Vulnerabilities > CVE-2013-2110 - Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in PHP

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
php
CWE-119
nessus

Summary

Heap-based buffer overflow in the php_quot_print_encode function in ext/standard/quot_print.c in PHP before 5.3.26 and 5.4.x before 5.4.16 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted argument to the quoted_printable_encode function.

Vulnerable Configurations

Part Description Count
Application
Php
496

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Buffer Overflow via Environment Variables
    This attack pattern involves causing a buffer overflow through manipulation of environment variables. Once the attacker finds that they can modify an environment variable, they may try to overflow associated buffers. This attack leverages implicit trust often placed in environment variables.
  • Overflow Buffers
    Buffer Overflow attacks target improper or missing bounds checking on buffer operations, typically triggered by input injected by an attacker. As a consequence, an attacker is able to write past the boundaries of allocated buffer regions in memory, causing a program crash or potentially redirection of execution as per the attackers' choice.
  • Client-side Injection-induced Buffer Overflow
    This type of attack exploits a buffer overflow vulnerability in targeted client software through injection of malicious content from a custom-built hostile service.
  • Filter Failure through Buffer Overflow
    In this attack, the idea is to cause an active filter to fail by causing an oversized transaction. An attacker may try to feed overly long input strings to the program in an attempt to overwhelm the filter (by causing a buffer overflow) and hoping that the filter does not fail securely (i.e. the user input is let into the system unfiltered).
  • MIME Conversion
    An attacker exploits a weakness in the MIME conversion routine to cause a buffer overflow and gain control over the mail server machine. The MIME system is designed to allow various different information formats to be interpreted and sent via e-mail. Attack points exist when data are converted to MIME compatible format and back.

Nessus

  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2013-10206.NASL
    descriptionIMPORTANT CHANGE : - JSON extension is no more provided by php-common - php-pecl-jsonc provides a drop-in alternative Upstream Changelog, 06 Jun 2013, PHP 5.5.0 Release Candidate 3 Core : - Fixed bug #64960 (Segfault in gc_zval_possible_root). (Laruence) - Fixed bug #64879 (Heap based buffer overflow in quoted_printable_encode, CVE-2013-2110). (Stas) FPM : - Fixed Bug #64915 (error_log ignored when daemonize=0). (Remi) GD : - Fixed Bug #64962 (imagerotate produces corrupted image). (Remi) - Fixed Bug #64961 (segfault in imagesetinterpolation). (Remi) Hash : - Fixed Bug #64745 (hash_pbkdf2() truncates data when using default length and hex output). (Anthony Ferrara) PDO_DBlib : - Fixed bug #63638 (Cannot connect to SQL Server 2008 with PDO dblib). (Stanley Sufficool) - Fixed bug #64338 (pdo_dblib can
    last seen2020-03-17
    modified2013-07-12
    plugin id67273
    published2013-07-12
    reporterThis script is Copyright (C) 2013-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/67273
    titleFedora 19 : php-5.5.0-0.10.RC3.fc19 / php-pecl-jsonc-1.3.1-1.fc19 (2013-10206)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Fedora Security Advisory 2013-10206.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(67273);
      script_version("1.3");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/03/12");
    
      script_xref(name:"FEDORA", value:"2013-10206");
    
      script_name(english:"Fedora 19 : php-5.5.0-0.10.RC3.fc19 / php-pecl-jsonc-1.3.1-1.fc19 (2013-10206)");
      script_summary(english:"Checks rpm output for the updated packages.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Fedora host is missing one or more security updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "IMPORTANT CHANGE :
    
      - JSON extension is no more provided by php-common
    
        - php-pecl-jsonc provides a drop-in alternative
    
    Upstream Changelog, 06 Jun 2013, PHP 5.5.0 Release Candidate 3
    
    Core :
    
      - Fixed bug #64960 (Segfault in gc_zval_possible_root).
        (Laruence)
    
