ソフト名:PHP 5.2.0~5.3.2
回避策:未対応
脆弱性:リモートコード実行, 機密情報の奪取, 権限の昇格
ソース:http://php-security.org/2010/05/04/mops-2010-008-php-chunk_split-interruption-information-leak-vulnerability/index.html
http://php-security.org/2010/05/05/mops-2010-009-php-shm_put_var-already-freed-resource-access-vulnerability/index.html
http://php-security.org/2010/05/06/mops-2010-010-php-html_entity_decode-interruption-information-leak-vulnerability/index.html
http://php-security.org/2010/05/07/mops-2010-012-php-sqlite_single_query-uninitialized-memory-usage-vulnerability/index.html
http://www.php.net/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1860
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1861
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1862
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1868
CVE:CVE-2010-1860, CVE-2010-1861, CVE-2010-1862, CVE-2010-1868
危険性:High Risk
登録:
コメントの投稿 (Atom)
0 件のコメント:
コメントを投稿