PHP 'ext/spl/spl_array.c 'Local Denial of Service Vulnerability
Release date:
Updated on:
Affected Systems:
PHP <5.5.14
Description:
--------------------------------------------------------------------------------
Bugtraq id: 68511
CVE (CAN) ID: CVE-2014-4698
PHP is a widely used scripting language. It is especially suitable for Web development and can be embedded into HTML.
In SPL components earlier than PHP 5.5.14, ext/spl/spl_array.c is released and reused. Attackers exploit this vulnerability through the ArrayIterator specially used in applications in some Web hosting environments, this vulnerability can cause DOS. This vulnerability is caused by the re-exploitation of ArrayIterator due to object changes during sorting.
<* Source: insighti
*>
Suggestion:
--------------------------------------------------------------------------------
Vendor patch:
PHP
---
The vendor has released a patch to fix this security problem. Please download it from the vendor's homepage:
Http://www.php.net/downloads.php
Https://bugs.php.net/bug.php? Id = 67539
Practical Production Environment-LNMP architecture compilation and installation + SSL encryption implementation
LNMP full-featured compilation and installation for CentOS 6.3 notes
Install LNMP in CentOS 6.3 (PHP 5.4, MyySQL5.6)
Nginx startup failure occurs during LNMP deployment.
Ubuntu install Nginx php5-fpm MySQL (LNMP environment setup)
Detailed php hd scanning PDF + CD source code + full set of teaching videos
PHP details: click here
PHP: click here
This article permanently updates the link address: