The dba_replace function in PHP 5.2.6 and 4.x allows context-dependent attackers to cause a denial of service (file truncation) via a key with the NULL byte. NOTE: this might only be a vulnerability in limited circumstances in which the attacker can modify or add database entries but does not have permissions to truncate the file.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://www.securityfocus.com/archive/1/498982/100/0/threaded | mailing list |
https://exchange.xforce.ibmcloud.com/vulnerabilities/47316 | vdb entry |
http://www.osvdb.org/52206 | vdb entry |
http://securityreason.com/achievement_securityalert/58 | third party advisory exploit |
http://www.securityfocus.com/archive/1/498746/100/0/threaded | mailing list |
http://cvs.php.net/viewvc.cgi/php-src/NEWS?r1=1.2027.2.547.2.1313&r2=1.2027.2.547.2.1314& | vendor advisory |
http://www.securityfocus.com/archive/1/498981/100/0/threaded | mailing list |