First published: Sat Mar 24 2007(Updated: )
PHP 5.2.1 allows context-dependent attackers to read portions of heap memory by executing certain scripts with a serialized data input string beginning with S:, which does not properly track the number of input bytes being processed.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PHP PHP | =5.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.