Multiple integer overflows in ext/standard/exec.c in PHP 7.x before 7.0.2 allow remote attackers to cause a denial of service or possibly have unspecified other impact via a long string to the (1) php_escape_shell_cmd or (2) php_escape_shell_arg function, leading to a heap-based buffer overflow.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:47
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2016/01/14/8 - | |
References | () http://www.php.net/ChangeLog-7.php - Vendor Advisory | |
References | () http://www.securitytracker.com/id/1034608 - | |
References | () https://bugs.php.net/bug.php?id=71270 - Exploit | |
References | () https://github.com/php/php-src/commit/2871c70efaaaa0f102557a17c727fd4d5204dd4b - |
Information
Published : 2016-01-19 05:59
Updated : 2024-11-21 02:47
NVD link : CVE-2016-1904
Mitre link : CVE-2016-1904
CVE.ORG link : CVE-2016-1904
JSON object : View
Products Affected
php
- php
CWE
CWE-189
Numeric Errors