The shmop functions in PHP before 4.4.5, and before 5.2.1 in the 5.x series, do not verify that their arguments correspond to a shmop resource, which allows context-dependent attackers to read and write arbitrary memory locations via arguments associated with an inappropriate resource, as demonstrated by a GD Image resource.
Link | Tags |
---|---|
http://secunia.com/advisories/25056 | third party advisory |
http://www.osvdb.org/32781 | vdb entry |
http://www.debian.org/security/2007/dsa-1283 | vendor advisory |
http://secunia.com/advisories/24606 | third party advisory |
http://security.gentoo.org/glsa/glsa-200703-21.xml | vendor advisory |
http://secunia.com/advisories/25062 | third party advisory |
https://www.exploit-db.com/exploits/3427 | exploit |
http://www.ubuntu.com/usn/usn-455-1 | vendor advisory |
http://www.securityfocus.com/bid/22862 | vdb entry exploit |
https://www.exploit-db.com/exploits/3426 | exploit |
http://secunia.com/advisories/25057 | third party advisory |
http://www.php-security.org/MOPB/MOPB-15-2007.html | exploit |
http://www.novell.com/linux/security/advisories/2007_32_php.html | vendor advisory |