The shmop functions in PHP before 4.4.5, and before 5.2.1 in the 5.x series, do not verify that their arguments correspond to a shmop resource, which allows context-dependent attackers to read and write arbitrary memory locations via arguments associated with an inappropriate resource, as demonstrated by a GD Image resource. * MILW0RM:3426 * URL:http://www.milw0rm.com/exploits/3426 * MILW0RM:3427 * URL:http://www.milw0rm.com/exploits/3427 * MISC:http://www.php-security.org/MOPB/MOPB-15-2007.html * DEBIAN:DSA-1283 * URL:http://www.debian.org/security/2007/dsa-1283 * GENTOO:GLSA-200703-21 * URL:http://security.gentoo.org/glsa/glsa-200703-21.xml * UBUNTU:USN-455-1 * URL:http://www.ubuntu.com/usn/usn-455-1 * BID:22862 * URL:http://www.securityfocus.com/bid/22862 * OSVDB:32781 * URL:http://www.osvdb.org/32781 * SECUNIA:24606 * URL:http://secunia.com/advisories/24606 * SECUNIA:25062 * URL:http://secunia.com/advisories/25062
Maps to MOPB-15-2007, and is mentioned in bug 230556, but is not explicitly closed by any Errata (that I have found).
*** This bug has been marked as a duplicate of 240161 ***