Executive Summary

Informations
NameCVE-2012-2376First vendor Publication2012-05-21
VendorCveLast vendor Modification2012-08-16

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score10Attack RangeNetwork
Cvss Impact Score10Attack ComplexityLow
Cvss Expoit Score10AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

Buffer overflow in the com_print_typeinfo function in PHP 5.4.3 and earlier on Windows allows remote attackers to execute arbitrary code via crafted arguments that trigger incorrect handling of COM object VARIANT types, as exploited in the wild in May 2012.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2376

CWE : Common Weakness Enumeration

idName
CWE-119Failure to Constrain Operations within the Bounds of a Memory Buffer

CPE : Common Platform Enumeration

TypeDescriptionCount
Application116

OpenVAS Exploits

DateDescription
2012-05-23Name : PHP 'com_print_typeinfo()' Remote Code Execution Vulnerability (Windows)
File : nvt/secpod_php_typeinfo_code_exec_vuln.nasl

Internal Sources (Detail)

SourceUrl
CONFIRMhttps://bugzilla.redhat.com/show_bug.cgi?id=823464
EXPLOIT-DBhttp://www.exploit-db.com/exploits/18861/
MISChttp://isc.sans.edu/diary.html?storyid=13255
MLISThttp://openwall.com/lists/oss-security/2012/05/20/2
SECTRACKhttp://www.securitytracker.com/id?1027089
XFhttp://xforce.iss.net/xforce/xfdb/75778
http://xforce.iss.net/xforce/xfdb/75778

Alert History

If you want to see full details history, please login or register.
0
DateInformations
2013-05-10 22:39:02
  • Multiple Updates