Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Thu, 2 Aug 2012 13:37:06 +0200
From: Marcus Meissner <meissner@...e.de>
To: OSS Security List <oss-security@...ts.openwall.com>
Subject: CVE Request: php5 pdo array overread/crash

Hi,

I think this issue does not have a CVE id yet as far as I can see:

Prepared statements in PHP5 pdo can be used to cause an array overread
and crash of the php5 interpreter instance.

References:
	Report on Bugtraq: http://seclists.org/bugtraq/2012/Jun/60
	Upstream PHP bug (including testcase) available at: https://bugs.php.net/bug.php?id=61755
	https://bugzilla.novell.com/show_bug.cgi?id=769785

Ciao, Marcus
-- 
Open Linux Security Engineer Position at SUSE: http://bit.ly/Li4RbS

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.