CVE-2012-3450
Published: 6 August 2012
pdo_sql_parser.re in the PDO extension in PHP before 5.3.14 and 5.4.x before 5.4.4 does not properly determine the end of the query string during parsing of prepared statements, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted parameter value.
Notes
Author | Note |
---|---|
mdeslaur | pdo_sql_parser.re generates pdo_sql_parser.c, so both need to be patched. |
Priority
Status
Package | Release | Status |
---|---|---|
php5 Launchpad, Ubuntu, Debian |
upstream |
Needs triage
|
hardy |
Released
(5.2.4-2ubuntu5.26)
|
|
lucid |
Released
(5.3.2-1ubuntu4.18)
|
|
natty |
Released
(5.3.5-1ubuntu7.11)
|
|
oneiric |
Released
(5.3.6-13ubuntu3.9)
|
|
precise |
Released
(5.3.10-1ubuntu3.4)
|
|
Patches: upstream: http://git.php.net/?p=php-src.git;a=commit;h=1b78aef426a8f413ddd70854eb3fd5fbc95ef675 (trunk) upstream: http://git.php.net/?p=php-src.git;a=commit;h=e946eaca0bc747615fabd0fedb8a92ea800ed158 (trunk) upstream: http://git.php.net/?p=php-src.git;a=commit;h=c06ec6bde43a114af3bd84e986827839de1b1e4b (trunk) |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3450
- http://seclists.org/bugtraq/2012/Jun/60
- http://www.openwall.com/lists/oss-security/2012/08/02/3
- http://www.openwall.com/lists/oss-security/2012/08/02/7
- http://www.debian.org/security/2012/dsa-2527
- https://ubuntu.com/security/notices/USN-1569-1
- NVD
- Launchpad
- Debian