Vulnerability Description
Buffer overflow in the strval function in PHP before 5.3.6, when the precision configuration option has a large value, might allow context-dependent attackers to cause a denial of service (application crash) via a small numerical value in the argument.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Php | Php | <= 5.3.5 |
Related Weaknesses (CWE)
References
- http://bugs.php.net/bug.php?id=54055Exploit
- http://marc.info/?l=bugtraq&m=133469208622507&w=2
- http://www.mandriva.com/security/advisories?name=MDVSA-2011:052
- http://www.mandriva.com/security/advisories?name=MDVSA-2011:053
- http://www.php.net/ChangeLog-5.php
- http://www.php.net/archive/2011.php
- http://www.php.net/releases/5_3_6.php
- http://www.vupen.com/english/advisories/2011/0744
- http://bugs.php.net/bug.php?id=54055Exploit
- http://marc.info/?l=bugtraq&m=133469208622507&w=2
- http://www.mandriva.com/security/advisories?name=MDVSA-2011:052
- http://www.mandriva.com/security/advisories?name=MDVSA-2011:053
- http://www.php.net/ChangeLog-5.php
- http://www.php.net/archive/2011.php
- http://www.php.net/releases/5_3_6.php
FAQ
What is CVE-2011-1464?
CVE-2011-1464 is a vulnerability with a CVSS score of 4.3 (MEDIUM). Buffer overflow in the strval function in PHP before 5.3.6, when the precision configuration option has a large value, might allow context-dependent attackers to cause a denial of service (application...
How severe is CVE-2011-1464?
CVE-2011-1464 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2011-1464?
Check the references section above for vendor advisories and patch information. Affected products include: Php Php.