Vulnerabilidad en extjsonJSON_parser.c en PHP (CVE-2009-1271)
Gravedad CVSS v2.0:
MEDIA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
08/04/2009
Última modificación:
09/04/2025
Descripción
La función JSON_parser (ext/json/JSON_parser.c) en PHP v5.2.x anteriores a v5.2.9 permite a atacantes remotos provocar una denegación de servicio (falta de segmentación) a través de una cadena formada de forma incorrecta a la función API json_decode.<br />
Impacto
Puntuación base 2.0
5.00
Gravedad 2.0
MEDIA
Productos y versiones vulnerables
CPE | Desde | Hasta |
---|---|---|
cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:php:php:5.2.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:php:php:5.2.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:php:php:5.2.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:php:php:5.2.4:*:windows:*:*:*:*:* | ||
cpe:2.3:a:php:php:5.2.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:php:php:5.2.6:*:*:*:*:*:*:* | ||
cpe:2.3:a:php:php:5.2.7:*:*:*:*:*:*:* | ||
cpe:2.3:a:php:php:5.2.8:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://cvs.php.net/viewvc.cgi/php-src/ext/json/JSON_parser.c?r1=1.1.2.14&r2=1.1.2.15
- http://lists.apple.com/archives/security-announce/2009/Sep/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html
- http://secunia.com/advisories/34770
- http://secunia.com/advisories/34830
- http://secunia.com/advisories/34933
- http://secunia.com/advisories/35003
- http://secunia.com/advisories/35007
- http://secunia.com/advisories/35306
- http://secunia.com/advisories/35685
- http://secunia.com/advisories/36701
- http://support.apple.com/kb/HT3865
- http://www.debian.org/security/2009/dsa-1775
- http://www.debian.org/security/2009/dsa-1789
- http://www.mandriva.com/security/advisories?name=MDVSA-2009%3A090
- http://www.openwall.com/lists/oss-security/2009/04/01/9
- http://www.php.net/releases/5_2_9.php
- http://www.redhat.com/support/errata/RHSA-2009-0350.html
- http://www.ubuntu.com/usn/USN-761-2
- https://usn.ubuntu.com/761-1/
- https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01451.html
- https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01465.html
- http://cvs.php.net/viewvc.cgi/php-src/ext/json/JSON_parser.c?r1=1.1.2.14&r2=1.1.2.15
- http://lists.apple.com/archives/security-announce/2009/Sep/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html
- http://secunia.com/advisories/34770
- http://secunia.com/advisories/34830
- http://secunia.com/advisories/34933
- http://secunia.com/advisories/35003
- http://secunia.com/advisories/35007
- http://secunia.com/advisories/35306
- http://secunia.com/advisories/35685
- http://secunia.com/advisories/36701
- http://support.apple.com/kb/HT3865
- http://www.debian.org/security/2009/dsa-1775
- http://www.debian.org/security/2009/dsa-1789
- http://www.mandriva.com/security/advisories?name=MDVSA-2009%3A090
- http://www.openwall.com/lists/oss-security/2009/04/01/9
- http://www.php.net/releases/5_2_9.php
- http://www.redhat.com/support/errata/RHSA-2009-0350.html
- http://www.ubuntu.com/usn/USN-761-2
- https://usn.ubuntu.com/761-1/
- https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01451.html
- https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01465.html