Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2010-3062

Опубликовано: 20 авг. 2010
Источник: ubuntu
Приоритет: negligible
EPSS Низкий
CVSS2: 5

Описание

mysqlnd_wireprotocol.c in the Mysqlnd extension in PHP 5.3 through 5.3.2 allows remote attackers to (1) read sensitive memory via a modified length value, which is not properly handled by the php_mysqlnd_ok_read function; or (2) trigger a heap-based buffer overflow via a modified length value, which is not properly handled by the php_mysqlnd_rset_header_read function.

РелизСтатусПримечание
dapper

not-affected

code not built
devel

not-affected

hardy

not-affected

code not built
jaunty

not-affected

code not built
karmic

not-affected

code not built
lucid

not-affected

code not built
upstream

released

5.3.3

Показывать по

Ссылки на источники

EPSS

Процентиль: 73%
0.00786
Низкий

5 Medium

CVSS2

Связанные уязвимости

redhat
около 15 лет назад

mysqlnd_wireprotocol.c in the Mysqlnd extension in PHP 5.3 through 5.3.2 allows remote attackers to (1) read sensitive memory via a modified length value, which is not properly handled by the php_mysqlnd_ok_read function; or (2) trigger a heap-based buffer overflow via a modified length value, which is not properly handled by the php_mysqlnd_rset_header_read function.

nvd
почти 15 лет назад

mysqlnd_wireprotocol.c in the Mysqlnd extension in PHP 5.3 through 5.3.2 allows remote attackers to (1) read sensitive memory via a modified length value, which is not properly handled by the php_mysqlnd_ok_read function; or (2) trigger a heap-based buffer overflow via a modified length value, which is not properly handled by the php_mysqlnd_rset_header_read function.

debian
почти 15 лет назад

mysqlnd_wireprotocol.c in the Mysqlnd extension in PHP 5.3 through 5.3 ...

github
около 3 лет назад

mysqlnd_wireprotocol.c in the Mysqlnd extension in PHP 5.3 through 5.3.2 allows remote attackers to (1) read sensitive memory via a modified length value, which is not properly handled by the php_mysqlnd_ok_read function; or (2) trigger a heap-based buffer overflow via a modified length value, which is not properly handled by the php_mysqlnd_rset_header_read function.

EPSS

Процентиль: 73%
0.00786
Низкий

5 Medium

CVSS2