The array_fill function in ext/standard/array.c in PHP 4.4.2 and 5.1.2 allows context-dependent attackers to cause a denial of service (memory consumption) via a large num value.
References
Link | Resource |
---|---|
http://securitytracker.com/id?1015979 | Exploit |
http://www.infigo.hr/hr/in_focus/advisories/INFIGO-2006-04-02 | Exploit Vendor Advisory |
http://www.osvdb.org/24945 | |
http://securitytracker.com/id?1015979 | Exploit |
http://www.infigo.hr/hr/in_focus/advisories/INFIGO-2006-04-02 | Exploit Vendor Advisory |
http://www.osvdb.org/24945 |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:24
Type | Values Removed | Values Added |
---|---|---|
References | () http://securitytracker.com/id?1015979 - Exploit | |
References | () http://www.infigo.hr/hr/in_focus/advisories/INFIGO-2006-04-02 - Exploit, Vendor Advisory | |
References | () http://www.osvdb.org/24945 - |
Information
Published : 2007-05-24 02:30
Updated : 2024-11-21 00:24
NVD link : CVE-2006-7205
Mitre link : CVE-2006-7205
CVE.ORG link : CVE-2006-7205
JSON object : View
Products Affected
php_group
- php
CWE