Vulnerability identifier: #VU110322
Vulnerability risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID:
CWE-ID:
CWE-20
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
PHP
Universal components / Libraries /
Scripting languages
Vendor: PHP Group
Description
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Unspecified vulnerability in PHP before 5.2.11, and 5.3.x before 5.3.1, has unknown impact and attack vectors related to "missing sanity checks around exif processing."
Mitigation
Install update from vendor's website.
Vulnerable software versions
PHP: 1.0, 2.0, 2.0b10, 3.0, 3.0.1, 3.0.2, 3.0.3, 3.0.4, 3.0.5, 3.0.6, 3.0.7, 3.0.8, 3.0.9, 3.0.10, 3.0.11, 3.0.12, 3.0.13, 3.0.14, 3.0.15, 3.0.16, 3.0.17, 3.0.18, 4.0, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.5, 4.0.6, 4.0.7, 4.1, 4.1.1, 4.1.2, 4.2, 4.2.1, 4.2.2, 4.2.3, 4.3, 4.3.1, 4.3.2, 4.3.3, 4.3.4, 4.3.5, 4.3.6, 4.3.7, 4.3.8, 4.3.9, 4.3.10, 4.3.11, 4.4, 4.4.1, 4.4.2, 4.4.3, 4.4.4, 4.4.5, 4.4.6, 4.4.7, 4.4.8, 4.4.9, 5, 5.0.0, 5.0.1, 5.0.2, 5.0.3, 5.0.4, 5.0.5, 5.1.0, 5.1.1, 5.1.2, 5.1.3, 5.1.4, 5.1.5, 5.1.6, 5.2, 5.2.2, 5.2.4, 5.2.6, 5.2.7, 5.2.8, 5.2.9
External links
https://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html
https://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html
https://marc.info/?l=bugtraq&m=127680701405735&w=2
https://marc.info/?l=bugtraq&m=130497311408250&w=2
https://news.php.net/php.announce/79
https://secunia.com/advisories/36791
https://secunia.com/advisories/37412
https://secunia.com/advisories/37482
https://secunia.com/advisories/40262
https://support.apple.com/kb/HT3937
https://www.debian.org/security/2009/dsa-1940
https://www.mandriva.com/security/advisories?name=MDVSA-2009:302
https://www.openwall.com/lists/oss-security/2009/11/20/2
https://www.openwall.com/lists/oss-security/2009/11/20/3
https://www.osvdb.org/58186
https://www.php.net/ChangeLog-5.php
https://www.php.net/ChangeLog-5.php#5.2.11
https://www.php.net/releases/5_2_11.php
https://www.php.net/releases/5_3_1.php
https://www.securitytracker.com/id?1022914
https://www.vupen.com/english/advisories/2009/3184
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7652
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9982
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.