Vulnerabilities > CVE-2013-2110 - Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in PHP
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Heap-based buffer overflow in the php_quot_print_encode function in ext/standard/quot_print.c in PHP before 5.3.26 and 5.4.x before 5.4.16 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted argument to the quoted_printable_encode function.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Common Attack Pattern Enumeration and Classification (CAPEC)
- Buffer Overflow via Environment Variables This attack pattern involves causing a buffer overflow through manipulation of environment variables. Once the attacker finds that they can modify an environment variable, they may try to overflow associated buffers. This attack leverages implicit trust often placed in environment variables.
- Overflow Buffers Buffer Overflow attacks target improper or missing bounds checking on buffer operations, typically triggered by input injected by an attacker. As a consequence, an attacker is able to write past the boundaries of allocated buffer regions in memory, causing a program crash or potentially redirection of execution as per the attackers' choice.
- Client-side Injection-induced Buffer Overflow This type of attack exploits a buffer overflow vulnerability in targeted client software through injection of malicious content from a custom-built hostile service.
- Filter Failure through Buffer Overflow In this attack, the idea is to cause an active filter to fail by causing an oversized transaction. An attacker may try to feed overly long input strings to the program in an attempt to overwhelm the filter (by causing a buffer overflow) and hoping that the filter does not fail securely (i.e. the user input is let into the system unfiltered).
- MIME Conversion An attacker exploits a weakness in the MIME conversion routine to cause a buffer overflow and gain control over the mail server machine. The MIME system is designed to allow various different information formats to be interpreted and sent via e-mail. Attack points exist when data are converted to MIME compatible format and back.
Nessus
NASL family Fedora Local Security Checks NASL id FEDORA_2013-10206.NASL description IMPORTANT CHANGE : - JSON extension is no more provided by php-common - php-pecl-jsonc provides a drop-in alternative Upstream Changelog, 06 Jun 2013, PHP 5.5.0 Release Candidate 3 Core : - Fixed bug #64960 (Segfault in gc_zval_possible_root). (Laruence) - Fixed bug #64879 (Heap based buffer overflow in quoted_printable_encode, CVE-2013-2110). (Stas) FPM : - Fixed Bug #64915 (error_log ignored when daemonize=0). (Remi) GD : - Fixed Bug #64962 (imagerotate produces corrupted image). (Remi) - Fixed Bug #64961 (segfault in imagesetinterpolation). (Remi) Hash : - Fixed Bug #64745 (hash_pbkdf2() truncates data when using default length and hex output). (Anthony Ferrara) PDO_DBlib : - Fixed bug #63638 (Cannot connect to SQL Server 2008 with PDO dblib). (Stanley Sufficool) - Fixed bug #64338 (pdo_dblib can last seen 2020-03-17 modified 2013-07-12 plugin id 67273 published 2013-07-12 reporter This script is Copyright (C) 2013-2020 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/67273 title Fedora 19 : php-5.5.0-0.10.RC3.fc19 / php-pecl-jsonc-1.3.1-1.fc19 (2013-10206) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Fedora Security Advisory 2013-10206. # include("compat.inc"); if (description) { script_id(67273); script_version("1.3"); script_set_attribute(attribute:"plugin_modification_date", value:"2020/03/12"); script_xref(name:"FEDORA", value:"2013-10206"); script_name(english:"Fedora 19 : php-5.5.0-0.10.RC3.fc19 / php-pecl-jsonc-1.3.1-1.fc19 (2013-10206)"); script_summary(english:"Checks rpm output for the updated packages."); script_set_attribute( attribute:"synopsis", value:"The remote Fedora host is missing one or more security updates." ); script_set_attribute( attribute:"description", value: "IMPORTANT CHANGE : - JSON extension is no more provided by php-common - php-pecl-jsonc provides a drop-in alternative Upstream Changelog, 06 Jun 2013, PHP 5.5.0 Release Candidate 3 Core : - Fixed bug #64960 (Segfault in gc_zval_possible_root). (Laruence) - Fixed bug #64879 (Heap based buffer overflow in quoted_printable_encode, CVE-2013-2110). (Stas) FPM : - Fixed Bug #64915 (error_log ignored when daemonize=0). (Remi) GD : - Fixed Bug #64962 (imagerotate produces corrupted image). (Remi) - Fixed Bug #64961 (segfault in imagesetinterpolation). (Remi) Hash : - Fixed Bug #64745 (hash_pbkdf2() truncates data when using default length and hex output). (Anthony Ferrara) PDO_DBlib : - Fixed bug #63638 (Cannot connect to SQL Server 2008 with PDO dblib). (Stanley Sufficool) - Fixed bug #64338 (pdo_dblib can't connect to Azure SQL). (Stanley Sufficool) - Fixed bug #64808 (FreeTDS PDO getColumnMeta on a prepared but not executed statement crashes). (Stanley Sufficool) PDO_pgsql : - Fixed Bug #64949 (Buffer overflow in _pdo_pgsql_error). (Remi) Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues." ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=973696" ); # https://lists.fedoraproject.org/pipermail/package-announce/2013-June/109515.html script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?3166a1df" ); # https://lists.fedoraproject.org/pipermail/package-announce/2013-June/109516.html script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?11906567" ); script_set_attribute( attribute:"solution", value:"Update the affected php and / or php-pecl-jsonc packages." ); script_set_attribute(attribute:"risk_factor", value:"High"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:php"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:php-pecl-jsonc"); script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:19"); script_set_attribute(attribute:"patch_publication_date", value:"2013/06/06"); script_set_attribute(attribute:"plugin_publication_date", value:"2013/07/12"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2013-2020 Tenable Network Security, Inc."); script_family(english:"Fedora Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/RedHat/release"); if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora"); os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release); if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora"); os_ver = os_ver[1]; if (! ereg(pattern:"^19([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 19.x", "Fedora " + os_ver); if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu); flag = 0; if (rpm_check(release:"FC19", reference:"php-5.5.0-0.10.RC3.fc19")) flag++; if (rpm_check(release:"FC19", reference:"php-pecl-jsonc-1.3.1-1.fc19")) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get()); else security_hole(0); exit(0); } else { tested = pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "php / php-pecl-jsonc"); }
NASL family FreeBSD Local Security Checks NASL id FREEBSD_PKG_59E7163CCF8411E2907B0025905A4770.NASL description The PHP development team reports : A Heap-based buffer overflow flaw was found in the php quoted_printable_encode() function. A remote attacker could use this flaw to cause php to crash or execute arbitrary code with the permission of the user running php last seen 2020-06-01 modified 2020-06-02 plugin id 66845 published 2013-06-08 reporter This script is Copyright (C) 2013-2018 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/66845 title FreeBSD : php5 -- Heap based buffer overflow in quoted_printable_encode (59e7163c-cf84-11e2-907b-0025905a4770) NASL family MacOS X Local Security Checks NASL id MACOSX_SECUPD2013-004.NASL description The remote host is running a version of Mac OS X 10.6 or 10.7 that does not have Security Update 2013-004 applied. This update contains several security-related fixes for the following component : - Apache - Bind - Certificate Trust Policy - ClamAV - Installer - IPSec - Mobile Device Management - OpenSSL - PHP - PostgreSQL - QuickTime - sudo Note that successful exploitation of the most