Vulnerability Name: | CVE-2010-2531 (CCN-60742) |
Assigned: | 2010-07-09 |
Published: | 2010-07-09 |
Updated: | 2023-01-19 |
Summary: | The var_export function in PHP 5.2 before 5.2.14 and 5.3 before 5.3.3 flushes the output buffer to the user when certain fatal errors occur, even if display_errors is off, which allows remote attackers to obtain sensitive information by causing the application to exceed limits for memory, execution time, or recursion. |
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): Low Integrity (I): None Availibility (A): None |
|
CVSS v2 Severity: | 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N) 3.2 Low (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Medium Authentication (Au): None | Impact Metrics: | Confidentiality (C): Partial Integrity (I): None Availibility (A): None | 5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N) 3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Athentication (Au): None
| Impact Metrics: | Confidentiality (C): Partial Integrity (I): None Availibility (A): None | 4.3 Medium (REDHAT CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N) 3.2 Low (REDHAT Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Medium Authentication (Au): None | Impact Metrics: | Confidentiality (C): Partial Integrity (I): None Availibility (A): None |
|
Vulnerability Consequences: | Obtain Information |
References: | Source: MITRE Type: CNA CVE-2010-2531
Source: secalert@redhat.com Type: Mailing List, Third Party Advisory secalert@redhat.com
Source: secalert@redhat.com Type: Mailing List, Third Party Advisory secalert@redhat.com
Source: secalert@redhat.com Type: Mailing List, Third Party Advisory secalert@redhat.com
Source: secalert@redhat.com Type: Mailing List, Third Party Advisory secalert@redhat.com
Source: secalert@redhat.com Type: Mailing List, Third Party Advisory secalert@redhat.com
Source: secalert@redhat.com Type: Mailing List, Third Party Advisory secalert@redhat.com
Source: CCN Type: RHSA-2010-0919 Moderate: php security update
Source: CCN Type: Apple Web site About Security Update 2010-005
Source: secalert@redhat.com Type: Third Party Advisory secalert@redhat.com
Source: secalert@redhat.com Type: Third Party Advisory secalert@redhat.com
Source: secalert@redhat.com Type: Vendor Advisory secalert@redhat.com
Source: secalert@redhat.com Type: Third Party Advisory secalert@redhat.com
Source: DEBIAN Type: DSA-2266 php5 -- several vulnerabilities
Source: secalert@redhat.com Type: Mailing List, Third Party Advisory secalert@redhat.com
Source: secalert@redhat.com Type: Mailing List, Third Party Advisory secalert@redhat.com
Source: CCN Type: OSVDB ID: 66805 PHP var_export() Function Fata Error Information Disclosure
Source: CCN Type: PHP Web site PHP: Hypertext Preprocessor
Source: secalert@redhat.com Type: Vendor Advisory secalert@redhat.com
Source: secalert@redhat.com Type: Vendor Advisory secalert@redhat.com
Source: secalert@redhat.com Type: Third Party Advisory secalert@redhat.com
Source: CCN Type: BID-41991 PHP Versions Prior to 5.3.3/5.2.14 Multiple Vulnerabilities
Source: secalert@redhat.com Type: Permissions Required secalert@redhat.com
Source: CCN Type: Red Hat Bugzilla Bug 617673 CVE-2010-2531 php: information leak vulnerability in var_export()
