First published: Tue Jan 18 2011(Updated: )
Stack-based buffer overflow in the GD extension in PHP before 5.2.15 and 5.3.x before 5.3.4 allows context-dependent attackers to cause a denial of service (application crash) via a large number of anti-aliasing steps in an argument to the imagepstext function.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PHP | =5.3.1 | |
PHP | =5.2.14 | |
PHP | =5.2.2 | |
PHP | =5.2.12 | |
PHP | =5.2.11 | |
PHP | =5.3.0 | |
PHP | =5.2.3 | |
PHP | =5.3.3 | |
PHP | =5.2.13 | |
PHP | =5.2.0 | |
PHP | =5.2.4 | |
PHP | =5.3.2 | |
PHP | =5.2.10 | |
PHP | =5.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-4698 has a severity rating that can lead to denial of service due to a stack-based buffer overflow.
To fix CVE-2010-4698, upgrade PHP to version 5.2.15 or later, or 5.3.4 or later.
CVE-2010-4698 affects PHP versions prior to 5.2.15 and 5.3.x prior to 5.3.4.
CVE-2010-4698 exploits the imagepstext function in the GD extension with a large number of anti-aliasing steps.
Exploitation of CVE-2010-4698 can cause an application crash, leading to potential denial of service.