First published: Fri Jun 18 2010(Updated: )
A vulnerability was found in the SplObjectStorage unserializer. If the PHP unserialize() function is used by a script on untrusted data provided by a remote attacker the attacker may be able to force an information leak or remote execution of code on the server. This was reported by Stefan Esser at the SyScan'10 Conference in Singapore.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
PHP | =5.2.9 | |
PHP | =5.2.7 | |
PHP | =5.2.2 | |
PHP | =5.2.5 | |
PHP | =5.2.12 | |
PHP | =5.2.11 | |
PHP | =5.2.6 | |
PHP | =5.2.3 | |
PHP | =5.2.13 | |
PHP | =5.2.0 | |
PHP | =5.2.4 | |
PHP | =5.2.10 | |
PHP | =5.2.1 | |
PHP | =5.2.8 | |
PHP | =5.3.1 | |
PHP | =5.3.0 | |
PHP | =5.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-2225 is considered a critical vulnerability that can lead to information disclosure and remote code execution.
To fix CVE-2010-2225, upgrade to a patched version of PHP that addresses this vulnerability.
CVE-2010-2225 affects multiple PHP versions, including 5.2.0 through 5.2.13 and 5.3.0 to 5.3.2.
CVE-2010-2225 can be exploited to perform remote code execution or information leakage through insecure unserialization.
CVE-2010-2225 was reported by Stefan Esser.