Vulnerability Name:

CVE-2011-1148 (CCN-66080)

Assigned:2011-03-13
Published:2011-03-13
Updated:2018-10-30
Summary:Use-after-free vulnerability in the substr_replace function in PHP 5.3.6 and earlier allows context-dependent attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact by using the same variable for multiple arguments.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
5.5 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
5.5 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
6.8 Medium (REDHAT CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
5.0 Medium (REDHAT Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-399
CWE-416
Vulnerability Consequences:Gain Access
References:Source: CONFIRM
Type: UNKNOWN
http://bugs.php.net/bug.php?id=54238

Source: MITRE
Type: CNA
CVE-2011-1148

Source: CCN
Type: Kolab Mailing List, Wed Sep 14 14:35:07 CEST 2011
Announcing the Kolab Server 2.3.3

Source: APPLE
Type: UNKNOWN
APPLE-SA-2012-02-01-1

Source: HP
Type: UNKNOWN
SSRT100826

Source: MLIST
Type: UNKNOWN
[oss-security] 20110313 CVE request: PHP substr_replace() use-after-free

Source: MLIST
Type: UNKNOWN
[oss-security] 20110313 Re: CVE request: PHP substr_replace() use-after-free

Source: MLIST
Type: UNKNOWN
[oss-security] 20110313 Re: CVE request: PHP substr_replace() use-after-free

Source: CCN
Type: oss-security: Eugene Teo | 13 Mar 16:27
Re: CVE request: PHP substr_replace() use-after-free

Source: CCN
Type: RHSA-2011-1423
Moderate: php53 and php security update

Source: CCN
Type: RHSA-2012-0033
Moderate: php security update

Source: CCN
Type: SA45977
Kolab Server Multiple vulnerabilities

Source: CONFIRM
Type: UNKNOWN
http://support.apple.com/kb/HT5130

Source: DEBIAN
Type: DSA-2408
php5 -- several vulnerabilities

Source: MANDRIVA
Type: UNKNOWN
MDVSA-2011:165

Source: CCN
Type: OSVDB ID: 73218
PHP substr_replace Function Repeated Argument Variable Memory Corruption

Source: CCN
Type: PHP Web site
PHP: Hypertext Preprocessor

Source: CONFIRM
Type: UNKNOWN
http://www.php.net/archive/2011.php#id2011-08-18-1

Source: CONFIRM
Type: UNKNOWN
http://www.php.net/ChangeLog-5.php#5.3.7

Source: REDHAT
Type: UNKNOWN
RHSA-2011:1423

Source: BID
Type: UNKNOWN
46843

Source: CCN
Type: BID-46843
PHP 'substr_replace()' Use After Free Remote Memory Corruption Vulnerability

Source: BID
Type: UNKNOWN
49241

Source: CCN
Type: BID-49241
PHP Versions Prior to 5.3.7 Multiple Security Vulnerabilities

Source: XF
Type: UNKNOWN
php-substrreplace-code-exec(66080)

Source: XF
Type: UNKNOWN
php-substrreplace-code-exec(66080)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:php:php:1.0.0:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:2.0:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:2.0b10:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:3.0:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:3.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:3.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:3.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:3.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:3.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:3.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:3.0.7:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:3.0.8:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:3.0.9:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:3.0.10:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:3.0.11:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:3.0.12:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:3.0.13:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:3.0.14:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:3.0.15:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:3.0.16:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:3.0.17:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:3.0.18:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.0:beta1:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.0:beta2:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.0:beta3:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.0:beta4:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.0:beta_4_patch1:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.0.1:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.0.4:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.0.5:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.0.6:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.0.7:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.1.0:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.2.0:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.2.1:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.2.3:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.3.0:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.3.2:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.3.3:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.3.4:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.3.5:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.3.6:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.3.7:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.3.8:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.3.9:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.3.10:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.3.11:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.4.0:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.4.1:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.4.2:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.4.3:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.4.4:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.4.5:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.4.6:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.4.7:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.4.8:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.4.9:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.3.0:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.3.1:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.3.2:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.3.3:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.3.4:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.3.5:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:*:*:*:*:*:*:*:* (Version <= 5.3.6)

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:5::client_workstation:*:*:*:*:*

