CVE-2011-1092

Impact:
Moderate
Public Date:
2011-03-08
CWE:
CWE-190
Bugzilla:
683183: CVE-2011-1092 php: integer overflow in shmop_read()

The MITRE CVE dictionary describes this issue as:

Integer overflow in ext/shmop/shmop.c in PHP before 5.3.6 allows context-dependent attackers to cause a denial of service (crash) and possibly read sensitive memory via a large third argument to the shmop_read function.

Find out more about CVE-2011-1092 from the MITRE CVE dictionary dictionary and NIST NVD.

Statement

Red Hat does not consider this to be a security issue. Input passed to these functions should be under the full control of the script author, thus no trust boundary is crossed. Additionally, an administrator would have to disable, or excessively increase the memory_limit settings in the PHP configuration file to trigger this bug.

CVSS v2 metrics

NOTE: The following CVSS v2 metrics and score provided are preliminary and subject to review.

Base Score 5.1
Base Metrics AV:N/AC:H/Au:N/C:P/I:P/A:P
Access Vector Network
Access Complexity High
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact Partial

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Affected Packages State

Platform Package State
Red Hat Enterprise Linux 6 php Will not fix
Red Hat Enterprise Linux 5 php Will not fix
Red Hat Enterprise Linux 4 php Will not fix
Last Modified

CVE description copyright © 2017, The MITRE Corporation