php is vulnerable to remote code execution. An integer signedness issue, leading to a heap-based buffer underflow, was found in the PHP scandir()
function. If a remote attacker could upload an excessively large number of files to a directory the scandir()
function runs on, it could cause the PHP interpreter to crash or, possibly, execute arbitrary code.
lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
lists.opensuse.org/opensuse-security-announce/2012-08/msg00021.html
lists.opensuse.org/opensuse-security-announce/2012-08/msg00022.html
rhn.redhat.com/errata/RHSA-2013-1307.html
secunia.com/advisories/55078
support.apple.com/kb/HT5501
www.debian.org/security/2012/dsa-2527
www.mandriva.com/security/advisories?name=MDVSA-2012:108
www.php.net/ChangeLog-5.php
www.securityfocus.com/bid/54638
www.securitytracker.com/id?1027287
www.ubuntu.com/usn/USN-1569-1
access.redhat.com/security/updates/classification/#moderate
access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux/5/html/5.10_Technical_Notes/php53.html#RHSA-2013-1307
bugzilla.redhat.com/show_bug.cgi?id=837044
bugzilla.redhat.com/show_bug.cgi?id=869691
bugzilla.redhat.com/show_bug.cgi?id=869693
bugzilla.redhat.com/show_bug.cgi?id=869697
bugzilla.redhat.com/show_bug.cgi?id=892695
bugzilla.redhat.com/show_bug.cgi?id=951075
bugzilla.redhat.com/show_bug.cgi?id=953818
exchange.xforce.ibmcloud.com/vulnerabilities/77155
hermes.opensuse.org/messages/15376003
rhn.redhat.com/errata/RHSA-2013-1307.html