CVE-2010-1868
Published: 7 May 2010
The (1) sqlite_single_query and (2) sqlite_array_query functions in ext/sqlite/sqlite.c in PHP 5.2 through 5.2.13 and 5.3 through 5.3.2 allow context-dependent attackers to execute arbitrary code by calling these functions with an empty SQL query, which triggers access of uninitialized memory.
Notes
Author | Note |
---|---|
mdeslaur | SQLite version 2 This is MOPS-2010-012 and MOPS-2010-013 |
Priority
Status
Package | Release | Status |
---|---|---|
php5 Launchpad, Ubuntu, Debian |
dapper |
Released
(5.1.2-1ubuntu3.19)
|
hardy |
Released
(5.2.4-2ubuntu5.12)
|
|
jaunty |
Released
(5.2.6.dfsg.1-3ubuntu4.6)
|
|
karmic |
Released
(5.2.10.dfsg.1-2ubuntu6.5)
|
|
lucid |
Released
(5.3.2-1ubuntu4.5)
|
|
upstream |
Released
(5.3.3)
|
|
Patches: upstream: http://svn.php.net/viewvc?view=revision&revision=298697 |
References
- http://php-security.org/2010/05/07/mops-2010-012-php-sqlite_single_query-uninitialized-memory-usage-vulnerability/index.html
- http://php-security.org/2010/05/07/mops-2010-013-php-sqlite_array_query-uninitialized-memory-usage-vulnerability/index.html
- http://php-security.org/2010/05/07/mops-submission-03-sqlite_single_query-sqlite_array_query-uninitialized-memory-usage/index.html
- http://www.php.net/releases/5_3_3.php
- https://ubuntu.com/security/notices/USN-989-1
- https://www.cve.org/CVERecord?id=CVE-2010-1868
- NVD
- Launchpad
- Debian