Use-after-free in PHP - CVE-2010-2225
Published: June 24, 2010 / Updated: August 4, 2020
PHP
PHP Group
Description
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error when processing serialized data, related to the PHP unserialize function. A remote attackers can execute arbitrary code or obtain sensitive information.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
Remediation
External links
- http://lists.apple.com/archives/security-announce/2010//Aug/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00000.html
- http://marc.info/?l=bugtraq&m=133469208622507&w=2
- http://pastebin.com/mXGidCsd
- http://secunia.com/advisories/40860
- http://support.apple.com/kb/HT4312
- http://twitter.com/i0n1c/statuses/16373156076
- http://twitter.com/i0n1c/statuses/16447867829
- http://www.debian.org/security/2010/dsa-2089
- http://www.securityfocus.com/bid/40948
- https://bugzilla.redhat.com/show_bug.cgi?id=605641
- https://exchange.xforce.ibmcloud.com/vulnerabilities/59610