Stack-based buffer overflows in php_Easycom5_3_0.dll in EasyCom for PHP 4.0.0.29 allows remote attackers to execute arbitrary code via the server argument to the (1) i5_connect, (2) i5_pconnect, or (3) i5_private_connect API function.
References
Link | Resource |
---|---|
http://hyp3rlinx.altervista.org/advisories/EASYCOM-PHP-API-BUFFER-OVERFLOW.txt | Exploit Third Party Advisory |
http://packetstormsecurity.com/files/141299/EasyCom-AS400-PHP-API-Buffer-Overflow.html | Exploit Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2017/Feb/60 | Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/96419 | Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/41425/ | Exploit Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2017-03-15 15:59
Updated : 2024-02-04 19:11
NVD link : CVE-2017-5358
Mitre link : CVE-2017-5358
CVE.ORG link : CVE-2017-5358
JSON object : View
Products Affected
easycom-aura
- easycom_for_php
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer