Stefan Esser discovered an information leak flaw in php_mysqlnd_ok_read() function in PHP's mysqlnd (MySQL native driver) extension. A malicious mysql server can cause PHP interpreter to disclose portions of its memory using a specially-crafted mysql network protocol packets. Reference: http://php-security.org/2010/05/31/mops-2010-056-php-php_mysqlnd_ok_read-information-leak-vulnerability/index.html Upstream fix added in 5.3.3: http://svn.php.net/viewvc?view=revision&revision=298703
mysqlnd extension was added in PHP 5.3. Therefore, this issue does not affect PHP versions in Red Hat Enterprise Linux 3, 4, and 5. mysqlnd extension is not enabled in Fedora and Red Hat Enterprise Linux 6 Beta php packages, older mysql client library is still used. Statement: Not vulnerable. This issue did not affect the versions of php as shipped with Red Hat Enterprise Linux 3, 4, or 5, and Red Hat Application Stack v2.
CVE-2010-3062 was assigned to cover both MOPS-2010-056 and MOPS-2010-057 (bug #619009): mysqlnd_wireprotocol.c in the Mysqlnd extension in PHP 5.3 through 5.3.2 allows remote attackers to (1) read sensitive memory via a modified length value, which is not properly handled by the php_mysqlnd_ok_read function; or (2) trigger a heap-based buffer overflow via a modified length value, which is not properly handled by the php_mysqlnd_rset_header_read function.