Bug 619007 (CVE-2010-3062, MOPS-2010-056) - CVE-2010-3062 php: mysqlnd: php_mysqlnd_ok_read() information leak (MOPS-2010-056)
Summary: CVE-2010-3062 php: mysqlnd: php_mysqlnd_ok_read() information leak (MOPS-2010...
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2010-3062, MOPS-2010-056
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2010-07-28 10:29 UTC by Tomas Hoger
Modified: 2021-02-24 22:42 UTC (History)
1 user (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2010-07-28 10:32:19 UTC
Embargoed:


Attachments (Terms of Use)

Description Tomas Hoger 2010-07-28 10:29:52 UTC
Stefan Esser discovered an information leak flaw in php_mysqlnd_ok_read() function in PHP's mysqlnd (MySQL native driver) extension.  A malicious mysql server can cause PHP interpreter to disclose portions of its memory using a specially-crafted mysql network protocol packets.

Reference:
http://php-security.org/2010/05/31/mops-2010-056-php-php_mysqlnd_ok_read-information-leak-vulnerability/index.html

Upstream fix added in 5.3.3:
http://svn.php.net/viewvc?view=revision&revision=298703

Comment 1 Tomas Hoger 2010-07-28 10:32:19 UTC
mysqlnd extension was added in PHP 5.3.  Therefore, this issue does not affect PHP versions in Red Hat Enterprise Linux 3, 4, and 5.  mysqlnd extension is not enabled in Fedora and Red Hat Enterprise Linux 6 Beta php packages, older mysql client library is still used.

Statement:

Not vulnerable. This issue did not affect the versions of php as shipped with Red Hat Enterprise Linux 3, 4, or 5, and Red Hat Application Stack v2.

Comment 2 Tomas Hoger 2010-08-23 07:04:46 UTC
CVE-2010-3062 was assigned to cover both MOPS-2010-056 and MOPS-2010-057 (bug #619009):

mysqlnd_wireprotocol.c in the Mysqlnd extension in PHP 5.3 through 5.3.2 allows remote attackers to (1) read sensitive memory via a modified length value, which is not properly handled by the php_mysqlnd_ok_read function; or (2) trigger a heap-based buffer overflow via a modified length value, which is not properly handled by the php_mysqlnd_rset_header_read function.


Note You need to log in before you can comment on or make changes to this bug.