> ----------------------------------------------------------------------
>
> TITLE:
> PHP "snmpget()" Buffer Overflow Vulnerability
>
> SECUNIA ADVISORY ID:
> SA24440
>
> VERIFY ADVISORY:
> http://secunia.com/advisories/24440/
>
> CRITICAL:
> Less critical
>
> IMPACT:
> Security Bypass
>
> WHERE:
> Local system
>
> SOFTWARE:
> PHP 4.4.x
> http://secunia.com/product/5768/
>
> DESCRIPTION:
> rgod has reported a vulnerability in PHP4, which can be exploited by
> malicious people to bypass certain security restrictions.
>
> The vulnerability is caused due to a boundary error in the
> "snmpget()" function. This can be exploited to cause a stack-based
> buffer overflow via an overly long argument and execute arbitrary
> code, bypassing security restrictions like the "disable_functions"
> directive.
>
> The vulnerability is reported in version 4.4.6. Other versions may
> also be affected.
>
> SOLUTION:
> Grant only trusted users access to affected systems.
>
> PROVIDED AND/OR DISCOVERED BY:
> rgod
>
> ORIGINAL ADVISORY:
> http://milw0rm.com/exploits/3439
>