Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2011-1938

Опубликовано: 31 мая 2011
Источник: ubuntu
Приоритет: low
EPSS Средний
CVSS2: 7.5

Описание

Stack-based buffer overflow in the socket_connect function in ext/sockets/sockets.c in PHP 5.3.3 through 5.3.6 might allow context-dependent attackers to execute arbitrary code via a long pathname for a UNIX socket.

РелизСтатусПримечание
devel

not-affected

5.3.6-13ubuntu1
hardy

not-affected

5.2.4-2ubuntu5.17
lucid

released

5.3.2-1ubuntu4.10
maverick

released

5.3.3-1ubuntu9.6
natty

released

5.3.5-1ubuntu7.3
oneiric

not-affected

5.3.6-13ubuntu1
upstream

needs-triage

Показывать по

EPSS

Процентиль: 98%
0.50514
Средний

7.5 High

CVSS2

Связанные уязвимости

redhat
около 14 лет назад

Stack-based buffer overflow in the socket_connect function in ext/sockets/sockets.c in PHP 5.3.3 through 5.3.6 might allow context-dependent attackers to execute arbitrary code via a long pathname for a UNIX socket.

nvd
около 14 лет назад

Stack-based buffer overflow in the socket_connect function in ext/sockets/sockets.c in PHP 5.3.3 through 5.3.6 might allow context-dependent attackers to execute arbitrary code via a long pathname for a UNIX socket.

debian
около 14 лет назад

Stack-based buffer overflow in the socket_connect function in ext/sock ...

github
около 3 лет назад

Stack-based buffer overflow in the socket_connect function in ext/sockets/sockets.c in PHP 5.3.3 through 5.3.6 might allow context-dependent attackers to execute arbitrary code via a long pathname for a UNIX socket.

oracle-oval
больше 13 лет назад

ELSA-2011-1423: php53 and php security update (MODERATE)

EPSS

Процентиль: 98%
0.50514
Средний

7.5 High

CVSS2