Vulnerability Description
Stack-based buffer overflow in the FastCGI SAPI (fastcgi.c) in PHP before 5.2.6 has unknown impact and attack vectors.
CVSS Score
10.0
HIGH
AV:N/AC:L/Au:N/C:C/I:C/A:C
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Php | Php | <= 5.2.5 |
Related Weaknesses (CWE)
References
- http://cvs.php.net/viewvc.cgi/php-src/sapi/cgi/fastcgi.c?r1=1.44&r2=1.45&diff_foExploit
- http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html
- http://secunia.com/advisories/30048Vendor Advisory
- http://secunia.com/advisories/30083Vendor Advisory
- http://secunia.com/advisories/30158Vendor Advisory
- http://secunia.com/advisories/30345Vendor Advisory
- http://secunia.com/advisories/30967Vendor Advisory
- http://secunia.com/advisories/31200Vendor Advisory
- http://secunia.com/advisories/31326Vendor Advisory
- http://secunia.com/advisories/32746
- http://security.gentoo.org/glsa/glsa-200811-05.xml
- http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0176
- http://www.debian.org/security/2008/dsa-1572Patch
- http://www.mandriva.com/security/advisories?name=MDVSA-2009:022
FAQ
What is CVE-2008-2050?
CVE-2008-2050 is a vulnerability with a CVSS score of 10.0 (HIGH). Stack-based buffer overflow in the FastCGI SAPI (fastcgi.c) in PHP before 5.2.6 has unknown impact and attack vectors.
How severe is CVE-2008-2050?
CVE-2008-2050 has been rated HIGH with a CVSS base score of 10.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2008-2050?
Check the references section above for vendor advisories and patch information. Affected products include: Php Php.