Navigation Bar Top Applications Support Documentation Vendors Search Index Top Top

PHP memory_limit and strip_tags() vulnerabilities

Description:

Stefan Esser has reported two vulnerabilities in PHP, which can be exploited by malicious people to bypass security functionality or compromise a vulnerable system. An error within PHP's memory_limit request termination allows remote code execution on PHP servers with activated memory_limit. A binary safety problem within PHP's strip_tags() function may allow injection of arbitrary tags in Internet Explorer and Safari browsers.

References:

Affects:

portaudit: PHP memory_limit and strip_tags() vulnerabilities

Disclaimer: The data contained on this page is derived from the VuXML document, please refer to the the original document for copyright information. The author of portaudit makes no claim of authorship or ownership of any of the information contained herein.

If you have found a vulnerability in a FreeBSD port not listed in the database, please contact the FreeBSD Security Officer. Refer to "FreeBSD Security Information" for more information.


Oliver Eikemeier <eik@FreeBSD.org>