[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248038

 
 

909

 
 

194772

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

Buffer overflow vulnerability in PHP via a crafted argument

ID: oval:org.secpod.oval:def:15485Date: (C)2013-09-20   (M)2022-10-10
Class: VULNERABILITYFamily: macos




The host is installed with Apple Mac OS X 10.6 through 10.6.8 or Mac OS X Lion 10.7 through 10.7.5, Mac OS X Mountain Lion 10.8 through 10.8.4 and is prone to buffer overflow vulnerability. The flaw is present in the in the php_quot_print_encode function in ext/standard/quot_print.c in PHP before 5.3.26 and 5.4.x before 5.4.16, which fails to handle a crafted argument to the quoted_printable_encode function. Successful exploitation allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.

Platform:
Apple Mac OS X 10.6
Apple Mac OS X Server 10.6
Apple Mac OS X 10.7
Apple Mac OS X Server 10.7
Apple Mac OS X 10.8
Apple Mac OS X Server 10.8
Reference:
CVE-2013-2110
CVE    1
CVE-2013-2110
CPE    2
cpe:/o:apple:mac_os_x
cpe:/o:apple:mac_os_x_server

© SecPod Technologies