HTTP: PHP apache_request_headers Buffer Overflow

This signature detects attempts to exploit a known vulnerability in PHP. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the targeted application. Failed exploit attempts can result in a denial-of-service condition.

Extended Description

PHP is prone to a buffer-overflow vulnerability because it fails to perform boundary checks before copying user-supplied data to insufficiently sized memory buffers. An attacker can exploit this issue to execute arbitrary machine code in the context of the PHP process. Failed exploit attempts will likely crash the webserver, denying service to legitimate users.

Affected Products

Php php

Short Name
HTTP:PHP:APACHE-RQST-HEADER-BO
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
Buffer CVE-2012-2329 Overflow PHP apache_request_headers bid:53455
Release Date
07/30/2012
Supported Platforms

srx-branch-19.3

vsrx3bsd-19.2

srx-19.4

vsrx3bsd-19.4

srx-branch-19.4

vsrx-19.4

vsrx-19.2

srx-19.3

srx-branch-12.3

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx-12.3

vmx-19.3

srx-12.3

Sigpack Version
3375
False Positive
Unknown
Vendors

Php

CVSS Score

5.0

Found a potential security threat?