From 0aceca32b69902e24cbbaf0c84f1aa05ab5fa4d2 Mon Sep 17 00:00:00 2001 From: Andrew Pantyukhin Date: Fri, 6 Oct 2006 05:12:29 +0000 Subject: [PATCH] - Document _ecalloc Integer Overflow Vulnerability in php5 --- security/vuxml/vuln.xml | 35 +++++++++++++++++++++++++++++++++++ 1 file changed, 35 insertions(+) diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 20ead4df288d..5adc73ff1267 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -34,6 +34,41 @@ Note: Please add new entries to the beginning of this file. --> + + php -- _ecalloc Integer Overflow Vulnerability + + + php5 + 5.1.6_1 + + + php5-cli + php5-cgi + php5-dtc + php5-horde + php5-nms + mod_php5 + 0 + + + + +
+

Ilia Alshanetsky reports lack of safety checks against + integer overflow in Zend Engine II.

+
+ +
+ + CVE-2006-4812 + http://secunia.com/advisories/22280/ + + + 2006-09-30 + 2006-10-06 + +
+ mambo -- multiple SQL injection vulnerabilities