What's new

News New 28 year old Php/gnu c buffer overflow vulnerability.

  • SNBForums Code of Conduct

    SNBForums is a community for everyone, no matter what their level of experience.

    Please be tolerant and patient of others, especially newcomers. We are all here to share and learn!

    The rules are simple: Be patient, be nice, be helpful or be gone!

DJones

Very Senior Member

Breakdown of vulnerability. (Not sponsored):


Note that php is not in the asuswrt-merlin firmware, but can be installed via entware.
 
Sounds like this is Linux based so I assume it does not apply to Pfsense not being Linux based.

I believe in this instance that is correct. PFsense and OPNsense are FreeBSD based.
 
Note that PHP is only a mean to exploit the issue, the core of the issue is in glibc itself. But I guess since nobody knows what glibc but a lot of people have heard of PHP, it got publicized that way...

That same PHP would probably be safe if your platform used musl.
 
Note that PHP is only a mean to exploit the issue, the core of the issue is in glibc itself. But I guess since nobody knows what glibc but a lot of people have heard of PHP, it got publicized that way...

That same PHP would probably be safe if your platform used musl.

Yeah - this is one of those classic stack-smashing things, and it's not just on glibc or php... it's a common risk.

It could happen on a device that uses MUSL if the binaries statically link to a glibc, libc, or uclibc that doesn't have protection there...

 

Latest threads

Support SNBForums w/ Amazon

If you'd like to support SNBForums, just use this link and buy anything on Amazon. Thanks!

Sign Up For SNBForums Daily Digest

Get an update of what's new every day delivered to your mailbox. Sign up here!
Top