Stack-based buffer overflows in php_Easycom5_3_0.dll in EasyCom for PHP 4.0.0.29 allows remote attackers to execute arbitrary code via the server argument to the (1) i5_connect, (2) i5_pconnect, or (3) i5_private_connect API function.
References
Link | Resource |
---|---|
https://www.exploit-db.com/exploits/41425/ | Exploit Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/96419 | Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2017/Feb/60 | Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/141299/EasyCom-AS400-PHP-API-Buffer-Overflow.html | Exploit Third Party Advisory VDB Entry |
http://hyp3rlinx.altervista.org/advisories/EASYCOM-PHP-API-BUFFER-OVERFLOW.txt | Exploit Third Party Advisory |
Configurations
Information
Published : 2017-03-15 08:59
Updated : 2017-03-21 08:17
NVD link : CVE-2017-5358
Mitre link : CVE-2017-5358
JSON object : View
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
Products Affected
easycom-aura
- easycom_for_php