CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
AI Score
Confidence
High
EPSS
Percentile
69.6%
The Zend Engine in PHP 5.2 through 5.2.13 and 5.3 through 5.3.2 allows context-dependent attackers to obtain sensitive information by interrupting the handler for the (1) ZEND_BW_XOR opcode (shift_left_function), (2) ZEND_SL opcode (bitwise_xor_function), or (3) ZEND_SR opcode (shift_right_function), related to the convert_to_long_base function.
Vendor | Product | Version | CPE |
---|---|---|---|
php | php | 5.2.0 | cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:* |
php | php | 5.2.1 | cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:* |
php | php | 5.2.2 | cpe:2.3:a:php:php:5.2.2:*:*:*:*:*:*:* |
php | php | 5.2.3 | cpe:2.3:a:php:php:5.2.3:*:*:*:*:*:*:* |
php | php | 5.2.4 | cpe:2.3:a:php:php:5.2.4:*:*:*:*:*:*:* |
php | php | 5.2.5 | cpe:2.3:a:php:php:5.2.5:*:*:*:*:*:*:* |
php | php | 5.2.6 | cpe:2.3:a:php:php:5.2.6:*:*:*:*:*:*:* |
php | php | 5.2.7 | cpe:2.3:a:php:php:5.2.7:*:*:*:*:*:*:* |
php | php | 5.2.8 | cpe:2.3:a:php:php:5.2.8:*:*:*:*:*:*:* |
php | php | 5.2.9 | cpe:2.3:a:php:php:5.2.9:*:*:*:*:*:*:* |
lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html
lists.opensuse.org/opensuse-security-announce/2010-10/msg00000.html
www.php-security.org/2010/05/08/mops-2010-014-php-zend_bw_xor-opcode-interruption-address-information-leak-vulnerability/index.html
www.php-security.org/2010/05/08/mops-2010-015-php-zend_sl-opcode-interruption-address-information-leak-vulnerability/index.html
www.php-security.org/2010/05/08/mops-2010-016-php-zend_sr-opcode-interruption-address-information-leak-vulnerability/index.html
exchange.xforce.ibmcloud.com/vulnerabilities/58587