> The following security advisory is sent to the securiteam mailing list, and can be 
>found at the SecuriTeam web site:
> http://www.securiteam.com
> 
> 
>   PHP remote format string overflow vulnerability (Exploit code)
> ------------------------------------------------------------------------
> 
> 
> SUMMARY
> 
> A security vulnerability in PHP allows remote attackers with access to a 
> PHP script to cause the PHP interpreter execute arbitrary code by 
> overflowing one of its internal buffers.
> 
> DETAILS
> 
> Vulnerable systems:
> PHP version 3.0.16
> PHP version 4.0.2



---
Send e-mail to '[EMAIL PROTECTED]' with 'unsubscribe rlug' to 
unsubscribe from this list.

Raspunde prin e-mail lui