PHP emalloc()未明的整数溢出内存腐败漏洞

漏洞信息详情

PHP emalloc()未明的整数溢出内存腐败漏洞

漏洞简介

PHP 4.3.2之前版本的emalloc()函数存在整数符号错误漏洞。远程攻击者借助如(1)socket_recv,(2)socket_recvfrom,和可能其他函数的负参数导致服务拒绝(内存消耗)且可能执行任意代码。

漏洞公告

SCO has released security advisory CSSA-2003-SCO.28 with fixes and specific resolution steps. The advisory addresses this issue in OpenServer 5.0.5 through 5.0.7.

参考网址

来源: BID
名称: 7198
链接:http://www.securityfocus.com/bid/7198

来源: BID
名称: 7197
链接:http://www.securityfocus.com/bid/7197

来源: BUGTRAQ
名称: 20030326 @(#)Mordred Labs advisory – Integer overflow in PHP memory allocator
链接:http://marc.theaimsgroup.com/?l=bugtraq&m=104869828526885&w=2

来源: BUGTRAQ
名称: 20030402 Inaccurate Reports Concerning PHP Vulnerabilities
链接:http://marc.theaimsgroup.com/?l=bugtraq&m=104931415307111&w=2

来源: BUGTRAQ
名称: 20030327 RE: FUD-ALARM: @(#)Mordred Labs advisory – Integer overflow in PHP memory allocator
链接:http://marc.theaimsgroup.com/?l=bugtraq&m=104878100719467&w=2

来源: CONECTIVA
名称: CLSA-2003:691
链接:http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000691

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享