Группа Hardened-PHP Project представила список критических уязвимостей:
[01 - pack() - integer overflow leading to heap bufferoverflow ]
[02 - unpack() - integer overflow leading to heap info leak ]
[03 - safe_mode_exec_dir bypass in multithreaded PHP ]
[05 - path truncation in realpath() ]
[06 - unserialize() - wrong handling of negative references ]
[07 - unserialize() - wrong handling of references to freed data ]
Examples of vulnerable scripts: phpBB2, Invision Board и т.д.
It is strongly recommended to upgrade to the new PHP-Releases as soon as possible, because a lot of PHP applications expose the easy to exploit unserialize() vulnerability to remote attackers.
>>> Подробности