Buffer overflow in the com_print_typeinfo function in PHP 5.4.3 and earlier on Windows allows remote attackers to execute arbitrary code via crafted arguments that trigger incorrect handling of COM object VARIANT types, as exploited in the wild in May 2012.
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 01:38
Type | Values Removed | Values Added |
---|---|---|
References | () http://isc.sans.edu/diary.html?storyid=13255 - | |
References | () http://openwall.com/lists/oss-security/2012/05/20/2 - | |
References | () http://www.exploit-db.com/exploits/18861/ - Exploit | |
References | () http://www.securitytracker.com/id?1027089 - | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=823464 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/75778 - |
Information
Published : 2012-05-21 15:55
Updated : 2024-11-21 01:38
NVD link : CVE-2012-2376
Mitre link : CVE-2012-2376
CVE.ORG link : CVE-2012-2376
JSON object : View
Products Affected
microsoft
- windows
php
- php
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer