First published: Tue Nov 29 2011(Updated: )
Integer overflow in the exif_process_IFD_TAG function in exif.c in the exif extension in PHP 5.4.0beta2 on 32-bit platforms allows remote attackers to read the contents of arbitrary memory locations or cause a denial of service via a crafted offset_val value in an EXIF header in a JPEG file, a different vulnerability than CVE-2011-0708.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PHP | =5.4.0-beta2 | |
PHP | >=5.3.0<5.3.9 | |
Debian Linux | =5.0 | |
Debian Linux | =7.0 | |
Debian Linux | =6.0 | |
Ubuntu | =10.10 | |
Ubuntu | =11.04 | |
Ubuntu | =11.10 | |
Ubuntu | =8.04 | |
Ubuntu | =10.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-4566 has a severity rating that indicates it can lead to the reading of arbitrary memory locations or denial of service.
To fix CVE-2011-4566, upgrade to a version of PHP that is not vulnerable, such as PHP 5.4 or higher.
CVE-2011-4566 affects PHP version 5.4.0beta2 and any 5.3 versions up to 5.3.9.
CVE-2011-4566 can enable remote attackers to exploit vulnerabilities in image processing to read sensitive data or crash the application.
CVE-2011-4566 primarily poses a risk on 32-bit platforms due to the nature of the integer overflow vulnerability.