Buffer overflow in the strval function in PHP before 5.3.6, when the precision configuration option has a large value, might allow context-dependent attackers to cause a denial of service (application crash) via a small numerical value in the argument.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:26
Type | Values Removed | Values Added |
---|---|---|
References | () http://bugs.php.net/bug.php?id=54055 - Exploit | |
References | () http://marc.info/?l=bugtraq&m=133469208622507&w=2 - | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2011:052 - | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2011:053 - | |
References | () http://www.php.net/ChangeLog-5.php - | |
References | () http://www.php.net/archive/2011.php - | |
References | () http://www.php.net/releases/5_3_6.php - | |
References | () http://www.vupen.com/english/advisories/2011/0744 - |
Information
Published : 2011-03-20 02:00
Updated : 2024-11-21 01:26
NVD link : CVE-2011-1464
Mitre link : CVE-2011-1464
CVE.ORG link : CVE-2011-1464
JSON object : View
Products Affected
php
- php
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer