CVE-2010-1914
Publication date 12 May 2010
Last updated 24 July 2024
Ubuntu priority
The Zend Engine in PHP 5.2 through 5.2.13 and 5.3 through 5.3.2 allows context-dependent attackers to obtain sensitive information by interrupting the handler for the (1) ZEND_BW_XOR opcode (shift_left_function), (2) ZEND_SL opcode (bitwise_xor_function), or (3) ZEND_SR opcode (shift_right_function), related to the convert_to_long_base function.
Status
Package | Ubuntu Release | Status |
---|---|---|
php5 | ||
Notes
mdeslaur
interruption issue, safe_mode - open_basedir bypass, ignoring This is MOPS-2010-014, MOPS-2010-015, MOPS-2010-016
Patch details
Package | Patch details |
---|---|
php5 |
References
Related Ubuntu Security Notices (USN)
- USN-1231-1
- PHP Vulnerabilities
- 18 October 2011
Other references
- http://www.php-security.org/2010/05/08/mops-2010-014-php-zend_bw_xor-opcode-interruption-address-information-leak-vulnerability/index.html
- http://www.php-security.org/2010/05/08/mops-2010-015-php-zend_sl-opcode-interruption-address-information-leak-vulnerability/index.html
- http://www.php-security.org/2010/05/08/mops-2010-016-php-zend_sr-opcode-interruption-address-information-leak-vulnerability/index.html
- http://www.php.net/releases/5_3_3.php
- https://www.cve.org/CVERecord?id=CVE-2010-1914