- Multiple denial of service vulnerabilities in PHP -
    Oxygen3 24h-365d, by Panda Software (http://www.pandasoftware.com)

MADRID, April 7, 2005 - iDefense has reported multiple denial of service
vulnerabilities in the PHP scripting language, which could allow an attacker
to crash the system.

The problem lies in how the routines php_handle_iff() and php_handle_jpeg()
handle the PHP function getimagesize(), which is used to determine the size
and dimensions of a large number of image formats, including GIF, JPG, PNG,
TIFF, etc.

The first flaw lies in the php_handle_iff() function, defined in
ext/standard/image.c, and could allow a remote attacker to use up all of the
CPU resources, resulting in a denial of service. 

The second vulnerability is due to insufficient validation of JPEG file
headers in the php_handle_jpeg() function, also defined in
ext/standard/image.c. This format contains a length field that could be
manipulated to cause an infinite loop on copying file data to memory.

These vulnerabilities could be exploited by unauthenticated remote users to
consume 100 percent of the CPU resources on vulnerable systems. To do this,
an attacker can supply a malicious image to the getimagesize() PHP routine.
The getimagesize() PHP routine is frequently used when handling
user-supplied image uploads, which increases the probability of a success
attack.

The original security advisory about these vulnerabilities is available at:
http://www.idefense.com/application/poi/display?id=222&type=vulnerabilities&;
flashstatus=true

-- 
No virus found in this outgoing message.
Checked by AVG Anti-Virus.
Version: 7.0.308 / Virus Database: 266.9.4 - Release Date: 4/6/2005
 

-- 
PHP General Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to