The glob function in PHP 5.2.3 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via an invalid value of the flags parameter, probably related to memory corruption or an invalid read on win32 platforms, and possibly related to lack of initialization for a glob structure.
http://cvs.php.net/viewvc.cgi/php-src/ext/standard/dir.c?r1=1.166&r2=1.167
http://cvs.php.net/viewvc.cgi/php-src/ext/standard/dir.c?view=log
http://secunia.com/advisories/26085
http://secunia.com/advisories/26642
http://secunia.com/advisories/27102
http://secunia.com/advisories/30158
http://secunia.com/advisories/30288
https://exchange.xforce.ibmcloud.com/vulnerabilities/35437
http://www.debian.org/security/2008/dsa-1572
http://www.debian.org/security/2008/dsa-1578
http://www.exploit-db.com/exploits/4181
http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml
http://www.php.net/ChangeLog-5.php#5.2.4
Published: 2007-07-17
Base Score: 6.8
Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P
Severity: Medium