Описание
Buffer overflow in the strval function in PHP before 5.3.6, when the precision configuration option has a large value, might allow context-dependent attackers to cause a denial of service (application crash) via a small numerical value in the argument.
Релиз | Статус | Примечание |
---|---|---|
dapper | released | 5.1.2-1ubuntu3.22 |
devel | not-affected | 5.3.5-1ubuntu7.2 |
hardy | released | 5.2.4-2ubuntu5.15 |
karmic | released | 5.2.10.dfsg.1-2ubuntu6.9 |
lucid | released | 5.3.2-1ubuntu4.8 |
maverick | released | 5.3.3-1ubuntu9.4 |
natty | released | 5.3.5-1ubuntu7.1 |
upstream | released | 5.3.6 |
Показывать по
EPSS
4.3 Medium
CVSS2
Связанные уязвимости
Buffer overflow in the strval function in PHP before 5.3.6, when the precision configuration option has a large value, might allow context-dependent attackers to cause a denial of service (application crash) via a small numerical value in the argument.
Buffer overflow in the strval function in PHP before 5.3.6, when the precision configuration option has a large value, might allow context-dependent attackers to cause a denial of service (application crash) via a small numerical value in the argument.
Buffer overflow in the strval function in PHP before 5.3.6, when the p ...
Buffer overflow in the strval function in PHP before 5.3.6, when the precision configuration option has a large value, might allow context-dependent attackers to cause a denial of service (application crash) via a small numerical value in the argument.
Уязвимость функции strval интерпретатора языка программирования PHP, позволяющая нарушителю вызвать отказ в обслуживании
EPSS
4.3 Medium
CVSS2