serious issues could result in arbitrary code execution. last seen 2020-06-01 modified 2020-06-02 plugin id 69878 published 2013-09-13 reporter This script is Copyright (C) 2013-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/69878 title Mac OS X Multiple Vulnerabilities (Security Update 2013-004) NASL family MacOS X Local Security Checks NASL id MACOSX_10_8_5.NASL description The remote host is running a version of Mac OS X 10.8.x that is prior to 10.8.5. The newer version contains multiple security-related fixes for the following components : - Apache - Bind - Certificate Trust Policy - CoreGraphics - ImageIO - Installer - IPSec - Kernel - Mobile Device Management - OpenSSL - PHP - PostgreSQL - Power Management - QuickTime - Screen Lock - sudo This update also addresses an issue in which certain Unicode strings could cause applications to unexpectedly quit. Note that successful exploitation of the most serious issues could result in arbitrary code execution. last seen 2020-06-01 modified 2020-06-02 plugin id 69877 published 2013-09-13 reporter This script is Copyright (C) 2013-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/69877 title Mac OS X 10.8.x < 10.8.5 Multiple Vulnerabilities NASL family Amazon Linux Local Security Checks NASL id ALA_ALAS-2013-205.NASL description Heap-based buffer overflow in the php_quot_print_encode function in ext/standard/quot_print.c in PHP before 5.3.26 and 5.4.x before 5.4.16 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted argument to the quoted_printable_encode function. last seen 2020-06-01 modified 2020-06-02 plugin id 69763 published 2013-09-04 reporter This script is Copyright (C) 2013-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/69763 title Amazon Linux AMI : php (ALAS-2013-205) NASL family F5 Networks Local Security Checks NASL id F5_BIGIP_SOL15876.NASL description Heap-based buffer overflow in the php_quot_print_encode function in ext/standard/quot_print.c in PHP before 5.3.26 and 5.4.x before 5.4.16 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted argument to the quoted_printable_encode function. last seen 2020-06-01 modified 2020-06-02 plugin id 79644 published 2014-12-02 reporter This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/79644 title F5 Networks BIG-IP : PHP vulnerability (SOL15876) NASL family CGI abuses NASL id PHP_5_4_16.NASL description According to its banner, the version of PHP 5.4.x installed on the remote host is prior to 5.4.16. It is, therefore, potentially affected by the following vulnerabilities: - An error exists in the mimetype detection of last seen 2020-06-01 modified 2020-06-02 plugin id 66843 published 2013-06-07 reporter This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/66843 title PHP 5.4.x < 5.4.16 Multiple Vulnerabilities NASL family Amazon Linux Local Security Checks NASL id ALA_ALAS-2013-206.NASL description Heap-based buffer overflow in the php_quot_print_encode function in ext/standard/quot_print.c in PHP before 5.3.26 and 5.4.x before 5.4.16 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted argument to the quoted_printable_encode function. last seen 2020-06-01 modified 2020-06-02 plugin id 69764 published 2013-09-04 reporter This script is Copyright (C) 2013-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/69764 title Amazon Linux AMI : php54 (ALAS-2013-206) NASL family Fedora Local Security Checks NASL id FEDORA_2013-10255.NASL description 06 Jun 2013, PHP 5.4.16 Core : - Fixed bug #64879 (Heap based buffer overflow in quoted_printable_encode, CVE-2013-2110). (Stas) - Fixed bug #64853 (Use of no longer available ini directives causes crash on TS build). (Anatol) - Fixed bug #64729 (compilation failure on x32). (Gustavo) - Fixed bug #64720 (SegFault on zend_deactivate). (Dmitry) - Fixed bug #64660 (Segfault on memory exhaustion within function definition). (Stas, reported by Juha Kylmanen) Calendar: -Fixed bug #64895 (Integer overflow in SndToJewish). (Remi) Fileinfo : - Fixed bug #64830 (mimetype detection