--TEST-- GHSA-h35g-vwh6-m678 (mysqlnd leaks partial content of the heap - auth message buffer over-read) --EXTENSIONS-- mysqli --FILE-- wait(); try { $conn = new mysqli( $servername, $username, $password, "", $port ); $info = mysqli_info($conn); var_dump($info); } catch (Exception $e) { echo $e->getMessage() . PHP_EOL; } $process->terminate(); print "done!"; ?> --EXPECTF-- [*] Server started [*] Connection established [*] Sending - Server Greeting: 580000000a352e352e352d31302e352e31382d4d6172696144420003000000473e3f6047257c6700fef7080200ff81150000000000000f0000006c6b55463f49335f686c6431006d7973716c5f6e61746976655f70617373776f7264 [*] Received: 6900000185a21a00000000c0080000000000000000000000000000000000000000000000726f6f7400006d7973716c5f6e61746976655f70617373776f7264002c0c5f636c69656e745f6e616d65076d7973716c6e640c5f7365727665725f686f7374093132372e302e302e31 [*] Sending - Malicious OK Auth Response [Extract heap through buffer over-read]: 0900000200000002000000fcff Warning: mysqli::__construct(): OK packet message length is past the packet size in %s on line %d Unknown error while trying to connect via tcp://127.0.0.1:50001 done!