Описание
PHP 4.0.0 through 4.4.6 and 5.0.0 through 5.2.1 allows context-dependent attackers to read arbitrary memory locations via an interruption that triggers a user space error handler that changes a parameter to an arbitrary pointer, as demonstrated via the iptcembed function, which calls certain convert_to_* functions with its input parameters.
Релиз | Статус | Примечание |
---|---|---|
dapper | ignored | end of life |
devel | DNE | |
edgy | ignored | end of life, was needed |
feisty | DNE | |
gutsy | DNE | |
hardy | DNE | |
intrepid | DNE | |
jaunty | DNE | |
karmic | DNE | |
upstream | needs-triage |
Показывать по
Ссылки на источники
EPSS
7.8 High
CVSS2
Связанные уязвимости
PHP 4.0.0 through 4.4.6 and 5.0.0 through 5.2.1 allows context-dependent attackers to read arbitrary memory locations via an interruption that triggers a user space error handler that changes a parameter to an arbitrary pointer, as demonstrated via the iptcembed function, which calls certain convert_to_* functions with its input parameters.
PHP 4.0.0 through 4.4.6 and 5.0.0 through 5.2.1 allows context-depende ...
PHP 4.0.0 through 4.4.6 and 5.0.0 through 5.2.1 allows context-dependent attackers to read arbitrary memory locations via an interruption that triggers a user space error handler that changes a parameter to an arbitrary pointer, as demonstrated via the iptcembed function, which calls certain convert_to_* functions with its input parameters.
EPSS
7.8 High
CVSS2