Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 618825 - (CVE-2010-2101, MOPS-2010-041, MOPS-2010-042, MOPS-2010-043, MOPS-2010-044, MOPS-2010-045, MOPS-2010-046) CVE-2010-2101 php: multiple interruption vulnerabilities (MOPS-2010-04[123456])
CVE-2010-2101 php: multiple interruption vulnerabilities (MOPS-2010-04[123456])
Status: CLOSED DUPLICATE of bug 618785
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
unspecified Severity unspecified
: ---
: ---
Assigned To: Red Hat Product Security
impact=none,source=internet,reported=...
: Security
Depends On:
Blocks:
  Show dependency treegraph
 
Reported: 2010-07-27 16:07 EDT by Tomas Hoger
Modified: 2015-08-19 04:51 EDT (History)
1 user (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2010-07-27 16:12:29 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)
MOPS-2010-041 reproducer (1.30 KB, text/plain)
2010-07-27 16:08 EDT, Tomas Hoger
no flags Details
MOPS-2010-042 reproducer (1.46 KB, text/plain)
2010-07-27 16:08 EDT, Tomas Hoger
no flags Details
MOPS-2010-043 reproducer (1.26 KB, text/plain)
2010-07-27 16:09 EDT, Tomas Hoger
no flags Details
MOPS-2010-044 reproducer (1.27 KB, text/plain)
2010-07-27 16:09 EDT, Tomas Hoger
no flags Details
MOPS-2010-045 reproducer (1.32 KB, text/plain)
2010-07-27 16:09 EDT, Tomas Hoger
no flags Details
MOPS-2010-046 reproducer (1.25 KB, text/plain)
2010-07-27 16:10 EDT, Tomas Hoger
no flags Details

  None (edit)
Description Tomas Hoger 2010-07-27 16:07:38 EDT
Common Vulnerabilities and Exposures assigned an identifier CVE-2010-2101 to
the following vulnerability:

The (1) strip_tags, (2) setcookie, (3) strtok, (4) wordwrap, (5) str_word_count, and (6) str_pad functions in PHP 5.2 through 5.2.13 and 5.3 through 5.3.2 allow context-dependent attackers to obtain sensitive information (memory contents) by causing a userspace interruption of an internal function, related to the call time pass by reference feature.

References:
http://php-security.org/2010/05/26/mops-2010-041-php-strip_tags-interruption-information-leak-vulnerability/index.html
http://php-security.org/2010/05/26/mops-2010-042-php-setcookie-interruption-information-leak-vulnerability/index.html
http://php-security.org/2010/05/26/mops-2010-043-php-strtok-interruption-information-leak-vulnerability/index.html
http://php-security.org/2010/05/26/mops-2010-044-php-wordwrap-interruption-information-leak-vulnerability/index.html
http://php-security.org/2010/05/26/mops-2010-045-php-str_word_count-interruption-information-leak-vulnerability/index.html
http://php-security.org/2010/05/26/mops-2010-046-php-str_pad-interruption-information-leak-vulnerability/index.html
Comment 1 Tomas Hoger 2010-07-27 16:08:28 EDT
Created attachment 434819 [details]
MOPS-2010-041 reproducer
Comment 2 Tomas Hoger 2010-07-27 16:08:47 EDT
Created attachment 434820 [details]
MOPS-2010-042 reproducer
Comment 3 Tomas Hoger 2010-07-27 16:09:07 EDT
Created attachment 434821 [details]
MOPS-2010-043 reproducer
Comment 4 Tomas Hoger 2010-07-27 16:09:30 EDT
Created attachment 434822 [details]
MOPS-2010-044 reproducer
Comment 5 Tomas Hoger 2010-07-27 16:09:52 EDT
Created attachment 434823 [details]
MOPS-2010-045 reproducer
Comment 6 Tomas Hoger 2010-07-27 16:10:13 EDT
Created attachment 434824 [details]
MOPS-2010-046 reproducer
Comment 7 Tomas Hoger 2010-07-27 16:12:29 EDT
These are similar to CVE-2010-2100 issues, with the same patches addressing these issues too.  For details, see bug #618785, comment #6.

*** This bug has been marked as a duplicate of bug 618785 ***
Comment 8 Tomas Hoger 2010-07-27 16:13:05 EDT
Statement:

Red Hat does not consider interruption issues allowing safe_mode / open_basedir
restriction bypass to be security sensitive.  For more details see
https://bugzilla.redhat.com/show_bug.cgi?id=169857#c1 and
http://www.php.net/security-note.php

Note You need to log in before you can comment on or make changes to this bug.