vendor:
PHP
by:
rgod
7.5
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: PHP
Affected Version From: PHP 5.2.3
Affected Version To: Unknown
Patch Exists: NO
Related CWE:
CPE: a:php:php:5.2.3
Platforms Tested: Windows XP SP2
2007
PHP tidy_parse_string() & tidy_repair_string() local buffer overflow
This is a proof of concept exploit for a local buffer overflow vulnerability in the PHP tidy_parse_string() and tidy_repair_string() functions. The vulnerability allows an attacker to execute arbitrary code on a vulnerable system. The exploit has been tested on Windows XP SP2 and works both from the command line and on Apache. More information about the vulnerability can be found at http://www.google.com/codesearch?hl=it&q=+tidy_parse_string&sa=N
Mitigation:
To mitigate this vulnerability, it is recommended to update to a newer version of PHP that includes a patch for this issue. Additionally, it is recommended to regularly update and patch all software and libraries used in your PHP applications.