Skip to navigation

CVE Database

CVE-2011-1938

Impact: Low
Public: 2011-05-23
Bugzilla: 709067: CVE-2011-1938 php: stack-based buffer overflow in socket_connect()
IAVA: 2012-B-0056

Details

The MITRE CVE dictionary describes this issue as:

Stack-based buffer overflow in the socket_connect function in ext/sockets/sockets.c in PHP 5.3.3 through 5.3.6 might allow context-dependent attackers to execute arbitrary code via a long pathname for a UNIX socket.

Find out more about CVE-2011-1938 from the MITRE CVE dictionary and NIST NVD.

Statement

Not vulnerable. This issue did not affect the versions of php as shipped with Red Hat Enterprise Linux 4 and 5. It has been addressed in Red Hat Enterprise Linux 5 (php53) and 6 (php).

CVSS v2 metrics

Base Score: 2.6
Base Metrics: AV:N/AC:H/Au:N/C:N/I:N/A:P
Access Vector: Network
Access Complexity: High
Authentication: None
Confidentiality Impact: None
Integrity Impact: None
Availability Impact: Partial

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat security errata

Platform Errata Release Date
Red Hat Enterprise Linux version 5 (php53) RHSA-2011:1423 November 02, 2011
Red Hat Enterprise Linux version 6 (php) RHSA-2011:1423 November 02, 2011

External References

This page is generated automatically and has not been checked for errors or omissions.

For clarification or corrections please contact the Red Hat Security Response Team.