The Zend Engine in PHP 5.2 through 5.2.13 and 5.3 through 5.3.2 allows context-dependent attackers to obtain sensitive information by interrupting the handler for the (1) ZEND_BW_XOR opcode (shift_left_function), (2) ZEND_SL opcode (bitwise_xor_function), or (3) ZEND_SR opcode (shift_right_function), related to the convert_to_long_base function.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:15
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html - | |
References | () http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00000.html - | |
References | () http://www.php-security.org/2010/05/08/mops-2010-014-php-zend_bw_xor-opcode-interruption-address-information-leak-vulnerability/index.html - Exploit | |
References | () http://www.php-security.org/2010/05/08/mops-2010-015-php-zend_sl-opcode-interruption-address-information-leak-vulnerability/index.html - Exploit | |
References | () http://www.php-security.org/2010/05/08/mops-2010-016-php-zend_sr-opcode-interruption-address-information-leak-vulnerability/index.html - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/58587 - |
Information
Published : 2010-05-12 11:46
Updated : 2024-11-21 01:15
NVD link : CVE-2010-1914
Mitre link : CVE-2010-1914
CVE.ORG link : CVE-2010-1914
JSON object : View
Products Affected
php
- php
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor