5
CVSSv2

CVE-2010-4645

Published: 11/01/2011 Updated: 15/05/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 505
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

strtod.c, as used in the zend_strtod function in PHP 5.2 prior to 5.2.17 and 5.3 prior to 5.3.5, and other products, allows context-dependent malicious users to cause a denial of service (infinite loop) via a certain floating-point value in scientific notation, which is not properly handled in x87 FPU registers, as demonstrated using 2.2250738585072011e-308.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

php php 5.2.9

php php 5.2.14

php php 5.2.16

php php 5.2.7

php php 5.2.2

php php 5.2.5

php php 5.2.12

php php 5.2.11

php php 5.2.6

php php 5.2.3

php php 5.2.13

php php 5.2.0

php php 5.2.4

php php 5.2.10

php php 5.2.15

php php 5.2.1

php php 5.2.8

php php 5.3.1

php php 5.3.0

php php 5.3.3

php php 5.3.2

php php 5.3.4

Vendor Advisories

It was discovered that an integer overflow in the XML UTF-8 decoding code could allow an attacker to bypass cross-site scripting (XSS) protections This issue only affected Ubuntu 606 LTS, Ubuntu 804 LTS, and Ubuntu 910 (CVE-2009-5016) ...

Exploits

source: wwwsecurityfocuscom/bid/45668/info PHP is prone to a remote denial-of-service vulnerability Successful attacks will cause applications written in PHP to hang, creating a denial-of-service condition PHP 533 is vulnerable; other versions may also be affected <?php $d = 22250738585072011e-308; ?> ...

References

CWE-189http://hal.archives-ouvertes.fr/docs/00/28/14/29/PDF/floating-point-article.pdfhttp://www.securityfocus.com/bid/45668http://www.openwall.com/lists/oss-security/2011/01/05/8http://bugs.php.net/53632http://svn.php.net/viewvc/php/php-src/branches/PHP_5_2/Zend/zend_strtod.c?r1=266327&r2=307095&pathrev=307095http://www.openwall.com/lists/oss-security/2011/01/06/5http://www.vupen.com/english/advisories/2011/0060http://www.openwall.com/lists/oss-security/2011/01/05/2http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.484686http://secunia.com/advisories/42843http://www.vupen.com/english/advisories/2011/0066http://www.exploringbinary.com/php-hangs-on-numeric-value-2-2250738585072011e-308/http://secunia.com/advisories/42812http://www.vupen.com/english/advisories/2011/0077http://www.ubuntu.com/usn/USN-1042-1http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053355.htmlhttp://lists.fedoraproject.org/pipermail/package-announce/2011-January/053333.htmlhttp://secunia.com/advisories/43051http://www.vupen.com/english/advisories/2011/0198http://www.redhat.com/support/errata/RHSA-2011-0196.htmlhttp://secunia.com/advisories/43189http://www.redhat.com/support/errata/RHSA-2011-0195.htmlhttp://support.apple.com/kb/HT5002http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.htmlhttp://marc.info/?l=bugtraq&m=133226187115472&w=2http://marc.info/?l=bugtraq&m=133469208622507&w=2https://exchange.xforce.ibmcloud.com/vulnerabilities/64470http://www.openwall.com/lists/oss-security/2023/05/14/3https://nvd.nist.govhttps://usn.ubuntu.com/1042-1/https://www.exploit-db.com/exploits/35164/