Lucene search

K
ubuntucveUbuntu.comUB:CVE-2011-1938
HistoryMay 31, 2011 - 12:00 a.m.

CVE-2011-1938

2011-05-3100:00:00
ubuntu.com
ubuntu.com
8

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.019 Low

EPSS

Percentile

88.2%

Stack-based buffer overflow in the socket_connect function in
ext/sockets/sockets.c in PHP 5.3.3 through 5.3.6 might allow
context-dependent attackers to execute arbitrary code via a long pathname
for a UNIX socket.

Bugs

Notes

Author Note
jdstrand PoC in http://www.exploit-db.com/exploits/17318/ stack-protector should reduce to DoS, downgrading to low
mdeslaur says 5.3.3, but reproducer works on lucid also another PoC: http://www.exploit-db.com/exploits/17486/
OSVersionArchitecturePackageVersionFilename
ubuntu10.04noarchphp5< 5.3.2-1ubuntu4.10UNKNOWN
ubuntu10.10noarchphp5< 5.3.3-1ubuntu9.6UNKNOWN
ubuntu11.04noarchphp5< 5.3.5-1ubuntu7.3UNKNOWN

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.019 Low

EPSS

Percentile

88.2%