5
CVSSv2

CVE-2010-4156

Published: 10/11/2010 Updated: 04/05/2011
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 505
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

The mb_strcut function in Libmbfl 1.1.0, as used in PHP 5.3.x up to and including 5.3.3, allows context-dependent malicious users to obtain potentially sensitive information via a large value of the third parameter (aka the length parameter).

Vulnerable Product Search on Vulmon Subscribe to Product

scottmac libmbfl 1.1.0

Vendor Advisories

It was discovered that an integer overflow in the XML UTF-8 decoding code could allow an attacker to bypass cross-site scripting (XSS) protections This issue only affected Ubuntu 606 LTS, Ubuntu 804 LTS, and Ubuntu 910 (CVE-2009-5016) ...
Debian Bug report logs - #603751 Three more security issues Package: php5; Maintainer for php5 is Debian PHP Maintainers <pkg-php-maint@listsaliothdebianorg>; Source for php5 is src:php5 (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Tue, 16 Nov 2010 22:33:02 UTC Severity: important ...

Exploits

# source: wwwsecurityfocuscom/bid/44727/info # # PHP is prone to an information-disclosure vulnerability # # Attackers can exploit this issue to obtain sensitive information that may lead to further attacks # <?php $b = "bbbbbbbbbbb"; str_repeat("THIS IS A SECRET MESSAGE, ISN'T IT?", 1); $var3 = mb_strcut($b, 0, 1000); echo $var3; ? ...