CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:C/I:N/A:N
AI Score
Confidence
Low
EPSS
Percentile
73.5%
PHP 4.0.0 through 4.4.6 and 5.0.0 through 5.2.1 allows context-dependent attackers to read arbitrary memory locations via an interruption that triggers a user space error handler that changes a parameter to an arbitrary pointer, as demonstrated via the iptcembed function, which calls certain convert_to_* functions with its input parameters.
Vendor | Product | Version | CPE |
---|---|---|---|
php | php | 4.0.0 | cpe:2.3:a:php:php:4.0.0:*:*:*:*:*:*:* |
php | php | 4.0.1 | cpe:2.3:a:php:php:4.0.1:*:*:*:*:*:*:* |
php | php | 4.0.1 | cpe:2.3:a:php:php:4.0.1:patch1:*:*:*:*:*:* |
php | php | 4.0.1 | cpe:2.3:a:php:php:4.0.1:patch2:*:*:*:*:*:* |
php | php | 4.0.2 | cpe:2.3:a:php:php:4.0.2:*:*:*:*:*:*:* |
php | php | 4.0.3 | cpe:2.3:a:php:php:4.0.3:*:*:*:*:*:*:* |
php | php | 4.0.3 | cpe:2.3:a:php:php:4.0.3:patch1:*:*:*:*:*:* |
php | php | 4.0.4 | cpe:2.3:a:php:php:4.0.4:*:*:*:*:*:*:* |
php | php | 4.0.4 | cpe:2.3:a:php:php:4.0.4:patch1:*:*:*:*:*:* |
php | php | 4.0.5 | cpe:2.3:a:php:php:4.0.5:*:*:*:*:*:*:* |