Описание
Stack-based buffer overflow in the socket_connect function in ext/sockets/sockets.c in PHP 5.3.3 through 5.3.6 might allow context-dependent attackers to execute arbitrary code via a long pathname for a UNIX socket.
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | 5.3.6-13ubuntu1 |
hardy | not-affected | 5.2.4-2ubuntu5.17 |
lucid | released | 5.3.2-1ubuntu4.10 |
maverick | released | 5.3.3-1ubuntu9.6 |
natty | released | 5.3.5-1ubuntu7.3 |
oneiric | not-affected | 5.3.6-13ubuntu1 |
upstream | needs-triage |
Показывать по
EPSS
7.5 High
CVSS2
Связанные уязвимости
Stack-based buffer overflow in the socket_connect function in ext/sockets/sockets.c in PHP 5.3.3 through 5.3.6 might allow context-dependent attackers to execute arbitrary code via a long pathname for a UNIX socket.
Stack-based buffer overflow in the socket_connect function in ext/sockets/sockets.c in PHP 5.3.3 through 5.3.6 might allow context-dependent attackers to execute arbitrary code via a long pathname for a UNIX socket.
Stack-based buffer overflow in the socket_connect function in ext/sock ...
Stack-based buffer overflow in the socket_connect function in ext/sockets/sockets.c in PHP 5.3.3 through 5.3.6 might allow context-dependent attackers to execute arbitrary code via a long pathname for a UNIX socket.
ELSA-2011-1423: php53 and php security update (MODERATE)
EPSS
7.5 High
CVSS2