bug72479.phpt 758 B

12345678910111213141516171819202122232425262728293031323334353637
  1. --TEST--
  2. Bug #72479: Use After Free Vulnerability in SNMP with GC and unserialize()
  3. --EXTENSIONS--
  4. snmp
  5. --SKIPIF--
  6. <?php
  7. require_once(__DIR__.'/skipif.inc');
  8. ?>
  9. --FILE--
  10. <?php
  11. $arr = [1, [1, 2, 3, 4, 5], 3, 4, 5];
  12. $poc = 'a:3:{i:1;N;i:2;O:4:"snmp":1:{s:11:"quick_print";'.serialize($arr).'}i:1;R:7;}';
  13. $out = unserialize($poc);
  14. gc_collect_cycles();
  15. $fakezval = ptr2str(1122334455);
  16. $fakezval .= ptr2str(0);
  17. $fakezval .= "\x00\x00\x00\x00";
  18. $fakezval .= "\x01";
  19. $fakezval .= "\x00";
  20. $fakezval .= "\x00\x00";
  21. for ($i = 0; $i < 5; $i++) {
  22. $v[$i] = $fakezval.$i;
  23. }
  24. var_dump($out[1]);
  25. function ptr2str($ptr)
  26. {
  27. $out = '';
  28. for ($i = 0; $i < 8; $i++) {
  29. $out .= chr($ptr & 0xff);
  30. $ptr >>= 8;
  31. }
  32. return $out;
  33. }
  34. ?>
  35. --EXPECT--
  36. int(1)