        - Fixed bug #64879 (Heap based buffer overflow in
          quoted_printable_encode, CVE-2013-2110). (Stas)
    
    FPM :
    
      - Fixed Bug #64915 (error_log ignored when daemonize=0).
        (Remi)
    
    GD :
    
      - Fixed Bug #64962 (imagerotate produces corrupted image).
        (Remi)
    
        - Fixed Bug #64961 (segfault in imagesetinterpolation).
          (Remi)
    
    Hash :
    
      - Fixed Bug #64745 (hash_pbkdf2() truncates data when
        using default length and hex output). (Anthony Ferrara)
    
    PDO_DBlib :
    
      - Fixed bug #63638 (Cannot connect to SQL Server 2008 with
        PDO dblib). (Stanley Sufficool)
    
        - Fixed bug #64338 (pdo_dblib can't connect to Azure
          SQL). (Stanley Sufficool)
    
        - Fixed bug #64808 (FreeTDS PDO getColumnMeta on a
          prepared but not executed statement crashes). (Stanley
          Sufficool)
    
    PDO_pgsql :
    
      - Fixed Bug #64949 (Buffer overflow in _pdo_pgsql_error).
        (Remi)
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the Fedora security advisory. Tenable
    has attempted to automatically clean and format it as much as possible
    without introducing additional issues."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.redhat.com/show_bug.cgi?id=973696"
      );
      # https://lists.fedoraproject.org/pipermail/package-announce/2013-June/109515.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?3166a1df"
      );
      # https://lists.fedoraproject.org/pipermail/package-announce/2013-June/109516.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?11906567"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected php and / or php-pecl-jsonc packages."
      );
      script_set_attribute(attribute:"risk_factor", value:"High");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:php");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:php-pecl-jsonc");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:19");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2013/06/06");
      script_set_attribute(attribute:"plugin_publication_date", value:"2013/07/12");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2013-2020 Tenable Network Security, Inc.");
      script_family(english:"Fedora Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
    os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
    os_ver = os_ver[1];
    if (! ereg(pattern:"^19([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 19.x", "Fedora " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);
    
    flag = 0;
    if (rpm_check(release:"FC19", reference:"php-5.5.0-0.10.RC3.fc19")) flag++;
    if (rpm_check(release:"FC19", reference:"php-pecl-jsonc-1.3.1-1.fc19")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
      else security_hole(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "php / php-pecl-jsonc");
    }
    
