First published: Fri May 07 2010(Updated: )
The sysvshm extension for PHP 5.2 through 5.2.13 and 5.3 through 5.3.2 allows context-dependent attackers to write to arbitrary memory addresses by using an object's __sleep function to interrupt an internal call to the shm_put_var function, which triggers access of a freed resource.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PHP | =5.2.9 | |
PHP | =5.2.2 | |
PHP | =5.2.5 | |
PHP | =5.2.12 | |
PHP | =5.2.11 | |
PHP | =5.2.6 | |
PHP | =5.2.3 | |
PHP | =5.2.13 | |
PHP | =5.2.0 | |
PHP | =5.2.4 | |
PHP | =5.2.10 | |
PHP | =5.2.1 | |
PHP | =5.2.8 | |
PHP | =5.3.1 | |
PHP | =5.3.0 | |
PHP | =5.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-1861 is considered a critical vulnerability due to its ability to allow context-dependent attackers to write to arbitrary memory addresses.
To fix CVE-2010-1861, it is recommended to upgrade to a patched version of PHP that is not affected by this vulnerability.
CVE-2010-1861 affects PHP versions 5.2.0 through 5.2.13 and 5.3.0 through 5.3.2.
CVE-2010-1861 can allow attackers to execute arbitrary code or crash the affected PHP application through memory corruption.
No, if you are using a PHP version later than 5.3.2, your system is not affected by CVE-2010-1861, as the vulnerability has been resolved.