exploit-db-mirror/exploits/php/dos/22435.php
Offensive Security b4c96a5864 DB: 2021-09-03
28807 changes to exploits/shellcodes
2021-09-03 20:19:21 +00:00

9 lines
No EOL
593 B
PHP

source: https://www.securityfocus.com/bid/7210/info
A buffer overflow has been reported in the PHP openlog() function. By passing an argument of excessive size to the function, it may be possible for an attacker to overwrite memory, resulting in a denial of service. It is also possible for an attacker to execute arbitrary code in the PHP interpreter.
This vulnerability was reported for PHP 4.3.1 and later, however it is likely that previous versions are also affected. This issue appears to affect all platforms PHP runs on.
<?php
openlog(str_repeat("X", 1500), LOG_PID, LOG_DAEMON);
?>