PHP 'str_transliterate()' Buffer Overflow Vulnerability
BID:39185
Info
PHP 'str_transliterate()' Buffer Overflow Vulnerability
| Bugtraq ID: | 39185 |
| Class: | Boundary Condition Error |
| CVE: | |
| Remote: | Yes |
| Local: | No |
| Published: | Apr 04 2010 12:00AM |
| Updated: | Apr 13 2010 01:23PM |
| Credit: | Pr0T3cT10n |
| Vulnerable: |
PHP PHP 6.0 dev |
| Not Vulnerable: | |
Discussion
PHP 'str_transliterate()' Buffer Overflow Vulnerability
PHP is prone to a buffer-overflow vulnerability.
Successful exploits may allow an attacker to execute arbitrary code in the context of the application. Failed exploit attempts may result in a denial-of-service condition.
PHP 6.0 dev is affected; other versions may also be vulnerable.
PHP is prone to a buffer-overflow vulnerability.
Successful exploits may allow an attacker to execute arbitrary code in the context of the application. Failed exploit attempts may result in a denial-of-service condition.
PHP 6.0 dev is affected; other versions may also be vulnerable.
Exploit / POC
PHP 'str_transliterate()' Buffer Overflow Vulnerability
The following exploits are available:
The following exploits are available:
Solution / Fix
PHP 'str_transliterate()' Buffer Overflow Vulnerability
Solution:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of any more recent information, please mail us at: [email protected].
Solution:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of any more recent information, please mail us at: [email protected].