HTTP: PHP htmlspecialchars htmlentities Buffer Overflow

This signature detects attempts to exploit a known vulnerability in PHP. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the affected application.

Extended Description

PHP is prone to a buffer-overflow vulnerability because it fails to perform boundary checks before copying user-supplied data to insufficiently sized memory buffers. An attacker can exploit this issue to execute arbitrary machine code in the context of the PHP process. Failed exploit attempts will likely crash the webserver, denying service to legitimate users. PHP 5.4 is vulnerable; other versions may also be affected.

Affected Products

Php php

References

BugTraq: 51860

URL: https://bugs.php.net/bug.php?id=60965

Short Name
HTTP:PHP:HTML-SPCL-CHARS
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
Buffer Overflow PHP bid:51860 htmlentities htmlspecialchars
Release Date
02/29/2012
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3375
False Positive
Unknown
Vendors

Php

Found a potential security threat?