The resource system in PHP 5.0.0 up to and including 5.2.1 allows context-dependent malicious users to execute arbitrary code by interrupting the hash_update_file function via a userspace (1) error or (2) stream handler, which can then be used to destroy and modify internal resources. NOTE: it was later reported that PHP 5.2 up to and including 5.2.13 and 5.3 up to and including 5.3.2 are also affected.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
php php 5.0.0 |
||
php php 5.0.1 |
||
php php 5.0 |
||
php php 5.1.0 |
||
php php 5.2.0 |
||
php php 5.2.1 |
||
php php 5.2.8 |
||
php php 5.2.9 |
||
php php 5.0.4 |
||
php php 5.0.5 |
||
php php 5.1.3 |
||
php php 5.1.4 |
||
php php 5.2.4 |
||
php php 5.2.5 |
||
php php 5.2.12 |
||
php php 5.2.13 |
||
php php 5.0.2 |
||
php php 5.0.3 |
||
php php 5.1.1 |
||
php php 5.1.2 |
||
php php 5.2.2 |
||
php php 5.2.3 |
||
php php 5.2.10 |
||
php php 5.2.11 |
||
php php 5.1.5 |
||
php php 5.1.6 |
||
php php 5.2.6 |
||
php php 5.2.7 |
||
php php 5.3.0 |
||
php php 5.3.1 |
||
php php 5.3.2 |