Format string vulnerability in the error-reporting feature in the mysqli extension in PHP 5.1.0 and 5.1.1 might allow remote attackers to execute arbitrary code via format string specifiers in MySQL error messages.
The product uses a function that accepts a format string as an argument, but the format string originates from an external source.
Link | Tags |
---|---|
http://securitytracker.com/id?1015485 | vdb entry |
http://secunia.com/advisories/18431 | third party advisory patch vendor advisory |
http://www.vupen.com/english/advisories/2006/0369 | vdb entry |
http://www.vupen.com/english/advisories/2006/0177 | vdb entry |
http://www.securityfocus.com/archive/1/421705/100/0/threaded | mailing list |
https://exchange.xforce.ibmcloud.com/vulnerabilities/24095 | vdb entry |
http://www.hardened-php.net/advisory_022006.113.html | vendor advisory |
http://securityreason.com/securityalert/337 | third party advisory |
http://www.securityfocus.com/bid/16219 | vdb entry patch |
http://www.php.net/release_5_1_2.php | patch |