"value":"Double free vulnerability in PHP before 4.4.7, and 5.x before 5.2.2, allows context-dependent attackers to execute arbitrary code by interrupting the session_regenerate_id function, as demonstrated by calling a userspace error handler or triggering a memory limit violation."
},
{
"lang":"es",
"value":"Una vulnerabilidad de doble liberaci\u00f3n en PHP versiones anteriores a 4.4.7, y versiones 5.x anteriores a 5.2.2, permite a atacantes dependiendo del contexto ejecutar c\u00f3digo arbitrario mediante la interrupci\u00f3n de la funci\u00f3n session_regenerate_id, como es demostrado mediante la llamada de un manejador de errores de espacio de usuario o desencadenando una violaci\u00f3n de l\u00edmite de memoria."
}
],
"vendorComments":[
{
"organization":"Red Hat",
"comment":"The PHP interpreter does not offer a reliable "sandboxed" security\nlayer (as found in, say, a JVM) in which untrusted scripts can be run;\nany script run by the PHP interpreter must be trusted with the\nprivileges of the interpreter itself. We therefore do not classify\nthis issue as security-sensitive since no trust boundary is crossed.\n",