Stack-based buffer overflow in apc.c in Alternative PHP Cache (APC) 3.0.11 through 3.0.16 allows remote attackers to execute arbitrary code via a long filename.
| Type | CWE ID | Description |
|---|---|---|
| text | N/A | n/a |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|---|
| https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00582.html | vendor-advisory x_refsource_FEDORA |
| http://secunia.com/advisories/29745 | third-party-advisory x_refsource_SECUNIA |
| http://papasian.org/~dannyp/apcsmash.php.txt | x_refsource_MISC |
| http://pecl.php.net/bugs/bug.php?id=13415 | x_refsource_CONFIRM |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/41420 | vdb-entry x_refsource_XF |
| http://secunia.com/advisories/29509 | third-party-advisory x_refsource_SECUNIA |
| https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00548.html | vendor-advisory x_refsource_FEDORA |
| http://www.mandriva.com/security/advisories?name=MDVSA-2008:082 | vendor-advisory x_refsource_MANDRIVA |
| http://secunia.com/advisories/31082 | third-party-advisory x_refsource_SECUNIA |
| http://security.gentoo.org/glsa/glsa-200804-07.xml | vendor-advisory x_refsource_GENTOO |
| http://www.securityfocus.com/bid/28457 | vdb-entry x_refsource_BID |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|