summaryrefslogtreecommitdiff
path: root/security
diff options
context:
space:
mode:
authorWesley Shields <wxs@FreeBSD.org>2012-02-07 04:13:47 +0000
committerWesley Shields <wxs@FreeBSD.org>2012-02-07 04:13:47 +0000
commit38c74bf27c809a507fa34aa9dad4a45e8273ce02 (patch)
tree94c7d9fd11e652d74525f6857bfeb3510855ad23 /security
parent- Update to 0.6.10 (diff)
Fix up 3fd040be-4f0b-11e1-9e32-0025900931f by giving a better description.
Notes
Notes: svn path=/head/; revision=290541
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml15
1 files changed, 11 insertions, 4 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 87b758d8f037..d0b15cefe2b4 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -107,19 +107,26 @@ Note: Please add new entries to the beginning of this file.
</affects>
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
- <p>PHP development team reports:</p>
- <blockquote cite="http://www.php.net/ChangeLog-5.php">
- <p>Fixed arbitrary remote code execution vulnerability reported
- by Stefan Esser, CVE-2012-0830.</p>
+ <p>Secunia reports:</p>
+ <blockquote cite="http://secunia.com/advisories/47806/">
+ <p>A vulnerability has been reported in PHP, which can be exploited
+ by malicious people to compromise a vulnerable system.</p>
+ <p>The vulnerability is caused due to a logic error within the
+ "php_register_variable_ex()" function (php_variables.c) when
+ hashing form posts and updating a hash table, which can be
+ exploited to execute arbitrary code.</p>
</blockquote>
</body>
</description>
<references>
<cvename>CVE-2012-0830</cvename>
+ <url>http://www.php.net/archive/2012.php#id2012-02-02-1</url>
+ <url>http://secunia.com/advisories/47806/</url>
</references>
<dates>
<discovery>2012-02-02</discovery>
<entry>2012-02-04</entry>
+ <modified>2012-02-06</modified>
</dates>
</vuln>