Vulnerability Name:

CVE-2010-2191 (CCN-59221)

Assigned:2010-05-31
Published:2010-05-31
Updated:2017-08-17
Summary:The (1) parse_str, (2) preg_match, (3) unpack, and (4) pack functions; the (5) ZEND_FETCH_RW, (6) ZEND_CONCAT, and (7) ZEND_ASSIGN_CONCAT opcodes; and the (8) ArrayObject::uasort method in PHP 5.2 through 5.2.13 and 5.3 through 5.3.2 allow context-dependent attackers to obtain sensitive information (memory contents) or trigger memory corruption by causing a userspace interruption of an internal function or handler.
Note: vectors 2 through 4 are related to the call time pass by reference feature.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): None
Availibility (A): None
CVSS v2 Severity:6.4 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N)
5.5 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N/E:POC/RL:U/RC:UR)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): None
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
4.2 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N/E:POC/RL:U/RC:UR)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
Vulnerability Type:CWE-119
Vulnerability Consequences:Obtain Information
References:Source: MITRE
Type: CNA
CVE-2010-2191

Source: SUSE
Type: UNKNOWN
SUSE-SR:2010:017

Source: SUSE
Type: UNKNOWN
SUSE-SR:2010:018

Source: HP
Type: UNKNOWN
SSRT100826

Source: CCN
Type: OSVDB ID: 66101
PHP ArrayObject::uasort Method Userspace Interuption Memory Corruption

Source: CCN
Type: OSVDB ID: 66102
PHP ZEND_*CONCAT Opcodes Userspace Interuption Memory Corruption

Source: CCN
Type: OSVDB ID: 66103
PHP ZEND_FETCH_RW Opcodes Userspace Interuption Memory Corruption

Source: CCN
Type: OSVDB ID: 66104
PHP unpack / pack Functions Userspace Interuption Memory Corruption

Source: CCN
Type: OSVDB ID: 66105
PHP preg_match Function Userspace Interuption Memory Corruption

Source: CCN
Type: OSVDB ID: 66106
PHP parse_str Function Userspace Interuption Memory Corruption

Source: CCN
Type: MOPS-2010-049
PHP parse_str() Interruption Memory Corruption Vulnerability

Source: MISC
Type: Exploit
http://www.php-security.org/2010/05/31/mops-2010-049-php-parse_str-interruption-memory-corruption-vulnerability/index.html

Source: MISC
Type: Exploit
http://www.php-security.org/2010/05/31/mops-2010-050-php-preg_match-interruption-information-leak-vulnerability/index.html

Source: MISC
Type: Exploit
http://www.php-security.org/2010/05/31/mops-2010-051-php-unpack-interruption-information-leak-vulnerability/index.html

Source: MISC
Type: Exploit
http://www.php-security.org/2010/05/31/mops-2010-052-php-pack-interruption-information-leak-vulnerability/index.html

Source: MISC
Type: Exploit
http://www.php-security.org/2010/05/31/mops-2010-053-php-zend_fetch_rw-opcode-interruption-information-leak-vulnerability/index.html

Source: MISC
Type: Exploit
http://www.php-security.org/2010/05/31/mops-2010-054-php-zend_concatzend_assign_concat-opcode-interruption-information-leak-and-memory-corruption-vulnerability/index.html

Source: MISC
Type: Exploit
http://www.php-security.org/2010/05/31/mops-2010-055-php-arrayobjectuasort-interruption-memory-corruption-vulnerability/index.html

Source: CCN
Type: PHP Web site
PHP: Hypertext Preprocessor

Source: XF
Type: UNKNOWN
php-parsestr-info-disclosure(59221)

Source: XF
Type: UNKNOWN
php-parsestr-info-disclosure(59221)

Source: SUSE
Type: SUSE-SR:2010:017
(java-1_4_2-ibm, sudo, libpng, php5, tgt, iscsitarget, aria2, pcsc-lite, tomcat5, tomcat6, lvm2, libvirt, rpm, libtiff, dovecot12)

Source: SUSE
Type: SUSE-SR:2010:018
SUSE Security Summary Report

Vulnerable Configuration:Configuration 1:
  • cpe:/a:php:php:5.2.0:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.1:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.2:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.3:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.4:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.5:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.6:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.7:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.8:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.9:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.10:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.11:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.12:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.13:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.3.0:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.3.1:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.3.2:-:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:php:php:5.2.0:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.1:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.3:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.2:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.4:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.5:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.6:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.7:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.8:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.9:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.10:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.11:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.3.0:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.12:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.3.1:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.3.2:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.13:-:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20102191
    V
    CVE-2010-2191
    2015-11-16
    BACK
    php php 5.2.0
    php php 5.2.1
    php php 5.2.2
    php php 5.2.3
    php php 5.2.4
    php php 5.2.5
    php php 5.2.6
    php php 5.2.7
    php php 5.2.8
    php php 5.2.9
    php php 5.2.10
    php php 5.2.11
    php php 5.2.12
    php php 5.2.13
    php php 5.3.0
    php php 5.3.1
    php php 5.3.2
    php php 5.2.0
    php php 5.2.1
    php php 5.2.3
    php php 5.2.2
    php php 5.2.4
    php php 5.2.5
    php php 5.2.6
    php php 5.2.7
    php php 5.2.8
    php php 5.2.9
    php php 5.2.10
    php php 5.2.11
    php php 5.3.0
    php php 5.2.12
    php php 5.3.1
    php php 5.3.2
    php php 5.2.13