First published: Wed Dec 08 2004(Updated: )
Multiple integer handling errors in PHP before 4.3.10 allow attackers to bypass safe mode restrictions, cause a denial of service, or execute arbitrary code via (1) a negative offset value to the shmop_write function, (2) an "integer overflow/underflow" in the pack function, or (3) an "integer overflow/underflow" in the unpack function. NOTE: this issue was originally REJECTed by its CNA before publication, but that decision is in active dispute. This candidate may change significantly in the future as a result of further discussion.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PHP | <4.3.10 | |
Ubuntu | =4.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-1018 is considered to be of high severity due to the potential for remote code execution, denial of service, and the ability to bypass safe mode restrictions.
To fix CVE-2004-1018, upgrade PHP to version 4.3.10 or later, or apply any patches provided by your distribution.
CVE-2004-1018 is associated with integer handling errors in PHP that can lead to denial of service, arbitrary code execution, and safe mode bypass.
CVE-2004-1018 affects all PHP versions prior to 4.3.10.
Yes, CVE-2004-1018 can be exploited remotely by attackers taking advantage of the integer handling errors in PHP.