Vigil@nce - PHP: memory corruption via phar_tar_process_metadata
July 2015 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can generate a memory corruption in the
phar_tar_process_metadata() function of PHP, in order to trigger a
denial of service, and possibly to execute code.
Impacted products: PHP, RHEL
Severity: 2/4
Creation date: 18/05/2015
DESCRIPTION OF THE VULNERABILITY
The PHP product uses the Phar extension to manipulate PHP archives.
However, a malformed archive misaligns a memory address of 4 bytes
in the phar_tar_process_metadata() function.
An attacker can therefore generate a memory corruption in the
phar_tar_process_metadata() function of PHP, in order to trigger a
denial of service, and possibly to execute code.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/PHP-memory-corruption-via-phar-tar-process-metadata-16914