First published: Tue Jan 11 2011(Updated: )
strtod.c, as used in the zend_strtod function in PHP 5.2 before 5.2.17 and 5.3 before 5.3.5, and other products, allows context-dependent attackers to cause a denial of service (infinite loop) via a certain floating-point value in scientific notation, which is not properly handled in x87 FPU registers, as demonstrated using 2.2250738585072011e-308.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
PHP | =5.2.0 | |
PHP | =5.2.1 | |
PHP | =5.2.2 | |
PHP | =5.2.3 | |
PHP | =5.2.4 | |
PHP | =5.2.5 | |
PHP | =5.2.6 | |
PHP | =5.2.7 | |
PHP | =5.2.8 | |
PHP | =5.2.9 | |
PHP | =5.2.10 | |
PHP | =5.2.11 | |
PHP | =5.2.12 | |
PHP | =5.2.13 | |
PHP | =5.2.14 | |
PHP | =5.2.15 | |
PHP | =5.2.16 | |
PHP | =5.3.0 | |
PHP | =5.3.1 | |
PHP | =5.3.2 | |
PHP | =5.3.3 | |
PHP | =5.3.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-4645 has a severity rating that categorizes it as a denial of service vulnerability.
To fix CVE-2010-4645, you should upgrade to PHP version 5.2.17 or later for the 5.2 branch, and 5.3.5 or later for the 5.3 branch.
CVE-2010-4645 affects PHP versions 5.2.0 through 5.2.16 and 5.3.0 through 5.3.4.
The potential impact of CVE-2010-4645 is an infinite loop that can lead to a denial of service.
CVE-2010-4645 can be exploited by context-dependent attackers, indicating a risk of remote exploitation under specific conditions.