CVE-2010-3709

The ZipArchive::getArchiveComment function in PHP 5.2.x through 5.2.14 and 5.3.x through 5.3.3 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted ZIP archive.
References
Link Resource
http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html Mailing List Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052836.html Mailing List Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052845.html Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=130331363227777&w=2 Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=133469208622507&w=2 Mailing List Third Party Advisory
http://secunia.com/advisories/42729 Broken Link
http://secunia.com/advisories/42812 Broken Link
http://securityreason.com/achievement_securityalert/90 Third Party Advisory
http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.490619 Third Party Advisory
http://support.apple.com/kb/HT4581 Third Party Advisory
http://svn.php.net/viewvc/php/php-src/branches/PHP_5_2/ext/zip/php_zip.c?view=log Patch Vendor Advisory
http://svn.php.net/viewvc/php/php-src/branches/PHP_5_3/ext/zip/php_zip.c?view=log Patch Vendor Advisory
http://www.exploit-db.com/exploits/15431 Exploit Third Party Advisory VDB Entry
http://www.mandriva.com/security/advisories?name=MDVSA-2010:218 Broken Link
http://www.php.net/ChangeLog-5.php Vendor Advisory
http://www.php.net/archive/2010.php#id2010-12-10-1 Vendor Advisory
http://www.php.net/releases/5_2_15.php Vendor Advisory
http://www.php.net/releases/5_3_4.php Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2011-0195.html Third Party Advisory
http://www.securityfocus.com/bid/44718 Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1024690 Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-1042-1 Third Party Advisory
http://www.vupen.com/english/advisories/2010/3313 Permissions Required
http://www.vupen.com/english/advisories/2011/0020 Permissions Required
http://www.vupen.com/english/advisories/2011/0021 Permissions Required
http://www.vupen.com/english/advisories/2011/0077 Permissions Required
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
cpe:2.3:a:php:php:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*

History

13 Feb 2023, 04:25

Type Values Removed Values Added
References
  • {'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=651206', 'name': 'https://bugzilla.redhat.com/show_bug.cgi?id=651206', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://access.redhat.com/errata/RHSA-2011:0195', 'name': 'https://access.redhat.com/errata/RHSA-2011:0195', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://access.redhat.com/security/cve/CVE-2010-3709', 'name': 'https://access.redhat.com/security/cve/CVE-2010-3709', 'tags': [], 'refsource': 'MISC'}
Summary CVE-2010-3709 php: NULL pointer dereference in ZipArchive::getArchiveComment The ZipArchive::getArchiveComment function in PHP 5.2.x through 5.2.14 and 5.3.x through 5.3.3 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted ZIP archive.

02 Feb 2023, 14:15

Type Values Removed Values Added
Summary The ZipArchive::getArchiveComment function in PHP 5.2.x through 5.2.14 and 5.3.x through 5.3.3 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted ZIP archive. CVE-2010-3709 php: NULL pointer dereference in ZipArchive::getArchiveComment
References
  • (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=651206 -
  • (MISC) https://access.redhat.com/errata/RHSA-2011:0195 -
  • (MISC) https://access.redhat.com/security/cve/CVE-2010-3709 -

