Secunia Security Advisory - Stefan Esser has reported a vulnerability in PHP, which can be exploited by malicious people to disclose potentially sensitive information.
35327aec075be40e276b8506ff61232a3bc752201f215ee327b5e689af875745
----------------------------------------------------------------------
Proof-of-Concept (PoC) and Extended Analysis available for customers.
Get a free trial, contact sales@secunia.com
----------------------------------------------------------------------
TITLE:
PHP "addcslashes()" Information Disclosure Vulnerability
SECUNIA ADVISORY ID:
SA39675
VERIFY ADVISORY:
http://secunia.com/advisories/39675/
DESCRIPTION:
Stefan Esser has reported a vulnerability in PHP, which can be
exploited by malicious people to disclose potentially sensitive
information.
The vulnerability is caused due to the implementation of
"addcslashes()" function not being properly protected against
function interruptions, which can be exploited to disclose
potentially sensitive information.
The vulnerability is reported in PHP 5.2.13 and 5.3.2. Other versions
may also be affected.
SOLUTION:
Do not use the vulnerable function in an exploitable context.
PROVIDED AND/OR DISCOVERED BY:
Stefan Esser
ORIGINAL ADVISORY:
http://php-security.org/2010/05/03/mops-2010-006-php-addcslashes-interruption-information-leak-vulnerability/index.html
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------