10
CVSSv2

CVE-2008-5557

Published: 23/12/2008 Updated: 11/10/2018
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 890
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Heap-based buffer overflow in ext/mbstring/libmbfl/filters/mbfilter_htmlent.c in the mbstring extension in PHP 4.3.0 up to and including 5.2.6 allows context-dependent malicious users to execute arbitrary code via a crafted string containing an HTML entity, which is not properly handled during Unicode conversion, related to the (1) mb_convert_encoding, (2) mb_check_encoding, (3) mb_convert_variables, and (4) mb_parse_str functions.

Vulnerable Product Search on Vulmon Subscribe to Product

php php 4.3.2

php php 4.3.3

php php 4.3.10

php php 4.3.11

php php 4.4.2

php php 4.4.3

php php 5.0.0

php php 5.1.0

php php 5.1.1

php php 5.2.2

php php 5.2.3

php php 4.3.1

php php 4.3.0

php php 4.3.8

php php 4.3.9

php php 4.4.8

php php 4.4.9

php php 4.4.1

php php 5.0.4

php php 5.0.5

php php 5.2.0

php php 5.2.1

php php 4.3.4

php php 4.3.5

php php 4.4.0

php php 4.4.5

php php 4.4.4

php php 5.0.1

php php 5.1.2

php php 5.1.3

php php 5.2.4

php php 5.2.5

php php 4.3.6

php php 4.3.7

php php 4.4.6

php php 4.4.7

php php 5.0.2

php php 5.0.3

php php 5.1.4

php php 5.1.5

php php 5.1.6

php php 5.2.6

Vendor Advisories

Synopsis Moderate: php security update Type/Severity Security Advisory: Moderate Topic Updated php packages that fix several security issues are now available forRed Hat Enterprise Linux 5This update has been rated as having moderate security impact by the RedHat Security Response Team Descriptio ...
It was discovered that PHP did not properly enforce php_admin_value and php_admin_flag restrictions in the Apache configuration file A local attacker could create a specially crafted PHP script that would bypass intended security restrictions This issue only applied to Ubuntu 606 LTS, 710, and 804 LTS (CVE-2007-5900) ...
Several remote vulnerabilities have been discovered in the PHP 5 hypertext preprocessor The Common Vulnerabilities and Exposures project identifies the following problems The following four vulnerabilities have already been fixed in the stable (lenny) version of php5 prior to the release of lenny This update now addresses them for etch (oldstab ...
Debian Bug report logs - #511493 CVE-2008-5557: buffer overflow Package: php5; Maintainer for php5 is Debian PHP Maintainers <pkg-php-maint@listsaliothdebianorg>; Source for php5 is src:php5 (PTS, buildd, popcon) Reported by: Steffen Joeris <steffenjoeris@skolelinuxde> Date: Sun, 11 Jan 2009 15:33:01 UTC Severi ...
Debian Bug report logs - #523028 CVE-2008-5814: XSS vulnerability in PHP <= 527 Package: php5; Maintainer for php5 is Debian PHP Maintainers <pkg-php-maint@listsaliothdebianorg>; Source for php5 is src:php5 (PTS, buildd, popcon) Reported by: "Michael S Gilbert" <michaelsgilbert@gmailcom> Date: Tue, 7 Apr ...
Debian Bug report logs - #523049 CVE-2009-0754: mbstringfunc_overload setting leakage across vhosts Package: php5; Maintainer for php5 is Debian PHP Maintainers <pkg-php-maint@listsaliothdebianorg>; Source for php5 is src:php5 (PTS, buildd, popcon) Reported by: "Michael S Gilbert" <michaelsgilbert@gmailcom> D ...

References

CWE-119http://bugs.php.net/bug.php?id=45722http://www.php.net/ChangeLog-5.php#5.2.7http://archives.neohapsis.com/archives/fulldisclosure/2008-12/0477.htmlhttp://www.securityfocus.com/bid/32948http://cvs.php.net/viewvc.cgi/php-src/ext/mbstring/libmbfl/filters/mbfilter_htmlent.c?r1=1.7&r2=1.8http://securitytracker.com/id?1021482http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.htmlhttp://www.mandriva.com/security/advisories?name=MDVSA-2009:045http://wiki.rpath.com/Advisories:rPSA-2009-0035http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.htmlhttp://secunia.com/advisories/34642http://www.redhat.com/support/errata/RHSA-2009-0350.htmlhttp://secunia.com/advisories/35003http://www.debian.org/security/2009/dsa-1789http://secunia.com/advisories/35074http://www.vupen.com/english/advisories/2009/1297http://lists.apple.com/archives/security-announce/2009/May/msg00002.htmlhttp://support.apple.com/kb/HT3549http://www.us-cert.gov/cas/techalerts/TA09-133A.htmlhttps://www.redhat.com/archives/fedora-package-announce/2009-May/msg01451.htmlhttps://www.redhat.com/archives/fedora-package-announce/2009-May/msg01465.htmlhttp://secunia.com/advisories/35306http://secunia.com/advisories/35650http://marc.info/?l=bugtraq&m=124654546101607&w=2http://marc.info/?l=bugtraq&m=125631037611762&w=2http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02029444https://exchange.xforce.ibmcloud.com/vulnerabilities/47525https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10286http://www.securityfocus.com/archive/1/501376/100/0/threadedhttps://access.redhat.com/errata/RHSA-2009:0338https://usn.ubuntu.com/720-1/https://nvd.nist.gov