make_dirstream() function of PHP, in order to trigger a
denial of service.
Impacted products: Fedora, PHP.
Severity: 1/4.
Creation date: 05/10/2015.
DESCRIPTION OF THE VULNERABILITY
The phar extension can be installed on PHP.
However, when the phar_make_dirstream() function processes a ZIP
archive containing the "/" file, it does not check if a pointer is
valid, before using it.
An attacker can therefore force an invalid pointer to be
dereferenced in the phar_make_dirstream() function of PHP, in
order to trigger a denial of service.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/PHP-denial-of-service-via-phar-make-dirstream-18041