The ZipArchive::getArchiveComment function in PHP 5.2.x through 5.2.14 and 5.3.x through 5.3.3 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted ZIP archive.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 01:19
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html - Mailing List, Third Party Advisory | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052836.html - Mailing List, Third Party Advisory | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052845.html - Mailing List, Third Party Advisory | |
References | () http://marc.info/?l=bugtraq&m=130331363227777&w=2 - Mailing List, Third Party Advisory | |
References | () http://marc.info/?l=bugtraq&m=133469208622507&w=2 - Mailing List, Third Party Advisory | |
References | () http://secunia.com/advisories/42729 - Broken Link | |
References | () http://secunia.com/advisories/42812 - Broken Link | |
References | () http://securityreason.com/achievement_securityalert/90 - Third Party Advisory | |
References | () http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.490619 - Third Party Advisory | |
References | () http://support.apple.com/kb/HT4581 - Third Party Advisory | |
References | () http://svn.php.net/viewvc/php/php-src/branches/PHP_5_2/ext/zip/php_zip.c?view=log - Patch, Vendor Advisory | |
References | () http://svn.php.net/viewvc/php/php-src/branches/PHP_5_3/ext/zip/php_zip.c?view=log - Patch, Vendor Advisory | |
References | () http://www.exploit-db.com/exploits/15431 - Exploit, Third Party Advisory, VDB Entry | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2010:218 - Broken Link | |
References | () http://www.php.net/ChangeLog-5.php - Vendor Advisory | |
References | () http://www.php.net/archive/2010.php#id2010-12-10-1 - Vendor Advisory | |
References | () http://www.php.net/releases/5_2_15.php - Vendor Advisory | |
References | () http://www.php.net/releases/5_3_4.php - Vendor Advisory | |
References | () http://www.redhat.com/support/errata/RHSA-2011-0195.html - Third Party Advisory | |
References | () http://www.securityfocus.com/bid/44718 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id?1024690 - Third Party Advisory, VDB Entry | |
References | () http://www.ubuntu.com/usn/USN-1042-1 - Third Party Advisory | |
References | () http://www.vupen.com/english/advisories/2010/3313 - Permissions Required | |
References | () http://www.vupen.com/english/advisories/2011/0020 - Permissions Required | |
References | () http://www.vupen.com/english/advisories/2011/0021 - Permissions Required | |
References | () http://www.vupen.com/english/advisories/2011/0077 - Permissions Required |
Information
Published : 2010-11-09 01:00
Updated : 2024-11-21 01:19
NVD link : CVE-2010-3709
Mitre link : CVE-2010-3709
CVE.ORG link : CVE-2010-3709
JSON object : View
Products Affected
php
- php
canonical
- ubuntu_linux
CWE
CWE-20
Improper Input Validation