Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-grwx-x87w-vjjp

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Integer overflow in the zip_read_entry function in PHP 4 before 4.4.5 allows remote attackers to execute arbitrary code via a ZIP archive that contains an entry with a length value of 0xffffffff, which is incremented before use in an emalloc call, triggering a heap overflow.

Integer overflow in the zip_read_entry function in PHP 4 before 4.4.5 allows remote attackers to execute arbitrary code via a ZIP archive that contains an entry with a length value of 0xffffffff, which is incremented before use in an emalloc call, triggering a heap overflow.

EPSS

Процентиль: 94%
0.13862
Средний

Связанные уязвимости

ubuntu
почти 19 лет назад

Integer overflow in the zip_read_entry function in PHP 4 before 4.4.5 allows remote attackers to execute arbitrary code via a ZIP archive that contains an entry with a length value of 0xffffffff, which is incremented before use in an emalloc call, triggering a heap overflow.

nvd
почти 19 лет назад

Integer overflow in the zip_read_entry function in PHP 4 before 4.4.5 allows remote attackers to execute arbitrary code via a ZIP archive that contains an entry with a length value of 0xffffffff, which is incremented before use in an emalloc call, triggering a heap overflow.

debian
почти 19 лет назад

Integer overflow in the zip_read_entry function in PHP 4 before 4.4.5 ...

EPSS

Процентиль: 94%
0.13862
Средний