Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-wxhc-rwm9-xjjx

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Stack-based buffer overflow in the socket_connect function in ext/sockets/sockets.c in PHP 5.3.3 through 5.3.6 might allow context-dependent attackers to execute arbitrary code via a long pathname for a UNIX socket.

Stack-based buffer overflow in the socket_connect function in ext/sockets/sockets.c in PHP 5.3.3 through 5.3.6 might allow context-dependent attackers to execute arbitrary code via a long pathname for a UNIX socket.

EPSS

Процентиль: 98%
0.50514
Средний

Дефекты

CWE-119

Связанные уязвимости

ubuntu
около 14 лет назад

Stack-based buffer overflow in the socket_connect function in ext/sockets/sockets.c in PHP 5.3.3 through 5.3.6 might allow context-dependent attackers to execute arbitrary code via a long pathname for a UNIX socket.

redhat
около 14 лет назад

Stack-based buffer overflow in the socket_connect function in ext/sockets/sockets.c in PHP 5.3.3 through 5.3.6 might allow context-dependent attackers to execute arbitrary code via a long pathname for a UNIX socket.

nvd
около 14 лет назад

Stack-based buffer overflow in the socket_connect function in ext/sockets/sockets.c in PHP 5.3.3 through 5.3.6 might allow context-dependent attackers to execute arbitrary code via a long pathname for a UNIX socket.

debian
около 14 лет назад

Stack-based buffer overflow in the socket_connect function in ext/sock ...

oracle-oval
больше 13 лет назад

ELSA-2011-1423: php53 and php security update (MODERATE)

EPSS

Процентиль: 98%
0.50514
Средний

Дефекты

CWE-119