VRDA Feed by JPCERT/CC
  Vulnerability Response Decision Assistance Feed : Information for vulnerability impact analysis
[ about VRDA Feed | JPCERT/CC



 
Vulnerability Analysis Result (Revision No : 1) [ Download XML
CVE-2010-3870
php: The utf8_decode function in PHP before 5.3.4 does n...
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-3870

Original

The utf8_decode function in PHP before 5.3.4 does not properly handle non-shortest form UTF-8 encoding and ill-formed subsequences in UTF-8 data, which makes it easier for remote attackers to bypass cross-site scripting (XSS) and SQL injection protection mechanisms via a crafted string.

Translation   (Show)





About This Analysis Information
Analysis Information Provider:
NIST NVD
First Published:
2010-11-12
Source Information Category:
Advisory, Alert
Last Updated:
2010-11-15




Affected Product Tags
cpe:/a:php:php:1.0
cpe:/a:php:php:2.0
cpe:/a:php:php:2.0b10
cpe:/a:php:php:3.0
cpe:/a:php:php:3.0.1
cpe:/a:php:php:3.0.10
cpe:/a:php:php:3.0.11
cpe:/a:php:php:3.0.12
cpe:/a:php:php:3.0.13
cpe:/a:php:php:3.0.14
cpe:/a:php:php:3.0.15
cpe:/a:php:php:3.0.16
cpe:/a:php:php:3.0.17
cpe:/a:php:php:3.0.18
cpe:/a:php:php:3.0.2
cpe:/a:php:php:3.0.3
cpe:/a:php:php:3.0.4
cpe:/a:php:php:3.0.5
cpe:/a:php:php:3.0.6
cpe:/a:php:php:3.0.7
cpe:/a:php:php:3.0.8
cpe:/a:php:php:3.0.9
cpe:/a:php:php:4.0
cpe:/a:php:php:4.0.0
cpe:/a:php:php:4.0.1
cpe:/a:php:php:4.0.2
cpe:/a:php:php:4.0.3
cpe:/a:php:php:4.0.4
cpe:/a:php:php:4.0.5
cpe:/a:php:php:4.0.6
cpe:/a:php:php:4.0.7
cpe:/a:php:php:4.0:beta1
cpe:/a:php:php:4.0:beta2
cpe:/a:php:php:4.0:beta3
cpe:/a:php:php:4.0:beta4
cpe:/a:php:php:4.0:beta_4_patch1
cpe:/a:php:php:4.1.0
cpe:/a:php:php:4.1.1
cpe:/a:php:php:4.1.2
cpe:/a:php:php:4.1.3
cpe:/a:php:php:4.2
cpe:/a:php:php:4.2.0
cpe:/a:php:php:4.2.1
cpe:/a:php:php:4.2.2
cpe:/a:php:php:4.2.3
cpe:/a:php:php:4.2.4
cpe:/a:php:php:4.3
cpe:/a:php:php:4.3.0
cpe:/a:php:php:4.3.1
cpe:/a:php:php:4.3.10
cpe:/a:php:php:4.3.11
cpe:/a:php:php:4.3.2
cpe:/a:php:php:4.3.3
cpe:/a:php:php:4.3.4
cpe:/a:php:php:4.3.5
cpe:/a:php:php:4.3.6
cpe:/a:php:php:4.3.7
cpe:/a:php:php:4.3.8
cpe:/a:php:php:4.3.9
cpe:/a:php:php:4.4.0
cpe:/a:php:php:4.4.1
cpe:/a:php:php:4.4.2
cpe:/a:php:php:4.4.3
cpe:/a:php:php:4.4.4
cpe:/a:php:php:4.4.5
cpe:/a:php:php:4.4.6
cpe:/a:php:php:4.4.7
cpe:/a:php:php:4.4.8
cpe:/a:php:php:4.4.9
cpe:/a:php:php:5.3.0
cpe:/a:php:php:5.3.1
cpe:/a:php:php:5.3.2
cpe:/a:php:php:5.3.3 and previous versions
 


Vulnerability Analysis Results
[Access Vector]  [?]
Undefined [?]

Local [?]
Adjacent Network [?]
X Network [?]

[Access Complexit]  [?]
Undefined [?]

High [?]
X Medium [?]
Low [?]

[Authentication]  [?]
Undefined [?]

Multiple [?]
Single [?]
X None [?]

[Confidentiality Impact]  [?]
Undefined [?]

None [?]
X Partial [?]
Complete [?]

[Integrity Impact]  [?]
Undefined [?]

None [?]
X Partial [?]
Complete [?]

[Availability Impact]  [?]
Undefined [?]

None [?]
X Partial [?]
Complete [?]

Alternatives




References
CONFIRM http://svn.php.net/viewvc?view=revision&revision=304959




CONFIRM http://bugs.php.net/bug.php?id=49687




MANDRIVA MDVSA-2010:224




MISC http://www.blackhat.com/presentations/bh-usa-09/VELANAVA/BHUSA09-VelaNava-FavoriteXSS-SLIDES.pdf




MISC http://www.acunetix.com/blog/web-security-articles/security-risks-associated-with-utf8_decode/




MISC http://us2.php.net/manual/en/function.utf8-decode.php#83935




MISC http://sirdarckcat.blogspot.com/2009/10/couple-of-unicode-issues-on-php-and.html




MISC http://bugs.php.net/bug.php?id=48230




MLIST [oss-security] 20101103 Re: utf-8 security issue in php




MLIST [oss-security] 20101102 Re: utf-8 security issue in php




MLIST [oss-security] 20101102 Re: utf-8 security issue in php




MLIST [oss-security] 20101102 Re: utf-8 security issue in php




MLIST [oss-security] 20101102 Re: utf-8 security issue in php




MLIST [oss-security] 20101102 Re: utf-8 security issue in php




MLIST [oss-security] 20101102 utf-8 security issue in php




Vulnerability Type Input Validation (CWE-20)





Copyright © 2010 JPCERT/CC All Rights Reserved.