Vulnerability Name: | CVE-2010-1914 (CCN-58587) |
Assigned: | 2010-05-08 |
Published: | 2010-05-08 |
Updated: | 2017-08-17 |
Summary: | The Zend Engine in PHP 5.2 through 5.2.13 and 5.3 through 5.3.2 allows context-dependent attackers to obtain sensitive information by interrupting the handler for the (1) ZEND_BW_XOR opcode (shift_left_function), (2) ZEND_SL opcode (bitwise_xor_function), or (3) ZEND_SR opcode (shift_right_function), related to the convert_to_long_base function.
|
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): Low Integrity (I): None Availibility (A): None |
|
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N) 4.0 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:U/RC:UR)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Authentication (Au): None | Impact Metrics: | Confidentiality (C): Partial Integrity (I): None Availibility (A): None | 5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N) 4.0 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:U/RC:UR)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Athentication (Au): None
| Impact Metrics: | Confidentiality (C): Partial Integrity (I): None Availibility (A): None |
|
Vulnerability Type: | CWE-200
|
Vulnerability Consequences: | Obtain Information |
References: | Source: MITRE Type: CNA CVE-2010-1914
Source: SUSE Type: UNKNOWN SUSE-SR:2010:017
Source: SUSE Type: UNKNOWN SUSE-SR:2010:018
Source: CCN Type: MOPS-2010-014 PHP ZEND_BW_XOR Opcode Interruption Address Information Leak Vulnerability
Source: CCN Type: OSVDB ID: 64662 PHP Zend Engine ZEND_BW_XOR opcode Handler convert_to_long_base Function Interrupt Information Disclosure
Source: CCN Type: OSVDB ID: 64663 PHP Zend Engine ZEND_SL opcode Handler convert_to_long_base Function Interrupt Information Disclosure
Source: CCN Type: OSVDB ID: 64664 PHP Zend Engine ZEND_SR opcode Handler convert_to_long_base Function Interrupt Information Disclosure
Source: MISC Type: Exploit http://www.php-security.org/2010/05/08/mops-2010-014-php-zend_bw_xor-opcode-interruption-address-information-leak-vulnerability/index.html
Source: MISC Type: Exploit http://www.php-security.org/2010/05/08/mops-2010-015-php-zend_sl-opcode-interruption-address-information-leak-vulnerability/index.html
Source: MISC Type: Exploit http://www.php-security.org/2010/05/08/mops-2010-016-php-zend_sr-opcode-interruption-address-information-leak-vulnerability/index.html
Source: CCN Type: The PHP Group Web site PHP: Hypertext Preprocessor
Source: XF Type: UNKNOWN php-zendengine-info-disclosure(58587)
Source: XF Type: UNKNOWN php-zendengine-info-disclosure(58587)
Source: SUSE Type: SUSE-SR:2010:017 (java-1_4_2-ibm, sudo, libpng, php5, tgt, iscsitarget, aria2, pcsc-lite, tomcat5, tomcat6, lvm2, libvirt, rpm, libtiff, dovecot12)
Source: SUSE Type: SUSE-SR:2010:018 SUSE Security Summary Report
|
Vulnerable Configuration: | Configuration 1: cpe:/a:php:php:5.2.0:*:*:*:*:*:*:*OR cpe:/a:php:php:5.2.1:-:*:*:*:*:*:*OR cpe:/a:php:php:5.2.2:-:*:*:*:*:*:*OR cpe:/a:php:php:5.2.3:-:*:*:*:*:*:*OR cpe:/a:php:php:5.2.4:-:*:*:*:*:*:*OR cpe:/a:php:php:5.2.5:-:*:*:*:*:*:*OR cpe:/a:php:php:5.2.6:-:*:*:*:*:*:*OR cpe:/a:php:php:5.2.7:-:*:*:*:*:*:*OR cpe:/a:php:php:5.2.8:*:*:*:*:*:*:*OR cpe:/a:php:php:5.2.9:-:*:*:*:*:*:*OR cpe:/a:php:php:5.2.10:-:*:*:*:*:*:*OR cpe:/a:php:php:5.2.11:-:*:*:*:*:*:*OR cpe:/a:php:php:5.2.12:-:*:*:*:*:*:*OR cpe:/a:php:php:5.3.0:*:*:*:*:*:*:*OR cpe:/a:php:php:5.3.1:-:*:*:*:*:*:*OR cpe:/a:php:php:5.3.2:-:*:*:*:*:*:* Configuration CCN 1: cpe:/a:php:php:5.2.0:*:*:*:*:*:*:*OR cpe:/a:php:php:5.2.1:-:*:*:*:*:*:*OR cpe:/a:php:php:5.2.3:-:*:*:*:*:*:*OR cpe:/a:php:php:5.2.2:-:*:*:*:*:*:*OR cpe:/a:php:php:5.2.4:-:*:*:*:*:*:*OR cpe:/a:php:php:5.2.5:-:*:*:*:*:*:*OR cpe:/a:php:php:5.2.6:-:*:*:*:*:*:*OR cpe:/a:php:php:5.2.7:-:*:*:*:*:*:*OR cpe:/a:php:php:5.2.8:*:*:*:*:*:*:*OR cpe:/a:php:php:5.2.9:-:*:*:*:*:*:*OR cpe:/a:php:php:5.2.10:-:*:*:*:*:*:*OR cpe:/a:php:php:5.2.11:-:*:*:*:*:*:*OR cpe:/a:php:php:5.3.0:*:*:*:*:*:*:*OR cpe:/a:php:php:5.2.12:-:*:*:*:*:*:*OR cpe:/a:php:php:5.3.1:-:*:*:*:*:*:*OR cpe:/a:php:php:5.3.2:-:*:*:*:*:*:*
Denotes that component is vulnerable |
Oval Definitions |
|
BACK |