Innovate faster and cut risk with PHP experts from Zend Services.
Explore Services
See How Zend Helps Leading Hosting Providers Keep Their Managed Sites on Secure PHP
Read More
Learn PHP from PHP experts with free, on-demand, and instructor led courses.
Explore Training
Submit support requests and browse self-service resources.
Explore Support
iconv Buffer Overflow in Specific Character Set Conversions
A bug in glibc 2.39 and older was uncovered whereby a buffer overflow in character set conversions specifically to ISO-2022-CN-EXT can result in remote code execution.
This is exploitable in PHP; however, the bug is not specific to PHP, nor is it directly exploitable remotely. It can only be exploited in PHP via calls to iconv functions or filters with user-supplied character sets.
Windows distributions are not affected.
Applications are not vulnerable if:
gconv-modules-extra.conf
If you MUST use a user-supplied character set with iconv functions and filters, we recommend using an allow list or, at the very least, excluding the ISO-2022-CN-EXT character set from usage.
If your Linux distribution has not published patches for glibc, a workaround is described in GLIBC Vulnerability on Servers Serving PHP, detailing how to remove the character set from your glibc distribution.
Because this vulnerability is not in PHP itself, no patches have been or will be issued. It is up to organizations deploying PHP to ensure that their underlying operating system is patched or has mitigations in place.
Direct link to CVE-2024-2961 >
< View all CVEs