Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2012-2376

Опубликовано: 19 мая 2012
Источник: redhat
CVSS2: 5.1
EPSS Средний

Описание

Buffer overflow in the com_print_typeinfo function in PHP 5.4.3 and earlier on Windows allows remote attackers to execute arbitrary code via crafted arguments that trigger incorrect handling of COM object VARIANT types, as exploited in the wild in May 2012.

Отчет

Not vulnerable. This flaw is specific to PHP instances, running on Microsoft Windows platform.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5phpNot affected
Red Hat Enterprise Linux 5php53Not affected
Red Hat Enterprise Linux 6phpNot affected

Показывать по

Дополнительная информация

Статус:

Low
https://bugzilla.redhat.com/show_bug.cgi?id=823464php: Buffer overflow in com_print_typeinfo() by parsing certain variant types

EPSS

Процентиль: 96%
0.25766
Средний

5.1 Medium

CVSS2

Связанные уязвимости

ubuntu
около 13 лет назад

Buffer overflow in the com_print_typeinfo function in PHP 5.4.3 and earlier on Windows allows remote attackers to execute arbitrary code via crafted arguments that trigger incorrect handling of COM object VARIANT types, as exploited in the wild in May 2012.

nvd
около 13 лет назад

Buffer overflow in the com_print_typeinfo function in PHP 5.4.3 and earlier on Windows allows remote attackers to execute arbitrary code via crafted arguments that trigger incorrect handling of COM object VARIANT types, as exploited in the wild in May 2012.

debian
около 13 лет назад

Buffer overflow in the com_print_typeinfo function in PHP 5.4.3 and ea ...

github
около 3 лет назад

Buffer overflow in the com_print_typeinfo function in PHP 5.4.3 and earlier on Windows allows remote attackers to execute arbitrary code via crafted arguments that trigger incorrect handling of COM object VARIANT types, as exploited in the wild in May 2012.

EPSS

Процентиль: 96%
0.25766
Средний

5.1 Medium

CVSS2