First published: Fri May 07 2010(Updated: )
The (1) sqlite_single_query and (2) sqlite_array_query functions in ext/sqlite/sqlite.c in PHP 5.2 through 5.2.13 and 5.3 through 5.3.2 allow context-dependent attackers to execute arbitrary code by calling these functions with an empty SQL query, which triggers access of uninitialized memory.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PHP | =5.2.9 | |
PHP | =5.2.2 | |
PHP | =5.2.5 | |
PHP | =5.2.12 | |
PHP | =5.2.11 | |
PHP | =5.2.6 | |
PHP | =5.2.3 | |
PHP | =5.2.13 | |
PHP | =5.2.0 | |
PHP | =5.2.4 | |
PHP | =5.2.10 | |
PHP | =5.2.1 | |
PHP | =5.2.8 | |
PHP | =5.3.1 | |
PHP | =5.3.0 | |
PHP | =5.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-1868 is considered a critical vulnerability due to its potential to allow attackers to execute arbitrary code.
To mitigate CVE-2010-1868, upgrade PHP to a version that is not affected, specifically 5.3.3 or later.
CVE-2010-1868 affects PHP versions from 5.2.0 through 5.2.13 and 5.3.0 to 5.3.2.
The vulnerability in CVE-2010-1868 stems from the sqlite_single_query and sqlite_array_query functions.
Yes, CVE-2010-1868 can be exploited by context-dependent attackers, making it a significant risk for web applications using affected PHP versions.