19 Jan 2023, 16:29

Type Values Removed Values Added
First Time Canonical
Canonical ubuntu Linux
CPE cpe:2.3:a:php:php:5.2.5:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.2.9:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.2.4:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.2.2:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.2.10:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.3.0:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.3.1:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.2.11:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.2.13:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.2.14:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.3.2:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.2.12:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.3.3:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.2.8:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.2.3:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.2.6:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
References (VUPEN) http://www.vupen.com/english/advisories/2010/3313 - (VUPEN) http://www.vupen.com/english/advisories/2010/3313 - Permissions Required
References (CONFIRM) http://support.apple.com/kb/HT4581 - (CONFIRM) http://support.apple.com/kb/HT4581 - Third Party Advisory
References (REDHAT) http://www.redhat.com/support/errata/RHSA-2011-0195.html - (REDHAT) http://www.redhat.com/support/errata/RHSA-2011-0195.html - Third Party Advisory
References (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDVSA-2010:218 - (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDVSA-2010:218 - Broken Link
References (SREASONRES) http://securityreason.com/achievement_securityalert/90 - (SREASONRES) http://securityreason.com/achievement_securityalert/90 - Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/42812 - (SECUNIA) http://secunia.com/advisories/42812 - Broken Link
References (SECTRACK) http://www.securitytracker.com/id?1024690 - (SECTRACK) http://www.securitytracker.com/id?1024690 - Third Party Advisory, VDB Entry
References (HP) http://marc.info/?l=bugtraq&m=130331363227777&w=2 - (HP) http://marc.info/?l=bugtraq&m=130331363227777&w=2 - Mailing List, Third Party Advisory
References (HP) http://marc.info/?l=bugtraq&m=133469208622507&w=2 - (HP) http://marc.info/?l=bugtraq&m=133469208622507&w=2 - Mailing List, Third Party Advisory
References (SLACKWARE) http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.490619 - (SLACKWARE) http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.490619 - Third Party Advisory
References (FEDORA) http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052836.html - (FEDORA) http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052836.html - Mailing List, Third Party Advisory
References (VUPEN) http://www.vupen.com/english/advisories/2011/0021 - (VUPEN) http://www.vupen.com/english/advisories/2011/0021 - Permissions Required
References (CONFIRM) http://www.php.net/archive/2010.php#id2010-12-10-1 - (CONFIRM) http://www.php.net/archive/2010.php#id2010-12-10-1 - Vendor Advisory
References (CONFIRM) http://www.php.net/ChangeLog-5.php - (CONFIRM) http://www.php.net/ChangeLog-5.php - Vendor Advisory
References (EXPLOIT-DB) http://www.exploit-db.com/exploits/15431 - Exploit (EXPLOIT-DB) http://www.exploit-db.com/exploits/15431 - Exploit, Third Party Advisory, VDB Entry
References (CONFIRM) http://www.php.net/releases/5_3_4.php - (CONFIRM) http://www.php.net/releases/5_3_4.php - Vendor Advisory
References (FEDORA) http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052845.html - (FEDORA) http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052845.html - Mailing List, Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/42729 - (SECUNIA) http://secunia.com/advisories/42729 - Broken Link
References (BID) http://www.securityfocus.com/bid/44718 - (BID) http://www.securityfocus.com/bid/44718 - Third Party Advisory, VDB Entry
References (APPLE) http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html - (APPLE) http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html - Mailing List, Third Party Advisory
References (UBUNTU) http://www.ubuntu.com/usn/USN-1042-1 - (UBUNTU) http://www.ubuntu.com/usn/USN-1042-1 - Third Party Advisory
References (VUPEN) http://www.vupen.com/english/advisories/2011/0020 - (VUPEN) http://www.vupen.com/english/advisories/2011/0020 - Permissions Required
References (CONFIRM) http://svn.php.net/viewvc/php/php-src/branches/PHP_5_2/ext/zip/php_zip.c?view=log - Patch (CONFIRM) http://svn.php.net/viewvc/php/php-src/branches/PHP_5_2/ext/zip/php_zip.c?view=log - Patch, Vendor Advisory
References (VUPEN) http://www.vupen.com/english/advisories/2011/0077 - (VUPEN) http://www.vupen.com/english/advisories/2011/0077 - Permissions Required
References (CONFIRM) http://svn.php.net/viewvc/php/php-src/branches/PHP_5_3/ext/zip/php_zip.c?view=log - Patch (CONFIRM) http://svn.php.net/viewvc/php/php-src/branches/PHP_5_3/ext/zip/php_zip.c?view=log - Patch, Vendor Advisory
References (CONFIRM) http://www.php.net/releases/5_2_15.php - (CONFIRM) http://www.php.net/releases/5_2_15.php - Vendor Advisory

Information

Published : 2010-11-09 01:00

Updated : 2023-12-10 11:03


NVD link : CVE-2010-3709

Mitre link : CVE-2010-3709

CVE.ORG link : CVE-2010-3709


JSON object : View

Products Affected

canonical

  • ubuntu_linux

php

  • php
CWE
CWE-20

Improper Input Validation