Bug 619007 - (CVE-2010-3062, MOPS-2010-056) CVE-2010-3062 php: mysqlnd: php_mysqlnd_ok_read() information leak (MOPS-2010-056)
CVE-2010-3062 php: mysqlnd: php_mysqlnd_ok_read() information leak (MOPS-2010...
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
: Security
Depends On:
  Show dependency treegraph
Reported: 2010-07-28 06:29 EDT by Tomas Hoger
Modified: 2015-07-31 02:29 EDT (History)
1 user (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2010-07-28 06:32:19 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

  None (edit)
Description Tomas Hoger 2010-07-28 06:29:52 EDT
Stefan Esser discovered an information leak flaw in php_mysqlnd_ok_read() function in PHP's mysqlnd (MySQL native driver) extension.  A malicious mysql server can cause PHP interpreter to disclose portions of its memory using a specially-crafted mysql network protocol packets.


Upstream fix added in 5.3.3:
Comment 1 Tomas Hoger 2010-07-28 06:32:19 EDT
mysqlnd extension was added in PHP 5.3.  Therefore, this issue does not affect PHP versions in Red Hat Enterprise Linux 3, 4, and 5.  mysqlnd extension is not enabled in Fedora and Red Hat Enterprise Linux 6 Beta php packages, older mysql client library is still used.


Not vulnerable. This issue did not affect the versions of php as shipped with Red Hat Enterprise Linux 3, 4, or 5, and Red Hat Application Stack v2.
Comment 2 Tomas Hoger 2010-08-23 03:04:46 EDT
CVE-2010-3062 was assigned to cover both MOPS-2010-056 and MOPS-2010-057 (bug #619009):

mysqlnd_wireprotocol.c in the Mysqlnd extension in PHP 5.3 through 5.3.2 allows remote attackers to (1) read sensitive memory via a modified length value, which is not properly handled by the php_mysqlnd_ok_read function; or (2) trigger a heap-based buffer overflow via a modified length value, which is not properly handled by the php_mysqlnd_rset_header_read function.

Note You need to log in before you can comment on or make changes to this bug.