Описание
Buffer overflow in the strval function in PHP before 5.3.6, when the precision configuration option has a large value, might allow context-dependent attackers to cause a denial of service (application crash) via a small numerical value in the argument.
Buffer overflow in the strval function in PHP before 5.3.6, when the precision configuration option has a large value, might allow context-dependent attackers to cause a denial of service (application crash) via a small numerical value in the argument.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2011-1464
- http://bugs.php.net/bug.php?id=54055
- http://marc.info/?l=bugtraq&m=133469208622507&w=2
- http://www.mandriva.com/security/advisories?name=MDVSA-2011:052
- http://www.mandriva.com/security/advisories?name=MDVSA-2011:053
- http://www.php.net/ChangeLog-5.php
- http://www.php.net/archive/2011.php
- http://www.php.net/releases/5_3_6.php
- http://www.vupen.com/english/advisories/2011/0744
Связанные уязвимости
Buffer overflow in the strval function in PHP before 5.3.6, when the precision configuration option has a large value, might allow context-dependent attackers to cause a denial of service (application crash) via a small numerical value in the argument.
Buffer overflow in the strval function in PHP before 5.3.6, when the precision configuration option has a large value, might allow context-dependent attackers to cause a denial of service (application crash) via a small numerical value in the argument.
Buffer overflow in the strval function in PHP before 5.3.6, when the precision configuration option has a large value, might allow context-dependent attackers to cause a denial of service (application crash) via a small numerical value in the argument.
Buffer overflow in the strval function in PHP before 5.3.6, when the p ...
Уязвимость функции strval интерпретатора языка программирования PHP, позволяющая нарушителю вызвать отказ в обслуживании