php is vulnerable to denial of service (DoS). The vulnerability exists as a NULL pointer dereference flaw was discovered in the PHP XML-RPC extension. A malicious XML-RPC client or server could use this flaw to crash the PHP interpreter via a specially-crafted XML-RPC request.
Vendor | Product | Version | CPE |
---|---|---|---|
php | php | 5.1.6_11.el5 | cpe:2.3:a:php:php:5.1.6_11.el5:*:*:*:*:*:*:* |
php | php | 5.1.6_7.el5 | cpe:2.3:a:php:php:5.1.6_7.el5:*:*:*:*:*:*:* |
php | php | 5.1.6_20.el5_2.1 | cpe:2.3:a:php:php:5.1.6_20.el5_2.1:*:*:*:*:*:*:* |
php | php | 5.1.6_12.el5 | cpe:2.3:a:php:php:5.1.6_12.el5:*:*:*:*:*:*:* |
php | php | 5.1.6_20.el5 | cpe:2.3:a:php:php:5.1.6_20.el5:*:*:*:*:*:*:* |
php | php | 5.1.6_23.2.el5_3 | cpe:2.3:a:php:php:5.1.6_23.2.el5_3:*:*:*:*:*:*:* |
php | php | 5.1.6_24.el5_4.5 | cpe:2.3:a:php:php:5.1.6_24.el5_4.5:*:*:*:*:*:*:* |
php | php | 5.1.6_15.el5 | cpe:2.3:a:php:php:5.1.6_15.el5:*:*:*:*:*:*:* |
php | php | 5.1.6_23.el5 | cpe:2.3:a:php:php:5.1.6_23.el5:*:*:*:*:*:*:* |
php | php | 5.1.6_5.el5 | cpe:2.3:a:php:php:5.1.6_5.el5:*:*:*:*:*:*:* |
bugs.debian.org/cgi-bin/bugreport.cgi?bug=573573
lists.apple.com/archives/security-announce/2010//Aug/msg00003.html
lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html
lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html
lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html
secunia.com/advisories/42410
support.apple.com/kb/HT4312
support.apple.com/kb/HT4435
www.mandriva.com/security/advisories?name=MDVSA-2010:068
www.openwall.com/lists/oss-security/2010/03/12/5
www.redhat.com/security/updates/classification/#moderate
www.redhat.com/support/errata/RHSA-2010-0919.html
www.securityfocus.com/bid/38708
www.vupen.com/english/advisories/2010/0724
www.vupen.com/english/advisories/2010/3081
access.redhat.com/errata/RHSA-2010:0919