First published: Tue May 31 2011(Updated: )
Stack-based buffer overflow in the socket_connect function in ext/sockets/sockets.c in PHP 5.3.3 through 5.3.6 might allow context-dependent attackers to execute arbitrary code via a long pathname for a UNIX socket.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
PHP PHP | =5.3.6 | |
PHP PHP | =5.3.3 | |
PHP PHP | =5.3.4 | |
PHP PHP | =5.3.5 |
http://svn.php.net/viewvc/php/php-src/trunk/ext/sockets/sockets.c?r1=311369&r2=311368&pathrev=311369
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.