Описание
Buffer overflow in the snmpget function in the snmp extension in PHP 5.2.3 and earlier, including PHP 4.4.6 and probably other PHP 4 versions, allows context-dependent attackers to execute arbitrary code via a long value in the third argument (object id).
Buffer overflow in the snmpget function in the snmp extension in PHP 5.2.3 and earlier, including PHP 4.4.6 and probably other PHP 4 versions, allows context-dependent attackers to execute arbitrary code via a long value in the third argument (object id).
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2007-1413
- https://exchange.xforce.ibmcloud.com/vulnerabilities/35517
- https://www.exploit-db.com/exploits/3439
- https://www.exploit-db.com/exploits/4204
- http://retrogod.altervista.org/php_446_snmpget_local_bof.html
- http://secunia.com/advisories/24440
- http://www.securityfocus.com/bid/22893
Связанные уязвимости
Buffer overflow in the snmpget function in the snmp extension in PHP 5.2.3 and earlier, including PHP 4.4.6 and probably other PHP 4 versions, allows context-dependent attackers to execute arbitrary code via a long value in the third argument (object id).
Buffer overflow in the snmpget function in the snmp extension in PHP 5.2.3 and earlier, including PHP 4.4.6 and probably other PHP 4 versions, allows context-dependent attackers to execute arbitrary code via a long value in the third argument (object id).
Buffer overflow in the snmpget function in the snmp extension in PHP 5 ...