CVE-2010-4156

The mb_strcut function in Libmbfl 1.1.0, as used in PHP 5.3.x through 5.3.3, allows context-dependent attackers to obtain potentially sensitive information via a large value of the third parameter (aka the length parameter).
References
Link Resource
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052836.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052845.html
http://marc.info/?l=bugtraq&m=130331363227777&w=2
http://marc.info/?l=bugtraq&m=130331363227777&w=2
http://pastie.org/1279428 Patch
http://pastie.org/1279682 Patch
http://secunia.com/advisories/42135
http://secunia.com/advisories/42812
http://secunia.com/advisories/43189
http://www.mandriva.com/security/advisories?name=MDVSA-2010:225
http://www.openwall.com/lists/oss-security/2010/11/07/2 Exploit Patch
http://www.openwall.com/lists/oss-security/2010/11/08/13 Exploit Patch
http://www.php.net/ChangeLog-5.php
http://www.redhat.com/support/errata/RHSA-2011-0196.html
http://www.securityfocus.com/bid/44727 Exploit
http://www.ubuntu.com/usn/USN-1042-1
http://www.vupen.com/english/advisories/2011/0020
http://www.vupen.com/english/advisories/2011/0021
http://www.vupen.com/english/advisories/2011/0077
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052836.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052845.html
http://marc.info/?l=bugtraq&m=130331363227777&w=2
http://marc.info/?l=bugtraq&m=130331363227777&w=2
http://pastie.org/1279428 Patch
http://pastie.org/1279682 Patch
http://secunia.com/advisories/42135
http://secunia.com/advisories/42812
http://secunia.com/advisories/43189
http://www.mandriva.com/security/advisories?name=MDVSA-2010:225
http://www.openwall.com/lists/oss-security/2010/11/07/2 Exploit Patch
http://www.openwall.com/lists/oss-security/2010/11/08/13 Exploit Patch
http://www.php.net/ChangeLog-5.php
http://www.redhat.com/support/errata/RHSA-2011-0196.html
http://www.securityfocus.com/bid/44727 Exploit
http://www.ubuntu.com/usn/USN-1042-1
http://www.vupen.com/english/advisories/2011/0020
http://www.vupen.com/english/advisories/2011/0021
http://www.vupen.com/english/advisories/2011/0077
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:php:php:5.3.0:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.3.1:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.3.2:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.3.3:*:*:*:*:*:*:*
cpe:2.3:a:scottmac:libmbfl:1.1.0:*:*:*:*:*:*:*

History

21 Nov 2024, 01:20

Type Values Removed Values Added
References () http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052836.html - () http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052836.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052845.html - () http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052845.html -
References () http://marc.info/?l=bugtraq&m=130331363227777&w=2 - () http://marc.info/?l=bugtraq&m=130331363227777&w=2 -
References () http://pastie.org/1279428 - Patch () http://pastie.org/1279428 - Patch
References () http://pastie.org/1279682 - Patch () http://pastie.org/1279682 - Patch
References () http://secunia.com/advisories/42135 - () http://secunia.com/advisories/42135 -
References () http://secunia.com/advisories/42812 - () http://secunia.com/advisories/42812 -
References () http://secunia.com/advisories/43189 - () http://secunia.com/advisories/43189 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2010:225 - () http://www.mandriva.com/security/advisories?name=MDVSA-2010:225 -
References () http://www.openwall.com/lists/oss-security/2010/11/07/2 - Exploit, Patch () http://www.openwall.com/lists/oss-security/2010/11/07/2 - Exploit, Patch
References () http://www.openwall.com/lists/oss-security/2010/11/08/13 - Exploit, Patch () http://www.openwall.com/lists/oss-security/2010/11/08/13 - Exploit, Patch
References () http://www.php.net/ChangeLog-5.php - () http://www.php.net/ChangeLog-5.php -
References () http://www.redhat.com/support/errata/RHSA-2011-0196.html - () http://www.redhat.com/support/errata/RHSA-2011-0196.html -
References () http://www.securityfocus.com/bid/44727 - Exploit () http://www.securityfocus.com/bid/44727 - Exploit
References () http://www.ubuntu.com/usn/USN-1042-1 - () http://www.ubuntu.com/usn/USN-1042-1 -
References () http://www.vupen.com/english/advisories/2011/0020 - () http://www.vupen.com/english/advisories/2011/0020 -
References () http://www.vupen.com/english/advisories/2011/0021 - () http://www.vupen.com/english/advisories/2011/0021 -
References () http://www.vupen.com/english/advisories/2011/0077 - () http://www.vupen.com/english/advisories/2011/0077 -

Information

Published : 2010-11-10 03:00

Updated : 2024-11-21 01:20


NVD link : CVE-2010-4156

Mitre link : CVE-2010-4156

CVE.ORG link : CVE-2010-4156


JSON object : View

Products Affected

scottmac

  • libmbfl

php

  • php
CWE
CWE-20

Improper Input Validation