vendor:
PHP
by:
Mateusz Kocielski, Marek Kroemeke and Filip Palian
7.5
CVSS
HIGH
Buffer Overflow
120
CWE
Product Name: PHP
Affected Version From: 5.3.2003
Affected Version To: 5.3.2006
Patch Exists: YES
Related CWE: CVE-2011-1938
CPE: a:php:php:5.3.3
Metasploit:
https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2012-0715/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2012-0710/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2011-1938/, https://www.rapid7.com/db/vulnerabilities/apple-osx-php-cve-2011-1938/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2011-1938/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2011-1423/, https://www.rapid7.com/db/vulnerabilities/php-cve-2011-1938/, https://www.rapid7.com/db/vulnerabilities/hpsmh-cve-2011-1938/, https://www.rapid7.com/db/vulnerabilities/centos_linux-cve-2011-1938/, https://www.rapid7.com/db/vulnerabilities/apple-osx-addressbook-cve-2011-1938/
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: None
2011
CVE-2011-1938
This exploit is a buffer overflow vulnerability in PHP 5.3.3-5.3.6. It creates a sled of NOP instructions and then appends the shellcode to it. It then creates a socket connection to the address specified in the EVIL_SPACE_ADDR constant and connects to it, thus popping a shell.
Mitigation:
Upgrade to the latest version of PHP.