5
CVSSv2

CVE-2010-4156

Published: 10/11/2010 Updated: 04/05/2011
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 505
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

The mb_strcut function in Libmbfl 1.1.0, as used in PHP 5.3.x up to and including 5.3.3, allows context-dependent malicious users to obtain potentially sensitive information via a large value of the third parameter (aka the length parameter).

Vulnerable Product Search on Vulmon Subscribe to Product

scottmac libmbfl 1.1.0

Vendor Advisories

Debian Bug report logs - #603751 Three more security issues Package: php5; Maintainer for php5 is Debian PHP Maintainers <pkg-php-maint@listsaliothdebianorg>; Source for php5 is src:php5 (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Tue, 16 Nov 2010 22:33:02 UTC Severity: important ...
It was discovered that an integer overflow in the XML UTF-8 decoding code could allow an attacker to bypass cross-site scripting (XSS) protections This issue only affected Ubuntu 606 LTS, Ubuntu 804 LTS, and Ubuntu 910 (CVE-2009-5016) ...

Exploits

# source: wwwsecurityfocuscom/bid/44727/info # # PHP is prone to an information-disclosure vulnerability # # Attackers can exploit this issue to obtain sensitive information that may lead to further attacks # <?php $b = "bbbbbbbbbbb"; str_repeat("THIS IS A SECRET MESSAGE, ISN'T IT?", 1); $var3 = mb_strcut($b, 0, 1000); echo $var3; ? ...