Vulnerability Description
Stack-based buffer overflow in the GD extension in PHP before 5.2.15 and 5.3.x before 5.3.4 allows context-dependent attackers to cause a denial of service (application crash) via a large number of anti-aliasing steps in an argument to the imagepstext function.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Php | Php | 5.2.0 |
Related Weaknesses (CWE)
References
- http://bugs.php.net/53492
- http://marc.info/?l=bugtraq&m=133469208622507&w=2
- http://seclists.org/fulldisclosure/2010/Dec/180
- http://www.php.net/ChangeLog-5.php
- http://www.securityfocus.com/bid/45338
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3
- http://bugs.php.net/53492
- http://marc.info/?l=bugtraq&m=133469208622507&w=2
- http://seclists.org/fulldisclosure/2010/Dec/180
- http://www.php.net/ChangeLog-5.php
- http://www.securityfocus.com/bid/45338
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3
FAQ
What is CVE-2010-4698?
CVE-2010-4698 is a vulnerability with a CVSS score of 5.0 (MEDIUM). Stack-based buffer overflow in the GD extension in PHP before 5.2.15 and 5.3.x before 5.3.4 allows context-dependent attackers to cause a denial of service (application crash) via a large number of an...
How severe is CVE-2010-4698?
CVE-2010-4698 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2010-4698?
Check the references section above for vendor advisories and patch information. Affected products include: Php Php.