PHP 5.2.1 allows context-dependent attackers to read portions of heap memory by executing certain scripts with a serialized data input string beginning with S:, which does not properly track the number of input bytes being processed.
Link | Tags |
---|---|
http://www.php-security.org/MOPB/MOPB-29-2007.html | exploit |
https://exchange.xforce.ibmcloud.com/vulnerabilities/33170 | vdb entry |
http://secunia.com/advisories/24630 | third party advisory |
http://www.securityfocus.com/bid/23105 | vdb entry |
http://us2.php.net/releases/5_2_2.php | |
http://www.mandriva.com/security/advisories?name=MDVSA-2008:126 | vendor advisory |