  • NASL familyFreeBSD Local Security Checks
    NASL idFREEBSD_PKG_59E7163CCF8411E2907B0025905A4770.NASL
    descriptionThe PHP development team reports : A Heap-based buffer overflow flaw was found in the php quoted_printable_encode() function. A remote attacker could use this flaw to cause php to crash or execute arbitrary code with the permission of the user running php
    last seen2020-06-01
    modified2020-06-02
    plugin id66845
    published2013-06-08
    reporterThis script is Copyright (C) 2013-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/66845
    titleFreeBSD : php5 -- Heap based buffer overflow in quoted_printable_encode (59e7163c-cf84-11e2-907b-0025905a4770)
  • NASL familyMacOS X Local Security Checks
    NASL idMACOSX_SECUPD2013-004.NASL
    descriptionThe remote host is running a version of Mac OS X 10.6 or 10.7 that does not have Security Update 2013-004 applied. This update contains several security-related fixes for the following component : - Apache - Bind - Certificate Trust Policy - ClamAV - Installer - IPSec - Mobile Device Management - OpenSSL - PHP - PostgreSQL - QuickTime - sudo Note that successful exploitation of the most serious issues could result in arbitrary code execution.
    last seen2020-06-01
    modified2020-06-02
    plugin id69878
    published2013-09-13
    reporterThis script is Copyright (C) 2013-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/69878
    titleMac OS X Multiple Vulnerabilities (Security Update 2013-004)
  • NASL familyMacOS X Local Security Checks
    NASL idMACOSX_10_8_5.NASL
    descriptionThe remote host is running a version of Mac OS X 10.8.x that is prior to 10.8.5. The newer version contains multiple security-related fixes for the following components : - Apache - Bind - Certificate Trust Policy - CoreGraphics - ImageIO - Installer - IPSec - Kernel - Mobile Device Management - OpenSSL - PHP - PostgreSQL - Power Management - QuickTime - Screen Lock - sudo This update also addresses an issue in which certain Unicode strings could cause applications to unexpectedly quit. Note that successful exploitation of the most serious issues could result in arbitrary code execution.
    last seen2020-06-01
    modified2020-06-02
    plugin id69877
    published2013-09-13
    reporterThis script is Copyright (C) 2013-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/69877
    titleMac OS X 10.8.x < 10.8.5 Multiple Vulnerabilities
  • NASL familyAmazon Linux Local Security Checks
    NASL idALA_ALAS-2013-205.NASL
    descriptionHeap-based buffer overflow in the php_quot_print_encode function in ext/standard/quot_print.c in PHP before 5.3.26 and 5.4.x before 5.4.16 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted argument to the quoted_printable_encode function.
    last seen2020-06-01
    modified2020-06-02
    plugin id69763
    published2013-09-04
    reporterThis script is Copyright (C) 2013-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/69763
    titleAmazon Linux AMI : php (ALAS-2013-205)
  • NASL familyF5 Networks Local Security Checks
    NASL idF5_BIGIP_SOL15876.NASL
    descriptionHeap-based buffer overflow in the php_quot_print_encode function in ext/standard/quot_print.c in PHP before 5.3.26 and 5.4.x before 5.4.16 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted argument to the quoted_printable_encode function.
    last seen2020-06-01
    modified2020-06-02
    plugin id79644
    published2014-12-02
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/79644
    titleF5 Networks BIG-IP : PHP vulnerability (SOL15876)
  • NASL familyCGI abuses
    NASL idPHP_5_4_16.NASL
    descriptionAccording to its banner, the version of PHP 5.4.x installed on the remote host is prior to 5.4.16. It is, therefore, potentially affected by the following vulnerabilities: - An error exists in the mimetype detection of
    last seen2020-06-01
    modified2020-06-02
    plugin id66843
    published2013-06-07
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/66843
    titlePHP 5.4.x < 5.4.16 Multiple Vulnerabilities
  • NASL familyAmazon Linux Local Security Checks
    NASL idALA_ALAS-2013-206.NASL
    descriptionHeap-based buffer overflow in the php_quot_print_encode function in ext/standard/quot_print.c in PHP before 5.3.26 and 5.4.x before 5.4.16 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted argument to the quoted_printable_encode function.
