pdo_sql_parser.re in the PDO extension in PHP before 5.3.14 and 5.4.x before 5.4.4 does not properly determine the end of the query string during parsing of prepared statements, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted parameter value.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:40
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00021.html - | |
References | () http://seclists.org/bugtraq/2012/Jun/60 - | |
References | () http://www.debian.org/security/2012/dsa-2527 - | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2012:108 - | |
References | () http://www.openwall.com/lists/oss-security/2012/08/02/3 - | |
References | () http://www.openwall.com/lists/oss-security/2012/08/02/7 - | |
References | () http://www.php.net/ChangeLog-5.php - | |
References | () http://www.ubuntu.com/usn/USN-1569-1 - | |
References | () https://bugs.php.net/bug.php?id=61755 - | |
References | () https://bugzilla.novell.com/show_bug.cgi?id=769785 - |
Information
Published : 2012-08-06 16:55
Updated : 2024-11-21 01:40
NVD link : CVE-2012-3450
Mitre link : CVE-2012-3450
CVE.ORG link : CVE-2012-3450
JSON object : View
Products Affected
php
- php
CWE