CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
EPSS
Percentile
69.6%
The Zend Engine in PHP 5.2 through 5.2.13 and 5.3 through 5.3.2 allows
context-dependent attackers to obtain sensitive information by interrupting
the handler for the (1) ZEND_BW_XOR opcode (shift_left_function), (2)
ZEND_SL opcode (bitwise_xor_function), or (3) ZEND_SR opcode
(shift_right_function), related to the convert_to_long_base function.
Author | Note |
---|---|
mdeslaur | interruption issue, safe_mode - open_basedir bypass, ignoring This is MOPS-2010-014, MOPS-2010-015, MOPS-2010-016 |
www.php-security.org/2010/05/08/mops-2010-014-php-zend_bw_xor-opcode-interruption-address-information-leak-vulnerability/index.html
www.php-security.org/2010/05/08/mops-2010-015-php-zend_sl-opcode-interruption-address-information-leak-vulnerability/index.html
www.php-security.org/2010/05/08/mops-2010-016-php-zend_sr-opcode-interruption-address-information-leak-vulnerability/index.html
www.php.net/releases/5_3_3.php
launchpad.net/bugs/cve/CVE-2010-1914
nvd.nist.gov/vuln/detail/CVE-2010-1914
security-tracker.debian.org/tracker/CVE-2010-1914
ubuntu.com/security/notices/USN-1231-1
www.cve.org/CVERecord?id=CVE-2010-1914