Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 670806 - (CVE-2010-4699) CVE-2010-4699 php: iconv_mime_decode_headers skips headers using unsupported encoding
CVE-2010-4699 php: iconv_mime_decode_headers skips headers using unsupported ...
Status: CLOSED NOTABUG
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
Unspecified Unspecified
unspecified Severity unspecified
: ---
: ---
Assigned To: Red Hat Product Security
impact=none,reported=20110118,public=...
: Security
Depends On:
Blocks:
  Show dependency treegraph
 
Reported: 2011-01-19 07:58 EST by Tomas Hoger
Modified: 2015-08-19 05:02 EDT (History)
1 user (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2011-01-20 16:01:59 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Tomas Hoger 2011-01-19 07:58:53 EST
Common Vulnerabilities and Exposures assigned an identifier CVE-2010-4699 to the following issue:

The iconv_mime_decode_headers function in the Iconv extension in PHP
before 5.3.4 does not properly handle encodings that are unrecognized
by the iconv and mbstring (aka Multibyte String) implementations,
which allows remote attackers to trigger an incomplete output array,
and possibly bypass spam detection or have unspecified other impact,
via a crafted Subject header in an e-mail message, as demonstrated by
the ks_c_5601-1987 character set.

References:
http://bugs.php.net/52941
http://www.php.net/ChangeLog-5.php#5.3.4
http://coding.derkeiler.com/Archive/PHP/php.general/2007-04/msg00605.html

Upstream commit:
http://svn.php.net/viewvc/?view=revision&revision=303890
Comment 1 Tomas Hoger 2011-01-20 06:20:54 EST
This looks more like regular bug / enhancement rather than security flaw.  Upstream did not consider this to be security fix, security impacts mentioned the CVE description are fairly vague.

Checking with the upstream SVN test case, this bug occurs when iconv_mime_decode_headers is called with ICONV_MIME_DECODE_CONTINUE_ON_ERROR flag, i.e. when it's asked to continue parsing headers even when some error was detected.  So it's asked to perform a best effort recovery for the malformed input.  When called without this flag set, iconv_mime_decode_headers returns false.

Fixing the code that tries to recover form errors is a bug fix, but it does not seem to qualify as a security fix.  Joe, do you possibly see what I may be missing?
Comment 3 Joe Orton 2011-01-20 07:56:40 EST
No, I don't see any security issue there, I presume it is extrapolated from "skipping spam checks".  Even upstream didn't list this under the security fixes in the 5.3.4 changes.
Comment 4 Tomas Hoger 2011-01-20 16:01:59 EST
Statement:

Red Hat does not consider this issue to be a security vulnerability, rather consider this to be a non-security bug.

Note You need to log in before you can comment on or make changes to this bug.