PECL HTTP: Remote execution of arbitrary code — GLSA 201612-17

A buffer overflow in PECL HTTP might allow remote attackers to execute arbitrary code.

Affected packages

dev-php/pecl-http on all architectures
Affected versions < 2.5.6
Unaffected versions revision >= 2.5.6

Background

This HTTP extension aims to provide a convenient and powerful set of functionality for one of PHPs major applications.

Description

A buffer overflow can be triggered in the URL parsing functions of the PECL HTTP extension. This allows overflowing a buffer with data originating from an arbitrary HTTP request.

Impact

A remote attacker, through a specially crafted URI, could possibly execute arbitrary code with the privileges of the process.

Workaround

There is no known workaround at this time.

Resolution

All PECL HTTP users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=dev-php/pecl-http-2.5.6"
 

References

Release date
December 07, 2016

Latest revision
December 07, 2016: 1

Severity
normal

Exploitable
remote

Bugzilla entries