Lucene search

K
nessusTenable6304.PRM
HistoryFeb 06, 2012 - 12:00 a.m.

PHP < 5.3.10 php_register_variable_ex() RCE

2012-02-0600:00:00
Tenable
www.tenable.com
145

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.875 High

EPSS

Percentile

98.7%

PHP versions prior to 5.3.10 are reportedly affected by a code execution vulnerability. Specifically, the fix for the hash collision denial of service vulnerability (CVE-2011-4885) itself has introduced a remote code execution vulnerability in the php_register_variable_ex() in the file โ€˜php_variables.cโ€™. A new configuration variable, โ€˜max_input_varsโ€™, was added as part of the fix. If the number of input variables exceeds this value and the variable being processed is an array, code execution can occur.

Binary data 6304.prm
VendorProductVersionCPE
phpphpcpe:/a:php:php

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.875 High

EPSS

Percentile

98.7%