CVE-2010-4645

strtod.c, as used in the zend_strtod function in PHP 5.2 before 5.2.17 and 5.3 before 5.3.5, and other products, allows context-dependent attackers to cause a denial of service (infinite loop) via a certain floating-point value in scientific notation, which is not properly handled in x87 FPU registers, as demonstrated using 2.2250738585072011e-308.
References
Link Resource
http://bugs.php.net/53632 Exploit
http://hal.archives-ouvertes.fr/docs/00/28/14/29/PDF/floating-point-article.pdf
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053333.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053355.html
http://marc.info/?l=bugtraq&m=133226187115472&w=2
http://marc.info/?l=bugtraq&m=133469208622507&w=2
http://secunia.com/advisories/42812
http://secunia.com/advisories/42843
http://secunia.com/advisories/43051
http://secunia.com/advisories/43189
http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.484686
http://support.apple.com/kb/HT5002
http://svn.php.net/viewvc/php/php-src/branches/PHP_5_2/Zend/zend_strtod.c?r1=266327&r2=307095&pathrev=307095 Patch
http://www.exploringbinary.com/php-hangs-on-numeric-value-2-2250738585072011e-308/
http://www.openwall.com/lists/oss-security/2011/01/05/2 Exploit Patch
http://www.openwall.com/lists/oss-security/2011/01/05/8
http://www.openwall.com/lists/oss-security/2011/01/06/5
http://www.openwall.com/lists/oss-security/2023/05/14/3
http://www.redhat.com/support/errata/RHSA-2011-0195.html
http://www.redhat.com/support/errata/RHSA-2011-0196.html
http://www.securityfocus.com/bid/45668 Exploit
http://www.ubuntu.com/usn/USN-1042-1
http://www.vupen.com/english/advisories/2011/0060 Vendor Advisory
http://www.vupen.com/english/advisories/2011/0066
http://www.vupen.com/english/advisories/2011/0077
http://www.vupen.com/english/advisories/2011/0198
https://exchange.xforce.ibmcloud.com/vulnerabilities/64470
http://bugs.php.net/53632 Exploit
http://hal.archives-ouvertes.fr/docs/00/28/14/29/PDF/floating-point-article.pdf
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053333.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053355.html
http://marc.info/?l=bugtraq&m=133226187115472&w=2
http://marc.info/?l=bugtraq&m=133469208622507&w=2
http://secunia.com/advisories/42812
http://secunia.com/advisories/42843
http://secunia.com/advisories/43051
http://secunia.com/advisories/43189
http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.484686
http://support.apple.com/kb/HT5002
http://svn.php.net/viewvc/php/php-src/branches/PHP_5_2/Zend/zend_strtod.c?r1=266327&r2=307095&pathrev=307095 Patch
http://www.exploringbinary.com/php-hangs-on-numeric-value-2-2250738585072011e-308/
http://www.openwall.com/lists/oss-security/2011/01/05/2 Exploit Patch
http://www.openwall.com/lists/oss-security/2011/01/05/8
http://www.openwall.com/lists/oss-security/2011/01/06/5
http://www.openwall.com/lists/oss-security/2023/05/14/3
http://www.redhat.com/support/errata/RHSA-2011-0195.html
http://www.redhat.com/support/errata/RHSA-2011-0196.html
http://www.securityfocus.com/bid/45668 Exploit
http://www.ubuntu.com/usn/USN-1042-1
http://www.vupen.com/english/advisories/2011/0060 Vendor Advisory
http://www.vupen.com/english/advisories/2011/0066
http://www.vupen.com/english/advisories/2011/0077
http://www.vupen.com/english/advisories/2011/0198
https://exchange.xforce.ibmcloud.com/vulnerabilities/64470
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.2.2:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.2.3:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.2.4:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.2.5:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.2.6:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.2.7:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.2.8:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.2.9:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.2.10:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.2.11:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.2.12:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.2.13:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.2.14:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.2.15:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.2.16:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:php:php:5.3.0:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.3.1:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.3.2:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.3.3:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.3.4:*:*:*:*:*:*:*

