aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml23
1 files changed, 20 insertions, 3 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 532763607ea6..fb9ee7c66884 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -285,19 +285,36 @@ Note: Please add new entries to the beginning of this file.
</affects>
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
- <blockquote cite="http://cvs.php.net/viewvc.cgi/ZendEngine2/zend_alloc.c?view=log#rev1.162">
- <p>Ilia Alshanetsky reports lack of safety checks against
- integer overflow in Zend Engine II.</p>
+ <p>Stefan Esser reports:</p>
+ <blockquote cite="http://www.hardened-php.net/advisory_092006.133.html">
+ <p>The PHP 5 branch of the PHP source code lacks the
+ protection against possible integer overflows inside
+ ecalloc() that is present in the PHP 4 branch and also for
+ several years part of our Hardening-Patch and our new
+ Suhosin-Patch.</p>
+ <p>It was discovered that such an integer overflow can be
+ triggered when user input is passed to the unserialize()
+ function. Earlier vulnerabilities in PHP's unserialize()
+ that were also discovered by one of our audits in December
+ 2004 are unrelated to the newly discovered flaw, but they
+ have shown, that the unserialize() function is exposed to
+ user-input in many popular PHP applications. Examples for
+ applications that use the content of COOKIE variables with
+ unserialize() are phpBB and Serendipity.</p>
+ <p>The successful exploitation of this integer overflow will
+ result in arbitrary code execution.</p>
</blockquote>
</body>
</description>
<references>
<cvename>CVE-2006-4812</cvename>
+ <url>http://www.hardened-php.net/advisory_092006.133.html</url>
<url>http://secunia.com/advisories/22280/</url>
</references>
<dates>
<discovery>2006-09-30</discovery>
<entry>2006-10-06</entry>
+ <modified>2006-10-17</modified>
</dates>
</vuln>