The chunk_split function in PHP has the integer overflow vulnerability when processing malformed parameters. local attackers may exploit this vulnerability to escalate their permissions.
In PHP, Row 1963 of the chunk_split function tries to allocate sufficient memory for the function results, but the srclen and chunklen parameter blocks are used without any check. If the block and endlen of the value are greater than 65534 bytes, the integer overflow is triggered, and the memory size is allocated incorrectly, resulting in heap overflow.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.