History

21 Nov 2024, 01:21

Type Values Removed Values Added
References () http://bugs.php.net/53632 - Exploit () http://bugs.php.net/53632 - Exploit
References () http://hal.archives-ouvertes.fr/docs/00/28/14/29/PDF/floating-point-article.pdf - () http://hal.archives-ouvertes.fr/docs/00/28/14/29/PDF/floating-point-article.pdf -
References () http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html - () http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053333.html - () http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053333.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053355.html - () http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053355.html -
References () http://marc.info/?l=bugtraq&m=133226187115472&w=2 - () http://marc.info/?l=bugtraq&m=133226187115472&w=2 -
References () http://marc.info/?l=bugtraq&m=133469208622507&w=2 - () http://marc.info/?l=bugtraq&m=133469208622507&w=2 -
References () http://secunia.com/advisories/42812 - () http://secunia.com/advisories/42812 -
References () http://secunia.com/advisories/42843 - () http://secunia.com/advisories/42843 -
References () http://secunia.com/advisories/43051 - () http://secunia.com/advisories/43051 -
References () http://secunia.com/advisories/43189 - () http://secunia.com/advisories/43189 -
References () http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.484686 - () http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.484686 -
References () http://support.apple.com/kb/HT5002 - () http://support.apple.com/kb/HT5002 -
References () http://svn.php.net/viewvc/php/php-src/branches/PHP_5_2/Zend/zend_strtod.c?r1=266327&r2=307095&pathrev=307095 - Patch () http://svn.php.net/viewvc/php/php-src/branches/PHP_5_2/Zend/zend_strtod.c?r1=266327&r2=307095&pathrev=307095 - Patch
References () http://www.exploringbinary.com/php-hangs-on-numeric-value-2-2250738585072011e-308/ - () http://www.exploringbinary.com/php-hangs-on-numeric-value-2-2250738585072011e-308/ -
References () http://www.openwall.com/lists/oss-security/2011/01/05/2 - Exploit, Patch () http://www.openwall.com/lists/oss-security/2011/01/05/2 - Exploit, Patch
References () http://www.openwall.com/lists/oss-security/2011/01/05/8 - () http://www.openwall.com/lists/oss-security/2011/01/05/8 -
References () http://www.openwall.com/lists/oss-security/2011/01/06/5 - () http://www.openwall.com/lists/oss-security/2011/01/06/5 -
References () http://www.openwall.com/lists/oss-security/2023/05/14/3 - () http://www.openwall.com/lists/oss-security/2023/05/14/3 -
References () http://www.redhat.com/support/errata/RHSA-2011-0195.html - () http://www.redhat.com/support/errata/RHSA-2011-0195.html -
References () http://www.redhat.com/support/errata/RHSA-2011-0196.html - () http://www.redhat.com/support/errata/RHSA-2011-0196.html -
References () http://www.securityfocus.com/bid/45668 - Exploit () http://www.securityfocus.com/bid/45668 - Exploit
References () http://www.ubuntu.com/usn/USN-1042-1 - () http://www.ubuntu.com/usn/USN-1042-1 -
References () http://www.vupen.com/english/advisories/2011/0060 - Vendor Advisory () http://www.vupen.com/english/advisories/2011/0060 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2011/0066 - () http://www.vupen.com/english/advisories/2011/0066 -
References () http://www.vupen.com/english/advisories/2011/0077 - () http://www.vupen.com/english/advisories/2011/0077 -
References () http://www.vupen.com/english/advisories/2011/0198 - () http://www.vupen.com/english/advisories/2011/0198 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/64470 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/64470 -

Information

Published : 2011-01-11 03:00

Updated : 2024-11-21 01:21


NVD link : CVE-2010-4645

Mitre link : CVE-2010-4645

CVE.ORG link : CVE-2010-4645


JSON object : View

Products Affected

php

  • php
CWE
CWE-189

Numeric Errors