Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2011-0753

Опубликовано: 06 сент. 2010
Источник: redhat
EPSS Низкий

Описание

Race condition in the PCNTL extension in PHP before 5.3.4, when a user-defined signal handler exists, might allow context-dependent attackers to cause a denial of service (memory corruption) via a large number of concurrent signals.

Отчет

Red Hat does not consider this issue to be a security vulnerability since no trust boundary is crossed. Any process able to send signals to a running PHP process can terminate it by sending a carefully-chosen signal.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 4phpWill not fix
Red Hat Enterprise Linux 5phpWill not fix
Red Hat Enterprise Linux 5php53Will not fix
Red Hat Enterprise Linux 6phpWill not fix

Показывать по

Дополнительная информация

https://bugzilla.redhat.com/show_bug.cgi?id=674705php: race condition when handling many concurrent signals may lead to memory corruption

EPSS

Процентиль: 53%
0.00301
Низкий

Связанные уязвимости

ubuntu
больше 14 лет назад

Race condition in the PCNTL extension in PHP before 5.3.4, when a user-defined signal handler exists, might allow context-dependent attackers to cause a denial of service (memory corruption) via a large number of concurrent signals.

nvd
больше 14 лет назад

Race condition in the PCNTL extension in PHP before 5.3.4, when a user-defined signal handler exists, might allow context-dependent attackers to cause a denial of service (memory corruption) via a large number of concurrent signals.

debian
больше 14 лет назад

Race condition in the PCNTL extension in PHP before 5.3.4, when a user ...

github
около 3 лет назад

Race condition in the PCNTL extension in PHP before 5.3.4, when a user-defined signal handler exists, might allow context-dependent attackers to cause a denial of service (memory corruption) via a large number of concurrent signals.

EPSS

Процентиль: 53%
0.00301
Низкий