CVE-2012-0830

The php_register_variable_ex function in php_variables.c in PHP 5.3.9 allows remote attackers to execute arbitrary code via a request containing a large number of variables, related to improper handling of array variables. NOTE: this vulnerability exists because of an incorrect fix for CVE-2011-4885.
References
Link Resource
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00013.html
http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00016.html
http://marc.info/?l=bugtraq&m=134012830914727&w=2
http://marc.info/?l=bugtraq&m=134012830914727&w=2
http://openwall.com/lists/oss-security/2012/02/02/12
http://openwall.com/lists/oss-security/2012/02/03/1
http://rhn.redhat.com/errata/RHSA-2012-0092.html
http://secunia.com/advisories/47801
http://secunia.com/advisories/47806 Vendor Advisory
http://secunia.com/advisories/47813
http://secunia.com/advisories/48668
http://securitytracker.com/id?1026631
http://support.apple.com/kb/HT5281
http://svn.php.net/viewvc?view=revision&revision=323007
http://thexploit.com/sec/critical-php-remote-vulnerability-introduced-in-fix-for-php-hashtable-collision-dos/ Exploit
http://www.debian.org/security/2012/dsa-2403
http://www.h-online.com/security/news/item/Critical-PHP-vulnerability-being-fixed-1427316.html
http://www.osvdb.org/78819
http://www.php.net/ChangeLog-5.php#5.3.10
http://www.securityfocus.com/bid/51830 Exploit
https://exchange.xforce.ibmcloud.com/vulnerabilities/72911
https://gist.github.com/1725489 Exploit
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00013.html
http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00016.html
http://marc.info/?l=bugtraq&m=134012830914727&w=2
http://marc.info/?l=bugtraq&m=134012830914727&w=2
http://openwall.com/lists/oss-security/2012/02/02/12
http://openwall.com/lists/oss-security/2012/02/03/1
http://rhn.redhat.com/errata/RHSA-2012-0092.html
http://secunia.com/advisories/47801
http://secunia.com/advisories/47806 Vendor Advisory
http://secunia.com/advisories/47813
http://secunia.com/advisories/48668
http://securitytracker.com/id?1026631
http://support.apple.com/kb/HT5281
http://svn.php.net/viewvc?view=revision&revision=323007
http://thexploit.com/sec/critical-php-remote-vulnerability-introduced-in-fix-for-php-hashtable-collision-dos/ Exploit
http://www.debian.org/security/2012/dsa-2403
http://www.h-online.com/security/news/item/Critical-PHP-vulnerability-being-fixed-1427316.html
http://www.osvdb.org/78819
http://www.php.net/ChangeLog-5.php#5.3.10
http://www.securityfocus.com/bid/51830 Exploit
https://exchange.xforce.ibmcloud.com/vulnerabilities/72911
https://gist.github.com/1725489 Exploit
Configurations

Configuration 1 (hide)

cpe:2.3:a:php:php:5.3.9:*:*:*:*:*:*:*

History

21 Nov 2024, 01:35

Type Values Removed Values Added
References () http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041 - () http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041 -
References () http://lists.apple.com/archives/security-announce/2012/May/msg00001.html - () http://lists.apple.com/archives/security-announce/2012/May/msg00001.html -
References () http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00013.html - () http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00013.html -
References () http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00016.html - () http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00016.html -
References () http://marc.info/?l=bugtraq&m=134012830914727&w=2 - () http://marc.info/?l=bugtraq&m=134012830914727&w=2 -
References () http://openwall.com/lists/oss-security/2012/02/02/12 - () http://openwall.com/lists/oss-security/2012/02/02/12 -
References () http://openwall.com/lists/oss-security/2012/02/03/1 - () http://openwall.com/lists/oss-security/2012/02/03/1 -
References () http://rhn.redhat.com/errata/RHSA-2012-0092.html - () http://rhn.redhat.com/errata/RHSA-2012-0092.html -
References () http://secunia.com/advisories/47801 - () http://secunia.com/advisories/47801 -
References () http://secunia.com/advisories/47806 - Vendor Advisory () http://secunia.com/advisories/47806 - Vendor Advisory
References () http://secunia.com/advisories/47813 - () http://secunia.com/advisories/47813 -
References () http://secunia.com/advisories/48668 - () http://secunia.com/advisories/48668 -
References () http://securitytracker.com/id?1026631 - () http://securitytracker.com/id?1026631 -
References () http://support.apple.com/kb/HT5281 - () http://support.apple.com/kb/HT5281 -
References () http://svn.php.net/viewvc?view=revision&revision=323007 - () http://svn.php.net/viewvc?view=revision&revision=323007 -
References () http://thexploit.com/sec/critical-php-remote-vulnerability-introduced-in-fix-for-php-hashtable-collision-dos/ - Exploit () http://thexploit.com/sec/critical-php-remote-vulnerability-introduced-in-fix-for-php-hashtable-collision-dos/ - Exploit
References () http://www.debian.org/security/2012/dsa-2403 - () http://www.debian.org/security/2012/dsa-2403 -
References () http://www.h-online.com/security/news/item/Critical-PHP-vulnerability-being-fixed-1427316.html - () http://www.h-online.com/security/news/item/Critical-PHP-vulnerability-being-fixed-1427316.html -
References () http://www.osvdb.org/78819 - () http://www.osvdb.org/78819 -
References () http://www.php.net/ChangeLog-5.php#5.3.10 - () http://www.php.net/ChangeLog-5.php#5.3.10 -
References () http://www.securityfocus.com/bid/51830 - Exploit () http://www.securityfocus.com/bid/51830 - Exploit
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/72911 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/72911 -
References () https://gist.github.com/1725489 - Exploit () https://gist.github.com/1725489 - Exploit

07 Nov 2023, 02:10

Type Values Removed Values Added
Summary The php_register_variable_ex function in php_variables.c in PHP 5.3.9 allows remote attackers to execute arbitrary code via a request containing a large number of variables, related to improper handling of array variables. NOTE: this vulnerability exists because of an incorrect fix for CVE-2011-4885. The php_register_variable_ex function in php_variables.c in PHP 5.3.9 allows remote attackers to execute arbitrary code via a request containing a large number of variables, related to improper handling of array variables. NOTE: this vulnerability exists because of an incorrect fix for CVE-2011-4885.

Information

Published : 2012-02-06 20:55

Updated : 2024-11-21 01:35


NVD link : CVE-2012-0830

Mitre link : CVE-2012-0830

CVE.ORG link : CVE-2012-0830


JSON object : View

Products Affected

php

  • php
CWE
CWE-399

Resource Management Errors