First published: Mon Oct 25 2010(Updated: )
Stack consumption vulnerability in the filter_var function in PHP 5.2.x through 5.2.14 and 5.3.x through 5.3.3, when FILTER_VALIDATE_EMAIL mode is used, allows remote attackers to cause a denial of service (memory consumption and application crash) via a long e-mail address string.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
PHP | =5.2.9 | |
PHP | =5.3.1 | |
PHP | =5.2.14 | |
PHP | =5.2.7 | |
PHP | =5.2.2 | |
PHP | =5.2.5 | |
PHP | =5.2.12 | |
PHP | =5.2.11 | |
PHP | =5.2.6 | |
PHP | =5.3.0 | |
PHP | =5.2.3 | |
PHP | =5.3.3 | |
PHP | =5.2.13 | |
PHP | =5.2.0 | |
PHP | =5.2.4 | |
PHP | =5.3.2 | |
PHP | =5.2.10 | |
PHP | =5.2.1 | |
PHP | =5.2.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-3710 has a severity that can lead to denial of service due to excessive stack consumption.
To fix CVE-2010-3710, upgrade to a supported version of PHP that is not vulnerable, specifically versions later than 5.3.3.
CVE-2010-3710 affects PHP versions 5.2.x up to 5.2.14 and 5.3.x up to 5.3.3.
Yes, CVE-2010-3710 can be exploited remotely via specially crafted long email address strings.
The impact of CVE-2010-3710 includes memory exhaustion and potential application crashes.