CVE-2010-1866
Published: 7 May 2010
The dechunk filter in PHP 5.3 through 5.3.2, when decoding an HTTP chunked encoding stream, allows context-dependent attackers to cause a denial of service (crash) and possibly trigger memory corruption via a negative chunk size, which bypasses a signed comparison, related to an integer overflow in the chunk size decoder.
Notes
Author | Note |
---|---|
mdeslaur | 5.3 only This is MOPS-2010-003 |
Priority
Status
Package | Release | Status |
---|---|---|
php5 Launchpad, Ubuntu, Debian |
dapper |
Not vulnerable
(5.1.2-1ubuntu3.18)
|
hardy |
Not vulnerable
(5.2.4-2ubuntu5.10)
|
|
jaunty |
Not vulnerable
(5.2.6.dfsg.1-3ubuntu4.5)
|
|
karmic |
Not vulnerable
(5.2.10.dfsg.1-2ubuntu6.4)
|
|
lucid |
Released
(5.3.2-1ubuntu4.5)
|
|
upstream |
Released
(5.3.3)
|
|
Patches: upstream: http://svn.php.net/viewvc?view=revision&revision=298700 |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 9.8 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |