Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2011-0753

Опубликовано: 06 сент. 2010
Источник: redhat
EPSS Низкий

Описание

Race condition in the PCNTL extension in PHP before 5.3.4, when a user-defined signal handler exists, might allow context-dependent attackers to cause a denial of service (memory corruption) via a large number of concurrent signals.

Отчет

Red Hat does not consider this issue to be a security vulnerability since no trust boundary is crossed. Any process able to send signals to a running PHP process can terminate it by sending a carefully-chosen signal.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 4phpWill not fix
Red Hat Enterprise Linux 5phpWill not fix
Red Hat Enterprise Linux 5php53Will not fix
Red Hat Enterprise Linux 6phpWill not fix

Показывать по

Дополнительная информация

https://bugzilla.redhat.com/show_bug.cgi?id=674705php: race condition when handling many concurrent signals may lead to memory corruption

EPSS

Процентиль: 66%
0.00526
Низкий

Связанные уязвимости

ubuntu
около 15 лет назад

Race condition in the PCNTL extension in PHP before 5.3.4, when a user-defined signal handler exists, might allow context-dependent attackers to cause a denial of service (memory corruption) via a large number of concurrent signals.

nvd
около 15 лет назад

Race condition in the PCNTL extension in PHP before 5.3.4, when a user-defined signal handler exists, might allow context-dependent attackers to cause a denial of service (memory corruption) via a large number of concurrent signals.

debian
около 15 лет назад

Race condition in the PCNTL extension in PHP before 5.3.4, when a user ...

github
больше 3 лет назад

Race condition in the PCNTL extension in PHP before 5.3.4, when a user-defined signal handler exists, might allow context-dependent attackers to cause a denial of service (memory corruption) via a large number of concurrent signals.

EPSS

Процентиль: 66%
0.00526
Низкий