asp2php is prone to a buffer overflow vulnerability. This issue is exposed when the application is used to convert an ASP file to PHP. The particular issue is related to parsing of tokens in ASP files. Since ASP files may originate from an external or untrusted source, this vulnerability is considered to be remote in nature. Successful exploitation would allow for execution of arbitrary code in the context of the user running the application. This issue is reportedly distinct from BID 12015 (ASP2PHP Preparse Temp Variable Buffer Overflow Vulnerability). The differences that distinguish these issues are two separate vulnerabilities have not been determined at this time, other than that the overrun occurs in a different destination buffer.
asp2php is prone to a buffer overflow vulnerability. This issue is exposed when the application is used to convert an ASP file to PHP. The particular issue is related to parsing of tokens in ASP files. Since ASP files may originate from an external or untrusted source, this vulnerability is considered to be remote in nature. Successful exploitation would allow for execution of arbitrary code in the context of the user running the application. This issue is reportedly distinct from BID 12015 (ASP2PHP Preparse Temp Variable Buffer Overflow Vulnerability). The differences that distinguish these issues are two separate vulnerabilities have not been determined at this time, other than that the overrun occurs in a different destination buffer.