CVE-2014-4049
18.06.2014, 19:55
Heap-based buffer overflow in the php_parserr function in ext/standard/dns.c in PHP 5.6.0beta4 and earlier allows remote servers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted DNS TXT record, related to the dns_get_record function.Enginsight
Vendor | Product | Version |
---|---|---|
opensuse | opensuse | 11.3 |
php | php | 5.3.0 ≤ 𝑥 < 5.3.29 |
php | php | 5.4.0 ≤ 𝑥 < 5.4.30 |
php | php | 5.5.0 ≤ 𝑥 < 5.5.14 |
php | php | 5.6.0:alpha1 |
php | php | 5.6.0:alpha2 |
php | php | 5.6.0:alpha3 |
php | php | 5.6.0:alpha4 |
php | php | 5.6.0:alpha5 |
php | php | 5.6.0:beta1 |
php | php | 5.6.0:beta2 |
php | php | 5.6.0:beta3 |
debian | debian_linux | 7.0 |
debian | debian_linux | 8.0 |
𝑥
= Vulnerable software versions

Ubuntu Releases
Common Weakness Enumeration
References