    last seen2020-06-01
    modified2020-06-02
    plugin id69764
    published2013-09-04
    reporterThis script is Copyright (C) 2013-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/69764
    titleAmazon Linux AMI : php54 (ALAS-2013-206)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2013-10255.NASL
    description06 Jun 2013, PHP 5.4.16 Core : - Fixed bug #64879 (Heap based buffer overflow in quoted_printable_encode, CVE-2013-2110). (Stas) - Fixed bug #64853 (Use of no longer available ini directives causes crash on TS build). (Anatol) - Fixed bug #64729 (compilation failure on x32). (Gustavo) - Fixed bug #64720 (SegFault on zend_deactivate). (Dmitry) - Fixed bug #64660 (Segfault on memory exhaustion within function definition). (Stas, reported by Juha Kylmanen) Calendar: -Fixed bug #64895 (Integer overflow in SndToJewish). (Remi) Fileinfo : - Fixed bug #64830 (mimetype detection segfaults on mp3 file). (Anatol) FPM : - Ignore QUERY_STRING when sent in SCRIPT_FILENAME. (Remi) - Fixed some possible memory or resource leaks and possible null dereference detected by code coverity scan. (Remi) - Log a warning when a syscall fails. (Remi) - Add --with-fpm-systemd option to report health to systemd, and systemd_interval option to configure this. The service can now use Type=notify in the systemd unit file. (Remi) MySQLi - Fixed bug #64726 (Segfault when calling fetch_object on a use_result and DB pointer has closed). (Laruence) Phar - Fixed bug #64214 (PHAR PHPTs intermittently crash when run on DFS, SMB or with non std tmp dir). (Pierre) SNMP : - Fixed bug #64765 (Some IPv6 addresses get interpreted wrong). (Boris Lytochkin) - Fixed bug #64159 (Truncated snmpget). (Boris Lytochkin) Streams : - Fixed bug #64770 (stream_select() fails with pipes returned by proc_open() on Windows x64). (Anatol) Zend Engine : - Fixed bug #64821 (Custom Exceptions crash when internal properties overridden). (Anatol) Fix backported from PHP 5.4.17 Core : - Fixed bug #64960 (Segfault in gc_zval_possible_root). (Laruence) FPM : - Fixed Bug #64915 (error_log ignored when daemonize=0). (Remi) PDO_pgsql : - Fixed Bug #64949 (Buffer overflow in _pdo_pgsql_error). (Remi) Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-03-17
    modified2013-07-12
    plugin id67276
    published2013-07-12
    reporterThis script is Copyright (C) 2013-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/67276
    titleFedora 18 : php-5.4.16-1.fc18 (2013-10255)
  • NASL familyUbuntu Local Security Checks
    NASL idUBUNTU_USN-1872-1.NASL
    descriptionIt was discovered that PHP incorrectly handled the quoted_printable_encode function. An attacker could use this flaw to cause PHP to crash, resulting in a denial of service, or to possibly execute arbitrary code. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id66877
    published2013-06-12
    reporterUbuntu Security Notice (C) 2013-2019 Canonical, Inc. / NASL script (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/66877
    titleUbuntu 13.04 : php5 vulnerability (USN-1872-1)
  • NASL familySolaris Local Security Checks
    NASL idSOLARIS11_PHP_20140401.NASL
    descriptionThe remote Solaris system is missing necessary patches to address security updates : - Session fixation vulnerability in the Sessions subsystem in PHP before 5.5.2 allows remote attackers to hijack web sessions by specifying a session ID. (CVE-2011-4718) - Unspecified vulnerability in the _php_stream_scandir function in the stream implementation in PHP before 5.3.15 and 5.4.x before 5.4.5 has unknown impact and remote attack vectors, related to an
    last seen2020-06-01
    modified2020-06-02
    plugin id80736
    published2015-01-19
    reporterThis script is Copyright (C) 2015-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/80736
    titleOracle Solaris Third-Party Patch Update : php (cve_2013_4113_buffer_errors)
  • NASL familyCGI abuses
    NASL idPHP_5_3_26.NASL
    descriptionAccording to its banner, the version of PHP 5.3.x installed on the remote host is prior to 5.3.26. It is, therefore, potentially affected by the following vulnerabilities: - An error exists in the function
    last seen2020-06-01
