logo
DATABASE RESOURCES PRICING ABOUT US

Arbitrary Code Execution

Description

php is vulnerable to arbitrary code execution. The vulnerability exists as a use-after-free flaw was found in the PHP substr_replace() function. If a PHP script used the same variable as multiple function arguments, a remote attacker could possibly use this to crash the PHP interpreter or, possibly, execute arbitrary code.


Affected Software


CPE Name Name Version
php 5.1.6__11.el5
php 5.1.6__7.el5
php 5.1.6__20.el5_2.1
php 5.3.2__6.el6_0.1
php 5.1.6__12.el5
php 5.1.6__20.el5
php 5.3.2__6.el6
php 5.1.6__23.2.el5_3
php 5.1.6__24.el5_4.5
php 5.1.6__15.el5
php 5.1.6__23.el5
php 5.1.6__5.el5
php 5.1.6__11.el5
php 5.1.6__7.el5
php 5.1.6__20.el5_2.1
php 5.3.2__6.el6_0.1
php 5.1.6__12.el5
php 5.1.6__20.el5
php 5.3.2__6.el6
php 5.1.6__23.2.el5_3
php 5.1.6__24.el5_4.5
php 5.1.6__15.el5
php 5.1.6__23.el5
php 5.1.6__5.el5

Related