Bug 619007 (CVE-2010-3062, MOPS-2010-056)

Summary: CVE-2010-3062 php: mysqlnd: php_mysqlnd_ok_read() information leak (MOPS-2010-056)
Product: [Other] Security Response Reporter: Tomas Hoger <thoger>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED NOTABUG QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: jorton
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2010-07-28 10:32:19 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Tomas Hoger 2010-07-28 10:29:52 UTC
Stefan Esser discovered an information leak flaw in php_mysqlnd_ok_read() function in PHP's mysqlnd (MySQL native driver) extension.  A malicious mysql server can cause PHP interpreter to disclose portions of its memory using a specially-crafted mysql network protocol packets.

Reference:
http://php-security.org/2010/05/31/mops-2010-056-php-php_mysqlnd_ok_read-information-leak-vulnerability/index.html

Upstream fix added in 5.3.3:
http://svn.php.net/viewvc?view=revision&revision=298703

Comment 1 Tomas Hoger 2010-07-28 10:32:19 UTC
mysqlnd extension was added in PHP 5.3.  Therefore, this issue does not affect PHP versions in Red Hat Enterprise Linux 3, 4, and 5.  mysqlnd extension is not enabled in Fedora and Red Hat Enterprise Linux 6 Beta php packages, older mysql client library is still used.

Statement:

Not vulnerable. This issue did not affect the versions of php as shipped with Red Hat Enterprise Linux 3, 4, or 5, and Red Hat Application Stack v2.

Comment 2 Tomas Hoger 2010-08-23 07:04:46 UTC
CVE-2010-3062 was assigned to cover both MOPS-2010-056 and MOPS-2010-057 (bug #619009):

mysqlnd_wireprotocol.c in the Mysqlnd extension in PHP 5.3 through 5.3.2 allows remote attackers to (1) read sensitive memory via a modified length value, which is not properly handled by the php_mysqlnd_ok_read function; or (2) trigger a heap-based buffer overflow via a modified length value, which is not properly handled by the php_mysqlnd_rset_header_read function.