vendor:
PHP 6.0 Dev
by:
Pr0T3cT10n, TheLeader, Debug, HDM
7,5
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: PHP 6.0 Dev
Affected Version From: 6.0 Dev
Affected Version To: 6.0 Dev
Patch Exists: No
Related CWE: N/A
CPE: a:php:php:6.0_dev
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows XP HEB SP3, Apache, PHP 6.0 Dev
2009
PHP 6.0 Dev str_transliterate() 0Day Buffer Overflow Exploit
This code exploits a buffer overflow in the str_transliterate() function to call WinExec and execute CALC. The exploit requires that the 'unicode.semantics' setting in php.ini be set to 'on'.
Mitigation:
Ensure that the 'unicode.semantics' setting in php.ini is set to 'off'.