Vulnerability Description
Stack-based buffer overflow in the socket_connect function in ext/sockets/sockets.c in PHP 5.3.3 through 5.3.6 might allow context-dependent attackers to execute arbitrary code via a long pathname for a UNIX socket.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Php | Php | 5.3.3 |
Related Weaknesses (CWE)
References
- http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
- http://marc.info/?l=bugtraq&m=133469208622507&w=2
- http://openwall.com/lists/oss-security/2011/05/24/1Patch
- http://openwall.com/lists/oss-security/2011/05/24/9Patch
- http://osvdb.org/72644
- http://securityreason.com/securityalert/8262
- http://securityreason.com/securityalert/8294
- http://support.apple.com/kb/HT5130
- http://svn.php.net/viewvc/php/php-src/trunk/ext/sockets/sockets.c?r1=311369&r2=3Patch
- http://svn.php.net/viewvc?view=revision&revision=311369Patch
- http://www.debian.org/security/2012/dsa-2399
- http://www.exploit-db.com/exploits/17318/Exploit
- http://www.mandriva.com/security/advisories?name=MDVSA-2011:165
- http://www.php.net/ChangeLog-5.php#5.3.7
- http://www.php.net/archive/2011.php#id2011-08-18-1
FAQ
What is CVE-2011-1938?
CVE-2011-1938 is a vulnerability with a CVSS score of 7.5 (HIGH). Stack-based buffer overflow in the socket_connect function in ext/sockets/sockets.c in PHP 5.3.3 through 5.3.6 might allow context-dependent attackers to execute arbitrary code via a long pathname for...
How severe is CVE-2011-1938?
CVE-2011-1938 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2011-1938?
Check the references section above for vendor advisories and patch information. Affected products include: Php Php.