Описание
Integer overflow in ext/shmop/shmop.c in PHP before 5.3.6 allows context-dependent attackers to cause a denial of service (crash) and possibly read sensitive memory via a large third argument to the shmop_read function.
Отчет
Red Hat does not consider this to be a security issue. Input passed to these functions should be under the full control of the script author, thus no trust boundary is crossed. Additionally, an administrator would have to disable, or excessively increase the memory_limit settings in the PHP configuration file to trigger this bug.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 4 | php | Not affected | ||
Red Hat Enterprise Linux 5 | php | Not affected | ||
Red Hat Enterprise Linux 6 | php | Not affected |
Показывать по
Дополнительная информация
5.1 Medium
CVSS2
Связанные уязвимости
Integer overflow in ext/shmop/shmop.c in PHP before 5.3.6 allows context-dependent attackers to cause a denial of service (crash) and possibly read sensitive memory via a large third argument to the shmop_read function.
Integer overflow in ext/shmop/shmop.c in PHP before 5.3.6 allows context-dependent attackers to cause a denial of service (crash) and possibly read sensitive memory via a large third argument to the shmop_read function.
Integer overflow in ext/shmop/shmop.c in PHP before 5.3.6 allows conte ...
Integer overflow in ext/shmop/shmop.c in PHP before 5.3.6 allows context-dependent attackers to cause a denial of service (crash) and possibly read sensitive memory via a large third argument to the shmop_read function.
Уязвимость компонента ext/shmop/shmop.c интерпретатора языка программирования PHP, позволяющая нарушителю вызвать отказ в обслуживании или раскрыть защищаемую информацию
5.1 Medium
CVSS2