PHP WDDX_Deserialize Buffer Overflow Vulnerability

PHP is prone to a remotely exploitable buffer-overflow vulnerability because it fails to properly check boundaries when processing client-supplied WDDX packets.

An attacker can exploit this issue to execute malicious code.

NOTE: This issue affects only the latest CVS release of PHP. The vulnerable code has not been released as part of an official PHP release at this time.


 

Privacy Statement
Copyright 2010, SecurityFocus