A security flaw was found in the way the com_print_typeinfo() routine of the PHP scripting language processed certain COM object arguments. If a PHP language based application remotely accepted untrusted com_print_typeinfo() arguments in order to print out a PHP class definition for a dispatchable interface, a remote attacker could provide a specially-crafted COM object, which once processed by the application could lead to that application crash, or, potentially arbitrary code execution with the privileges of the user running the application. References: [1] https://isc.sans.edu/diary/PHP+5+4+Remote+Exploit+PoC+in+the+wild/13255 [2] http://packetstormsecurity.org/files/112851/php54-exec.txt [3] http://www.exploit-db.com/exploits/18861/ [4] http://www.reddit.com/r/netsec/comments/tuyp3/isc_diary_php_54_remote_exploit_poc_in_the_wild/ CVE request: [5] http://www.openwall.com/lists/oss-security/2012/05/20/1 CVE assignment: [6] http://www.openwall.com/lists/oss-security/2012/05/20/2
Statement: Not vulnerable. This flaw is specific to PHP instances, running on Microsoft Windows platform.