Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-m9qm-qw9j-xw5h

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The php_mysqlnd_read_error_from_line function in the Mysqlnd extension in PHP 5.3 through 5.3.2 does not properly calculate a buffer length, which allows context-dependent attackers to trigger a heap-based buffer overflow via crafted inputs that cause a negative length value to be used.

The php_mysqlnd_read_error_from_line function in the Mysqlnd extension in PHP 5.3 through 5.3.2 does not properly calculate a buffer length, which allows context-dependent attackers to trigger a heap-based buffer overflow via crafted inputs that cause a negative length value to be used.

EPSS

Процентиль: 57%
0.00349
Низкий

Дефекты

CWE-119

Связанные уязвимости

ubuntu
почти 15 лет назад

The php_mysqlnd_read_error_from_line function in the Mysqlnd extension in PHP 5.3 through 5.3.2 does not properly calculate a buffer length, which allows context-dependent attackers to trigger a heap-based buffer overflow via crafted inputs that cause a negative length value to be used.

redhat
около 15 лет назад

The php_mysqlnd_read_error_from_line function in the Mysqlnd extension in PHP 5.3 through 5.3.2 does not properly calculate a buffer length, which allows context-dependent attackers to trigger a heap-based buffer overflow via crafted inputs that cause a negative length value to be used.

nvd
почти 15 лет назад

The php_mysqlnd_read_error_from_line function in the Mysqlnd extension in PHP 5.3 through 5.3.2 does not properly calculate a buffer length, which allows context-dependent attackers to trigger a heap-based buffer overflow via crafted inputs that cause a negative length value to be used.

debian
почти 15 лет назад

The php_mysqlnd_read_error_from_line function in the Mysqlnd extension ...

EPSS

Процентиль: 57%
0.00349
Низкий

Дефекты

CWE-119