lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <87smbvc9a6.fsf@deneb.enyo.de> From: fw at deneb.enyo.de (Florian Weimer) Subject: Advisory 11/2004: PHP memory_limit remote vulnerability * Stefan Esser: > Application: PHP <= 4.3.7 > PHP5 <= 5.0.0RC3 > Severity: A vulnerability within PHP allows remote code > execution on PHP servers with activated memory_limit > Risk: Critical Uh-oh. Has anybody got a minimal patch to fix this issue (and only this issue)?