The array_fill function in ext/standard/array.c in PHP 4.4.2 and 5.1.2 allows context-dependent attackers to cause a denial of service (memory consumption) via a large num value.
References
| Link | Resource |
|---|---|
| http://securitytracker.com/id?1015979 | Exploit |
| http://www.infigo.hr/hr/in_focus/advisories/INFIGO-2006-04-02 | Exploit Vendor Advisory |
| http://www.osvdb.org/24945 | |
| http://securitytracker.com/id?1015979 | Exploit |
| http://www.infigo.hr/hr/in_focus/advisories/INFIGO-2006-04-02 | Exploit Vendor Advisory |
| http://www.osvdb.org/24945 |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:24
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://securitytracker.com/id?1015979 - Exploit | |
| References | () http://www.infigo.hr/hr/in_focus/advisories/INFIGO-2006-04-02 - Exploit, Vendor Advisory | |
| References | () http://www.osvdb.org/24945 - |
Information
Published : 2007-05-24 02:30
Updated : 2025-04-09 00:30
NVD link : CVE-2006-7205
Mitre link : CVE-2006-7205
CVE.ORG link : CVE-2006-7205
JSON object : View
Products Affected
php_group
- php
CWE
