4.3
CVSSv2

CVE-2010-3710

Published: 25/10/2010 Updated: 23/08/2016
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

Stack consumption vulnerability in the filter_var function in PHP 5.2.x up to and including 5.2.14 and 5.3.x up to and including 5.3.3, when FILTER_VALIDATE_EMAIL mode is used, allows remote malicious users to cause a denial of service (memory consumption and application crash) via a long e-mail address string.

Vulnerable Product Search on Vulmon Subscribe to Product

php php 5.2.5

php php 5.2.0

php php 5.2.1

php php 5.2.2

php php 5.2.13

php php 5.2.11

php php 5.2.3

php php 5.2.14

php php 5.2.12

php php 5.2.10

php php 5.2.6

php php 5.2.8

php php 5.3.1

php php 5.3.2

php php 5.2.9

php php 5.2.7

php php 5.2.4

php php 5.3.3

php php 5.3.0

Vendor Advisories

Debian Bug report logs - #601619 CVE-2010-3710: DoS in filter_var() Package: php5; Maintainer for php5 is Debian PHP Maintainers <pkg-php-maint@listsaliothdebianorg>; Source for php5 is src:php5 (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Wed, 27 Oct 2010 20:42:01 UTC Severity: im ...
It was discovered that an integer overflow in the XML UTF-8 decoding code could allow an attacker to bypass cross-site scripting (XSS) protections This issue only affected Ubuntu 606 LTS, Ubuntu 804 LTS, and Ubuntu 910 (CVE-2009-5016) ...
Stephane Chazelas discovered that the cronjob of the PHP 5 package in Debian suffers from a race condition which might be used to remove arbitrary files from a system (CVE-2011-0441) When upgrading your php5-common package take special care to accept the changes to the /etc/crond/php5 file Ignoring them would leave the system vulnerable For the ...