Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2010-3063

Опубликовано: 31 мая 2010
Источник: redhat
CVSS2: 5.1
EPSS Низкий

Описание

The php_mysqlnd_read_error_from_line function in the Mysqlnd extension in PHP 5.3 through 5.3.2 does not properly calculate a buffer length, which allows context-dependent attackers to trigger a heap-based buffer overflow via crafted inputs that cause a negative length value to be used.

Отчет

Not vulnerable. This issue did not affect the versions of php as shipped with Red Hat Enterprise Linux 3, 4, or 5, and Red Hat Application Stack v2.

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=619009php: mysqlnd: multiple buffer overflows (MOPS-2010-05[789])

EPSS

Процентиль: 57%
0.00349
Низкий

5.1 Medium

CVSS2

Связанные уязвимости

ubuntu
почти 15 лет назад

The php_mysqlnd_read_error_from_line function in the Mysqlnd extension in PHP 5.3 through 5.3.2 does not properly calculate a buffer length, which allows context-dependent attackers to trigger a heap-based buffer overflow via crafted inputs that cause a negative length value to be used.

nvd
почти 15 лет назад

The php_mysqlnd_read_error_from_line function in the Mysqlnd extension in PHP 5.3 through 5.3.2 does not properly calculate a buffer length, which allows context-dependent attackers to trigger a heap-based buffer overflow via crafted inputs that cause a negative length value to be used.

debian
почти 15 лет назад

The php_mysqlnd_read_error_from_line function in the Mysqlnd extension ...

github
около 3 лет назад

The php_mysqlnd_read_error_from_line function in the Mysqlnd extension in PHP 5.3 through 5.3.2 does not properly calculate a buffer length, which allows context-dependent attackers to trigger a heap-based buffer overflow via crafted inputs that cause a negative length value to be used.

EPSS

Процентиль: 57%
0.00349
Низкий

5.1 Medium

CVSS2