Maybe this one?
http://www.php-security.org/2010/05/03/mops-2010-006-php-addcslashes-interruption-information-leak-vulnerability/index.html

Tyrael


On Wed, May 5, 2010 at 1:26 PM, Mark Skilbeck <markskilb...@gmail.com>wrote:

> What exploits are there for __toString()? Just wondering.
>
>
> On 05/05/2010 07:50, Dmitry Stogov wrote:
>
>> Hi Moriyoshi,
>>
>> I took just a quick look through the patch, but for me it looks like a
>> bad idea. Introducing new magic function may bring a lot of troubles and
>> open a new door for exploit writer (we already have problems with
>> __toString() method). Also I afraid, this magic method will make php
>> slower even if scripts don't use this future (at least the patch
>> disables code specialization for ZEND_INIT_METHOD_CALL) and make some
>> future type propagation optimizations non-applicable. At last the patch
>> introduces 18 new grammar conflicts and I think it's not acceptable.
>>
>> Thanks. Dmitry.
>>
>
>
> --
> PHP Internals - PHP Runtime Development Mailing List
> To unsubscribe, visit: http://www.php.net/unsub.php
>
>

Reply via email to