> The following security advisory is sent to the securiteam mailing list, and can be
>found at the SecuriTeam web site:
> http://www.securiteam.com
>
>
> PHP remote format string overflow vulnerability (Exploit code)
> ------------------------------------------------------------------------
>
>
> SUMMARY
>
> A security vulnerability in PHP allows remote attackers with access to a
> PHP script to cause the PHP interpreter execute arbitrary code by
> overflowing one of its internal buffers.
>
> DETAILS
>
> Vulnerable systems:
> PHP version 3.0.16
> PHP version 4.0.2
---
Send e-mail to '[EMAIL PROTECTED]' with 'unsubscribe rlug' to
unsubscribe from this list.