  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:5::server:*:*:*:*:*

  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:6:*:*:*:*:*:*:*

  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:6::server:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:php:php:5.2.0:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.1:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.3:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.2:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.4:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.5:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.6:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.7:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.8:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.9:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.10:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.11:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.3.0:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.12:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.3.1:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.3.2:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.13:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.3.3:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.3.4:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.3.5:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.3.6:*:*:*:*:*:*:*
  • AND
  • cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:6:*:server:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:6:*:workstation:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_desktop:6:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_hpc_node:6:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_server_eus:6.1.z:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20111148
    V
    CVE-2011-1148
    2022-05-20
    oval:org.opensuse.security:def:31224
    P
    Security update for the Linux Kernel (Live Patch 39 for SLE 12 SP3) (Important)
    2021-07-21
    oval:org.opensuse.security:def:42077
    P
    Security update for curl (Moderate)
    2021-05-26
    oval:org.opensuse.security:def:31150
    P
    Security update for xorg-x11-server (Important)
    2021-04-14
    oval:org.opensuse.security:def:31748
    P
    Security update for openssl (Moderate)
    2021-03-24
    oval:org.opensuse.security:def:31356
    P
    Security update for python (Moderate)
    2021-03-16
    oval:org.opensuse.security:def:35670
    P
    apache2-mod_php5-5.2.14-0.7.24.1 on GA media (Moderate)
    2020-12-03
    oval:org.opensuse.security:def:31448
    P
    Security update for postgresql-init (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25233
    P
    Security update for ImageMagick (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:32596
    P
    postgresql on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25939
    P
    Security update for gstreamer-0_10-plugins-base (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31592
    P
    Security update for tiff (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25425
    P
    Security update for bluez (Important)
    2020-12-01
    oval:org.opensuse.security:def:31138
    P
    Security update for lcms
    2020-12-01
    oval:org.opensuse.security:def:25997
    P
    Security update for the Linux Kernel (Important)
    2020-12-01
    oval:org.opensuse.security:def:31804
    P
    Security update for ant (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25563
    P
    Security update for xrdp (Important)
    2020-12-01
    oval:org.opensuse.security:def:26670
    P
    apache2-mod_php5 on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31892
    P
    Security update for expat (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25798
    P
    Security update for flash-player (Critical)
    2020-12-01
    oval:org.opensuse.security:def:25222
    P
    Security update for java-1_8_0-openjdk (Important)
    2020-12-01
    oval:org.opensuse.security:def:31958
    P
    Security update for gtk2 (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25900
    P
    Security update for the Linux Kernel (Important)
    2020-12-01
    oval:org.opensuse.security:def:31505
    P
    Security update for python27 (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25297
    P
    Security update for libX11 (Important)
    2020-12-01
    oval:org.opensuse.security:def:32635
    P
    apache2-mod_php5 on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25953
    P
    Security update for gcc48 (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25506
    P
    Security update for openexr (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31139
    P
    Security update for less (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26635
    P
    quagga on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31853
    P
    Security update for coreutils (Important)
    2020-12-01
    oval:org.opensuse.security:def:25647
    P
    Security update for freetype2 (Important)
    2020-12-01
    oval:org.opensuse.security:def:25221
    P
    Security update for sysstat (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31914
    P
    Security update for gd (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25851
    P
    Security update for freerdp (Moderate)
    2020-12-01
    oval:org.mitre.oval:def:13955
    P
    USN-1126-2 -- php5 regressions
    2014-06-30
    oval:org.mitre.oval:def:13989
    P
    USN-1126-1 -- php5 vulnerabilities
    2014-06-30
    oval:org.mitre.oval:def:15188
    P
    DSA-2408-1 php5 -- several
    2014-06-23
    oval:org.mitre.oval:def:23207
    P
    ELSA-2012:0033: php security update (Moderate)
    2014-05-26
    oval:org.mitre.oval:def:23530
    P
    ELSA-2011:1423: php53 and php security update (Moderate)
    2014-05-26
    oval:org.mitre.oval:def:21346
    P
    RHSA-2012:0033: php security update (Moderate)
    2014-02-24
    oval:org.mitre.oval:def:21761
    P
    RHSA-2011:1423: php53 and php security update (Moderate)
    2014-02-24
    oval:com.redhat.rhsa:def:20120033
    P
    RHSA-2012:0033: php security update (Moderate)
    2012-01-18
    oval:com.redhat.rhsa:def:20111423
    P
    RHSA-2011:1423: php53 and php security update (Moderate)
    2011-11-02
    BACK
    php php 1.0
    php php 2.0
    php php 2.0b10
    php php 3.0
    php php 3.0.1
    php php 3.0.2
    php php 3.0.3
    php php 3.0.4
    php php 3.0.5
    php php 3.0.6
    php php 3.0.7
    php php 3.0.8
    php php 3.0.9
    php php 3.0.10
    php php 3.0.11
    php php 3.0.12
    php php 3.0.13
    php php 3.0.14
    php php 3.0.15
    php php 3.0.16
    php php 3.0.17
    php php 3.0.18
    php php 4.0
    php php 4.0 beta1
    php php 4.0 beta2
    php php 4.0 beta3
    php php 4.0 beta4
    php php 4.0 beta_4_patch1
    php php 4.0.0
    php php 4.0.1
    php php 4.0.2
    php php 4.0.3
    php php 4.0.4
    php php 4.0.5
    php php 4.0.6
    php php 4.0.7
    php php 4.1.0
    php php 4.1.1
    php php 4.1.2
    php php 4.2.0
    php php 4.2.1
    php php 4.2.2
    php php 4.2.3
    php php 4.3.0
    php php 4.3.1
    php php 4.3.2
    php php 4.3.3
    php php 4.3.4
    php php 4.3.5
    php php 4.3.6
    php php 4.3.7
    php php 4.3.8
    php php 4.3.9
    php php 4.3.10
    php php 4.3.11
    php php 4.4.0
    php php 4.4.1
    php php 4.4.2
    php php 4.4.3
    php php 4.4.4
    php php 4.4.5
    php php 4.4.6
    php php 4.4.7
    php php 4.4.8
    php php 4.4.9
    php php 5.3.0
    php php 5.3.1
    php php 5.3.2
    php php 5.3.3
    php php 5.3.4
    php php 5.3.5
    php php *
    php php 5.2.0
    php php 5.2.1
    php php 5.2.3
    php php 5.2.2
    php php 5.2.4
    php php 5.2.5
    php php 5.2.6
    php php 5.2.7
    php php 5.2.8
    php php 5.2.9
    php php 5.2.10
    php php 5.2.11
    php php 5.3.0
    php php 5.2.12
    php php 5.3.1
    php php 5.3.2
    php php 5.2.13
    php php 5.3.3
    php php 5.3.4
    php php 5.3.5
    php php 5.3.6
    redhat enterprise linux 5
    redhat enterprise linux 5
    redhat enterprise linux 6
    redhat enterprise linux 6
    redhat enterprise linux desktop 6
    redhat enterprise linux hpc node 6
    redhat enterprise linux server eus 6.1.z