Integer overflow in PHP 5 up to 5.1.6 and 4 before 4.3.0 allows remote attackers to execute arbitrary code via an argument to the unserialize PHP function with a large value for the number of array elements, which triggers the overflow in the Zend Engine ecalloc function (Zend/zend_alloc.c).
2006-10-10T04:06:00.000
2025-04-09T00:30:58.490
Deferred
CVSSv2: 10.0 (HIGH)
AV:N/AC:L/Au:N/C:C/I:C/A:C
10.0
10.0
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | php | php | 4.0 | Yes |
Application | php | php | 4.0.1 | Yes |
Application | php | php | 4.0.1 | Yes |
Application | php | php | 4.0.1 | Yes |
Application | php | php | 4.0.2 | Yes |
Application | php | php | 4.0.3 | Yes |
Application | php | php | 4.0.3 | Yes |
Application | php | php | 4.0.4 | Yes |
Application | php | php | 4.0.5 | Yes |
Application | php | php | 4.0.6 | Yes |
Application | php | php | 4.0.7 | Yes |
Application | php | php | 4.0.7 | Yes |
Application | php | php | 4.0.7 | Yes |
Application | php | php | 4.0.7 | Yes |
Application | php | php | 4.1.0 | Yes |
Application | php | php | 4.1.1 | Yes |
Application | php | php | 4.1.2 | Yes |
Application | php | php | 4.2 | Yes |
Application | php | php | 4.2.0 | Yes |
Application | php | php | 4.2.1 | Yes |
Application | php | php | 4.2.2 | Yes |
Application | php | php | 4.2.3 | Yes |
Application | php | php | 5.0 | Yes |
Application | php | php | 5.0 | Yes |
Application | php | php | 5.0 | Yes |
Application | php | php | 5.0.0 | Yes |
Application | php | php | 5.0.1 | Yes |
Application | php | php | 5.0.2 | Yes |
Application | php | php | 5.0.3 | Yes |
Application | php | php | 5.0.4 | Yes |
Application | php | php | 5.0.5 | Yes |
Application | php | php | 5.1.0 | Yes |
Application | php | php | 5.1.1 | Yes |
Application | php | php | 5.1.2 | Yes |
Application | php | php | 5.1.3 | Yes |
Application | php | php | 5.1.4 | Yes |
Application | php | php | 5.1.5 | Yes |
Application | php | php | 5.1.6 | Yes |