vendor:
PHP
by:
Yakir Wizman
7,5
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: PHP
Affected Version From: 5.0.0
Affected Version To: 5.0.0
Patch Exists: YES
Related CWE: N/A
CPE: a:php:php:5.0.0
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows
2016
PHP 5.0.0 tidy_parse_file() Buffer Overflow Exploit
This exploit is for the PHP 5.0.0 tidy_parse_file() vulnerability. The bug was discovered by Yakir Wizman and was tested on Windows XP SP3 English. The exploit uses a 2036 byte long string of 'A's followed by a call to the ESP register at 0x1017c6af. The shellcode used is 144 bytes long and is encoded with x86/shikata_ga_nai. The shellcode is used to execute the calc command.
Mitigation:
Upgrade to a version of PHP that is not vulnerable to this exploit.