segfaults on mp3 file). (Anatol) FPM : - Ignore QUERY_STRING when sent in SCRIPT_FILENAME. (Remi) - Fixed some possible memory or resource leaks and possible null dereference detected by code coverity scan. (Remi) - Log a warning when a syscall fails. (Remi) - Add --with-fpm-systemd option to report health to systemd, and systemd_interval option to configure this. The service can now use Type=notify in the systemd unit file. (Remi) MySQLi - Fixed bug #64726 (Segfault when calling fetch_object on a use_result and DB pointer has closed). (Laruence) Phar - Fixed bug #64214 (PHAR PHPTs intermittently crash when run on DFS, SMB or with non std tmp dir). (Pierre) SNMP : - Fixed bug #64765 (Some IPv6 addresses get interpreted wrong). (Boris Lytochkin) - Fixed bug #64159 (Truncated snmpget). (Boris Lytochkin) Streams : - Fixed bug #64770 (stream_select() fails with pipes returned by proc_open() on Windows x64). (Anatol) Zend Engine : - Fixed bug #64821 (Custom Exceptions crash when internal properties overridden). (Anatol) Fix backported from PHP 5.4.17 Core : - Fixed bug #64960 (Segfault in gc_zval_possible_root). (Laruence) FPM : - Fixed Bug #64915 (error_log ignored when daemonize=0). (Remi) PDO_pgsql : - Fixed Bug #64949 (Buffer overflow in _pdo_pgsql_error). (Remi) Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-03-17 modified 2013-07-12 plugin id 67276 published 2013-07-12 reporter This script is Copyright (C) 2013-2020 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/67276 title Fedora 18 : php-5.4.16-1.fc18 (2013-10255) NASL family Ubuntu Local Security Checks NASL id UBUNTU_USN-1872-1.NASL description It was discovered that PHP incorrectly handled the quoted_printable_encode function. An attacker could use this flaw to cause PHP to crash, resulting in a denial of service, or to possibly execute arbitrary code. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 66877 published 2013-06-12 reporter Ubuntu Security Notice (C) 2013-2019 Canonical, Inc. / NASL script (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/66877 title Ubuntu 13.04 : php5 vulnerability (USN-1872-1) NASL family Solaris Local Security Checks NASL id SOLARIS11_PHP_20140401.NASL description The remote Solaris system is missing necessary patches to address security updates : - Session fixation vulnerability in the Sessions subsystem in PHP before 5.5.2 allows remote attackers to hijack web sessions by specifying a session ID. (CVE-2011-4718) - Unspecified vulnerability in the _php_stream_scandir function in the stream implementation in PHP before 5.3.15 and 5.4.x before 5.4.5 has unknown impact and remote attack vectors, related to an last seen 2020-06-01 modified 2020-06-02 plugin id 80736 published 2015-01-19 reporter This script is Copyright (C) 2015-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/80736 title Oracle Solaris Third-Party Patch Update : php (cve_2013_4113_buffer_errors) NASL family CGI abuses NASL id PHP_5_3_26.NASL description According to its banner, the version of PHP 5.3.x installed on the remote host is prior to 5.3.26. It is, therefore, potentially affected by the following vulnerabilities: - An error exists in the function last seen 2020-06-01 modified 2020-06-02 plugin id 66842 published 2013-06-07 reporter This script is Copyright (C) 2013-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/66842 title PHP 5.3.x < 5.3.26 Multiple Vulnerabilities NASL family Fedora Local Security Checks NASL id FEDORA_2013-10233.NASL description 06 Jun 2013, PHP 5.4.16 Core : - Fixed bug #64879 (Heap based buffer overflow in quoted_printable_encode, CVE-2013-2110). (Stas) - Fixed bug #64853 (Use of no longer available ini directives causes crash on TS build). (Anatol) - Fixed bug #64729 (compilation failure on x32). (Gustavo) - Fixed bug #64720 (SegFault on zend_deactivate). (Dmitry) - Fixed bug #64660 (Segfault on memory exhaustion within function definition). (Stas, reported by Juha Kylmanen) Calendar: -Fixed bug #64895 (Integer overflow in