First published: Thu Jan 29 2015(Updated: )
It was reported that pcre_exec in PHP pcre extension partially initialize a buffer when an invalid regex is processed, which can information disclosure. A mitigation fix have been applied in PHP 5.4+ <a href="http://git.php.net/?p=php-src.git;a=commitdiff;h=c351b47ce85a3a147cfa801fa9f0149ab4160834">http://git.php.net/?p=php-src.git;a=commitdiff;h=c351b47ce85a3a147cfa801fa9f0149ab4160834</a> Upstream bug report (with a patch proposal): <a href="http://bugs.exim.org/show_bug.cgi?id=1537">http://bugs.exim.org/show_bug.cgi?id=1537</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PHP PHP | =8.36 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.