CVE-2010-4156
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
10/11/2010
Last modified:
11/04/2025
Description
The mb_strcut function in Libmbfl 1.1.0, as used in PHP 5.3.x through 5.3.3, allows context-dependent attackers to obtain potentially sensitive information via a large value of the third parameter (aka the length parameter).
Impact
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:php:php:5.3.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:php:php:5.3.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:php:php:5.3.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:php:php:5.3.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:scottmac:libmbfl:1.1.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052836.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052845.html
- http://marc.info/?l=bugtraq&m=130331363227777&w=2
- http://marc.info/?l=bugtraq&m=130331363227777&w=2
- http://pastie.org/1279428
- http://pastie.org/1279682
- http://secunia.com/advisories/42135
- http://secunia.com/advisories/42812
- http://secunia.com/advisories/43189
- http://www.mandriva.com/security/advisories?name=MDVSA-2010%3A225
- http://www.openwall.com/lists/oss-security/2010/11/07/2
- http://www.openwall.com/lists/oss-security/2010/11/08/13
- http://www.php.net/ChangeLog-5.php
- http://www.redhat.com/support/errata/RHSA-2011-0196.html
- http://www.securityfocus.com/bid/44727
- http://www.ubuntu.com/usn/USN-1042-1
- http://www.vupen.com/english/advisories/2011/0020
- http://www.vupen.com/english/advisories/2011/0021
- http://www.vupen.com/english/advisories/2011/0077
- http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052836.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052845.html
- http://marc.info/?l=bugtraq&m=130331363227777&w=2
- http://marc.info/?l=bugtraq&m=130331363227777&w=2
- http://pastie.org/1279428
- http://pastie.org/1279682
- http://secunia.com/advisories/42135
- http://secunia.com/advisories/42812
- http://secunia.com/advisories/43189
- http://www.mandriva.com/security/advisories?name=MDVSA-2010%3A225
- http://www.openwall.com/lists/oss-security/2010/11/07/2
- http://www.openwall.com/lists/oss-security/2010/11/08/13
- http://www.php.net/ChangeLog-5.php
- http://www.redhat.com/support/errata/RHSA-2011-0196.html
- http://www.securityfocus.com/bid/44727
- http://www.ubuntu.com/usn/USN-1042-1
- http://www.vupen.com/english/advisories/2011/0020
- http://www.vupen.com/english/advisories/2011/0021
- http://www.vupen.com/english/advisories/2011/0077