SndToJewish). (Remi) Fileinfo : - Fixed bug #64830 (mimetype detection segfaults on mp3 file). (Anatol) FPM : - Ignore QUERY_STRING when sent in SCRIPT_FILENAME. (Remi) - Fixed some possible memory or resource leaks and possible null dereference detected by code coverity scan. (Remi) - Log a warning when a syscall fails. (Remi) - Add --with-fpm-systemd option to report health to systemd, and systemd_interval option to configure this. The service can now use Type=notify in the systemd unit file. (Remi) MySQLi - Fixed bug #64726 (Segfault when calling fetch_object on a use_result and DB pointer has closed). (Laruence) Phar - Fixed bug #64214 (PHAR PHPTs intermittently crash when run on DFS, SMB or with non std tmp dir). (Pierre) SNMP : - Fixed bug #64765 (Some IPv6 addresses get interpreted wrong). (Boris Lytochkin) - Fixed bug #64159 (Truncated snmpget). (Boris Lytochkin) Streams : - Fixed bug #64770 (stream_select() fails with pipes returned by proc_open() on Windows x64). (Anatol) Zend Engine : - Fixed bug #64821 (Custom Exceptions crash when internal properties overridden). (Anatol) Fix backported from PHP 5.4.17 Core : - Fixed bug #64960 (Segfault in gc_zval_possible_root). (Laruence) FPM : - Fixed Bug #64915 (error_log ignored when daemonize=0). (Remi) PDO_pgsql : - Fixed Bug #64949 (Buffer overflow in _pdo_pgsql_error). (Remi) Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-03-17 modified 2013-07-12 plugin id 67274 published 2013-07-12 reporter This script is Copyright (C) 2013-2020 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/67274 title Fedora 17 : php-5.4.16-1.fc17 (2013-10233) NASL family Gentoo Local Security Checks NASL id GENTOO_GLSA-201408-11.NASL description The remote host is affected by the vulnerability described in GLSA-201408-11 (PHP: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in PHP. Please review the CVE identifiers referenced below for details. Impact : A context-dependent attacker can cause arbitrary code execution, create a Denial of Service condition, read or write arbitrary files, impersonate other servers, hijack a web session, or have other unspecified impact. Additionally, a local attacker could gain escalated privileges. Workaround : There is no known workaround at this time. last seen 2020-06-01 modified 2020-06-02 plugin id 77455 published 2014-08-30 reporter This script is Copyright (C) 2014-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/77455 title GLSA-201408-11 : PHP: Multiple vulnerabilities NASL family Slackware Local Security Checks NASL id SLACKWARE_SSA_2013-161-01.NASL description New php packages are available for Slackware 12.1, 12.2, 13.0, 13.1, 13.37, 14.0, and -current to fix a security issue. last seen 2020-06-01 modified 2020-06-02 plugin id 66850 published 2013-06-11 reporter This script is Copyright (C) 2013-2014 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/66850 title Slackware 12.1 / 12.2 / 13.0 / 13.1 / 13.37 / 14.0 / current : php (SSA:2013-161-01)
Seebug
bulletinFamily | exploit |
description | Bugtraq ID:60411 CVE ID:CVE-2013-2110 PHP是一种HTML内嵌式的语言。 "php_quot_print_encode()"函数(ext/standard/quot_print.c)在解析字符串时存在一个基于堆的缓冲区溢出,允许攻击者利用此漏洞以应用程序上下文执行任意代码。 此外在解析MP3文件的MIMETYPE时存在一个安全问题,可导致PHP 5.4.15版本崩溃。 0 PHP 5.3.x PHP 5.4.x 厂商解决方案 PHP 5.4.16或5.3.26已经修复此漏洞,建议用户下载更新: http://www.php.net/ |
id | SSV:60840 |
last seen | 2017-11-19 |
modified | 2013-06-11 |
published | 2013-06-11 |
reporter | Root |
title | PHP "php_quot_print_encode()"缓冲区溢出漏洞(CVE-2013-2110) |
References
- http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html
- http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html
- http://support.apple.com/kb/HT5880
- http://support.apple.com/kb/HT5880
- http://www.php.net/ChangeLog-5.php
- http://www.php.net/ChangeLog-5.php
- http://www.securityfocus.com/bid/60411
- http://www.securityfocus.com/bid/60411
- http://www.ubuntu.com/usn/USN-1872-1
- http://www.ubuntu.com/usn/USN-1872-1
- https://bugs.php.net/bug.php?id=64879
- https://bugs.php.net/bug.php?id=64879