    modified2020-06-02
    plugin id66842
    published2013-06-07
    reporterThis script is Copyright (C) 2013-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/66842
    titlePHP 5.3.x < 5.3.26 Multiple Vulnerabilities
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2013-10233.NASL
    description06 Jun 2013, PHP 5.4.16 Core : - Fixed bug #64879 (Heap based buffer overflow in quoted_printable_encode, CVE-2013-2110). (Stas) - Fixed bug #64853 (Use of no longer available ini directives causes crash on TS build). (Anatol) - Fixed bug #64729 (compilation failure on x32). (Gustavo) - Fixed bug #64720 (SegFault on zend_deactivate). (Dmitry) - Fixed bug #64660 (Segfault on memory exhaustion within function definition). (Stas, reported by Juha Kylmanen) Calendar: -Fixed bug #64895 (Integer overflow in SndToJewish). (Remi) Fileinfo : - Fixed bug #64830 (mimetype detection segfaults on mp3 file). (Anatol) FPM : - Ignore QUERY_STRING when sent in SCRIPT_FILENAME. (Remi) - Fixed some possible memory or resource leaks and possible null dereference detected by code coverity scan. (Remi) - Log a warning when a syscall fails. (Remi) - Add --with-fpm-systemd option to report health to systemd, and systemd_interval option to configure this. The service can now use Type=notify in the systemd unit file. (Remi) MySQLi - Fixed bug #64726 (Segfault when calling fetch_object on a use_result and DB pointer has closed). (Laruence) Phar - Fixed bug #64214 (PHAR PHPTs intermittently crash when run on DFS, SMB or with non std tmp dir). (Pierre) SNMP : - Fixed bug #64765 (Some IPv6 addresses get interpreted wrong). (Boris Lytochkin) - Fixed bug #64159 (Truncated snmpget). (Boris Lytochkin) Streams : - Fixed bug #64770 (stream_select() fails with pipes returned by proc_open() on Windows x64). (Anatol) Zend Engine : - Fixed bug #64821 (Custom Exceptions crash when internal properties overridden). (Anatol) Fix backported from PHP 5.4.17 Core : - Fixed bug #64960 (Segfault in gc_zval_possible_root). (Laruence) FPM : - Fixed Bug #64915 (error_log ignored when daemonize=0). (Remi) PDO_pgsql : - Fixed Bug #64949 (Buffer overflow in _pdo_pgsql_error). (Remi) Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-03-17
    modified2013-07-12
    plugin id67274
    published2013-07-12
    reporterThis script is Copyright (C) 2013-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/67274
    titleFedora 17 : php-5.4.16-1.fc17 (2013-10233)
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-201408-11.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-201408-11 (PHP: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in PHP. Please review the CVE identifiers referenced below for details. Impact : A context-dependent attacker can cause arbitrary code execution, create a Denial of Service condition, read or write arbitrary files, impersonate other servers, hijack a web session, or have other unspecified impact. Additionally, a local attacker could gain escalated privileges. Workaround : There is no known workaround at this time.
    last seen2020-06-01
    modified2020-06-02
    plugin id77455
    published2014-08-30
    reporterThis script is Copyright (C) 2014-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/77455
    titleGLSA-201408-11 : PHP: Multiple vulnerabilities
  • NASL familySlackware Local Security Checks
    NASL idSLACKWARE_SSA_2013-161-01.NASL
    descriptionNew php packages are available for Slackware 12.1, 12.2, 13.0, 13.1, 13.37, 14.0, and -current to fix a security issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id66850
    published2013-06-11
    reporterThis script is Copyright (C) 2013-2014 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/66850
    titleSlackware 12.1 / 12.2 / 13.0 / 13.1 / 13.37 / 14.0 / current : php (SSA:2013-161-01)

Seebug

bulletinFamilyexploit
descriptionBugtraq ID:60411 CVE ID:CVE-2013-2110 PHP是一种HTML内嵌式的语言。 &quot;php_quot_print_encode()&quot;函数(ext/standard/quot_print.c)在解析字符串时存在一个基于堆的缓冲区溢出,允许攻击者利用此漏洞以应用程序上下文执行任意代码。 此外在解析MP3文件的MIMETYPE时存在一个安全问题,可导致PHP 5.4.15版本崩溃。 0 PHP 5.3.x PHP 5.4.x 厂商解决方案 PHP 5.4.16或5.3.26已经修复此漏洞,建议用户下载更新: http://www.php.net/
idSSV:60840
last seen2017-11-19
modified2013-06-11
published2013-06-11
reporterRoot
titlePHP &quot;php_quot_print_encode()&quot;缓冲区溢出漏洞(CVE-2013-2110)