### [CVE-2011-1938](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1938) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description Stack-based buffer overflow in the socket_connect function in ext/sockets/sockets.c in PHP 5.3.3 through 5.3.6 might allow context-dependent attackers to execute arbitrary code via a long pathname for a UNIX socket. ### POC #### Reference - http://securityreason.com/securityalert/8294 #### Github - https://github.com/mudongliang/LinuxFlaw - https://github.com/oneoy/cve-