Source: secalert@redhat.com Type: Issue Tracking, Third Party Advisory secalert@redhat.com
Source: XF Type: UNKNOWN php-varexport-info-disclosure(60742)
Source: SUSE Type: SUSE-SR:2010:017 (java-1_4_2-ibm, sudo, libpng, php5, tgt, iscsitarget, aria2, pcsc-lite, tomcat5, tomcat6, lvm2, libvirt, rpm, libtiff, dovecot12)
Source: SUSE Type: SUSE-SR:2010:018 SUSE Security Summary Report
|
Vulnerable Configuration: | Configuration RedHat 1: cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:*Configuration RedHat 2: cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*Configuration RedHat 3: cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*Configuration RedHat 4: cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*Configuration RedHat 5: cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*Configuration RedHat 6: cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*Configuration RedHat 7: cpe:/o:redhat:enterprise_linux:5::client_workstation:*:*:*:*:*Configuration RedHat 8: cpe:/o:redhat:enterprise_linux:5::server:*:*:*:*:* Configuration CCN 1: cpe:/a:php:php:5.2.0:*:*:*:*:*:*:*OR cpe:/a:php:php:5.2.1:-:*:*:*:*:*:*OR cpe:/a:php:php:5.2.3:-:*:*:*:*:*:*OR cpe:/a:php:php:5.2.2:-:*:*:*:*:*:*OR cpe:/a:php:php:5.2.4:-:*:*:*:*:*:*OR cpe:/a:php:php:5.2.5:-:*:*:*:*:*:*OR cpe:/a:php:php:5.2.6:-:*:*:*:*:*:*OR cpe:/a:php:php:5.2.7:-:*:*:*:*:*:*OR cpe:/a:php:php:5.2.8:*:*:*:*:*:*:*OR cpe:/a:php:php:5.2.9:-:*:*:*:*:*:*OR cpe:/a:php:php:5.2.10:-:*:*:*:*:*:*OR cpe:/a:php:php:5.2.11:-:*:*:*:*:*:*OR cpe:/a:php:php:5.3.0:*:*:*:*:*:*:*OR cpe:/a:php:php:5.2.12:-:*:*:*:*:*:*OR cpe:/a:php:php:5.3.1:-:*:*:*:*:*:*OR cpe:/a:php:php:5.3.2:-:*:*:*:*:*:*OR cpe:/a:php:php:5.2.13:-:*:*:*:*:*:*AND cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0::x86_64:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux:2008.0::x86-64:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux:2008.0:*:*:*:*:*:*:*OR cpe:/o:mandriva:linux:2009.0:*:*:*:*:*:*:*OR cpe:/o:mandriva:linux:2009.0:-:x86_64:*:*:*:*:*OR cpe:/o:mandriva:linux:2009.1:*:*:*:*:*:*:*OR cpe:/o:mandriva:linux:2009.1:*:*:*:x86_64:*:*:*OR cpe:/o:apple:mac_os_x_server:10.6.4:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.6.4:*:*:*:*:*:*:*OR cpe:/o:mandriva:enterprise_server:5:*:*:*:*:*:*:*OR cpe:/o:mandriva:enterprise_server:5:*:*:*:x86_64:*:*:*OR cpe:/o:mandriva:linux:2010:*:*:*:x86_64:*:*:*OR cpe:/o:mandriva:linux:2010:*:*:*:*:*:*:*
Denotes that component is vulnerable |
Oval Definitions |
|
BACK |
php php 5.2.0
php php 5.2.1
php php 5.2.3
php php 5.2.2
php php 5.2.4
php php 5.2.5
php php 5.2.6
php php 5.2.7
php php 5.2.8
php php 5.2.9
php php 5.2.10
php php 5.2.11
php php 5.3.0
php php 5.2.12
php php 5.3.1
php php 5.3.2
php php 5.2.13
redhat enterprise linux 4
redhat enterprise linux 4
redhat enterprise linux 4
redhat enterprise linux 4
mandrakesoft mandrake linux corporate server 4.0
mandrakesoft mandrake linux corporate server 4.0
redhat enterprise linux 5
redhat enterprise linux 5
mandrakesoft mandrake linux 2008.0
mandrakesoft mandrake linux 2008.0
mandriva linux 2009.0
mandriva linux 2009.0 -
mandriva linux 2009.1
mandriva linux 2009.1
apple mac os x server 10.6.4
apple mac os x 10.6.4
mandriva enterprise server 5
mandriva enterprise server 5
mandriva linux 2010
mandriva linux 2010