First published: Fri Nov 12 2010(Updated: )
The utf8_decode function in PHP before 5.3.4 does not properly handle non-shortest form UTF-8 encoding and ill-formed subsequences in UTF-8 data, which makes it easier for remote attackers to bypass cross-site scripting (XSS) and SQL injection protection mechanisms via a crafted string.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
PHP | <5.2.14 | |
PHP | >=5.3.0<5.3.4 | |
Ubuntu Linux | =6.06 | |
Ubuntu Linux | =8.04 | |
Ubuntu Linux | =9.10 | |
Ubuntu Linux | =10.04 | |
Ubuntu Linux | =10.10 | |
Ubuntu | =10.10 | |
Ubuntu | =9.10 | |
Ubuntu | =8.04 | |
Ubuntu | =10.04 | |
Ubuntu | =6.06 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-3870 is classified as a medium severity vulnerability due to its potential to allow attackers to bypass security mechanisms.
To fix CVE-2010-3870, upgrade PHP to version 5.3.4 or later, which addresses the issues with the utf8_decode function.
CVE-2010-3870 affects PHP versions prior to 5.3.4, as well as various Ubuntu Linux versions like 6.06 to 10.10.
CVE-2010-3870 can be exploited through crafted strings that facilitate bypassing cross-site scripting (XSS) and SQL injection protections.
While CVE-2010-3870 is an older vulnerability, legacy systems running the affected PHP versions may still be at risk.