5
CVSSv2

CVE-2010-0397

Published: 16/03/2010 Updated: 10/12/2010
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 505
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

The xmlrpc extension in PHP 5.3.1 does not properly handle a missing methodName element in the first argument to the xmlrpc_decode_request function, which allows context-dependent malicious users to cause a denial of service (NULL pointer dereference and application crash) and possibly have unspecified other impact via a crafted argument.

Vulnerable Product Search on Vulmon Subscribe to Product

php php 5.3.1

Vendor Advisories

Debian Bug report logs - #573573 CVE-2010-0397: null pointer dereference in the xmlrpc extension Package: php5-xmlrpc; Maintainer for php5-xmlrpc is Debian PHP Maintainers <pkg-php-maint@listsaliothdebianorg>; Source for php5-xmlrpc is src:php5 (PTS, buildd, popcon) Reported by: Auke van Slooten <auke@muzenl> Dat ...
Auke van Slooten discovered that PHP incorrectly handled certain xmlrpc requests An attacker could exploit this issue to cause the PHP server to crash, resulting in a denial of service This issue only affected Ubuntu 606 LTS, 804 LTS, 904 and 910 (CVE-2010-0397) ...

Exploits

source: wwwsecurityfocuscom/bid/38708/info PHP's xmlrpc extension library is prone to multiple denial-of-service vulnerabilities because it fails to properly handle crafted XML-RPC requests Exploiting these issues allows remote attackers to cause denial-of-service conditions in the context of an application using the vulnerable library ...