CVE-2011-1468

Current Description

Multiple memory leaks in the OpenSSL extension in PHP before 5.3.6 might allow remote attackers to cause a denial of service (memory consumption) via (1) plaintext data to the openssl_encrypt function or (2) ciphertext data to the openssl_decrypt function.

Basic Data

PublishedMarch 20, 2011
Last ModifiedOctober 30, 2018
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-399
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:M/Au:N/C:N/I:N/A:P
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityMEDIUM
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactNONE
CVSS 2 - Availability ImpactPARTIAL
CVSS 2 - Base Score4.3
SeverityMEDIUM
Exploitability Score8.6
Impact Score2.9
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationPhpPhp1.0*******
    2.3ApplicationPhpPhp2.0*******
    2.3ApplicationPhpPhp2.0b10*******
    2.3ApplicationPhpPhp3.0*******
    2.3ApplicationPhpPhp3.0.1*******
    2.3ApplicationPhpPhp3.0.2*******
    2.3ApplicationPhpPhp3.0.3*******
    2.3ApplicationPhpPhp3.0.4*******
    2.3ApplicationPhpPhp3.0.5*******
    2.3ApplicationPhpPhp3.0.6*******
    2.3ApplicationPhpPhp3.0.7*******
    2.3ApplicationPhpPhp3.0.8*******
    2.3ApplicationPhpPhp3.0.9*******
    2.3ApplicationPhpPhp3.0.10*******
    2.3ApplicationPhpPhp3.0.11*******
    2.3ApplicationPhpPhp3.0.12*******
    2.3ApplicationPhpPhp3.0.13*******
    2.3ApplicationPhpPhp3.0.14*******
    2.3ApplicationPhpPhp3.0.15*******
    2.3ApplicationPhpPhp3.0.16*******
    2.3ApplicationPhpPhp3.0.17*******
    2.3ApplicationPhpPhp3.0.18*******
    2.3ApplicationPhpPhp4.0*******
    2.3ApplicationPhpPhp4.0beta1******
    2.3ApplicationPhpPhp4.0beta2******
    2.3ApplicationPhpPhp4.0beta3******
    2.3ApplicationPhpPhp4.0beta4******
    2.3ApplicationPhpPhp4.0beta_4_patch1******
    2.3ApplicationPhpPhp4.0.0*******
    2.3ApplicationPhpPhp4.0.1*******
    2.3ApplicationPhpPhp4.0.2*******
    2.3ApplicationPhpPhp4.0.3*******
    2.3ApplicationPhpPhp4.0.4*******
    2.3ApplicationPhpPhp4.0.5*******
    2.3ApplicationPhpPhp4.0.6*******
    2.3ApplicationPhpPhp4.0.7*******
    2.3ApplicationPhpPhp4.1.0*******
    2.3ApplicationPhpPhp4.1.1*******
    2.3ApplicationPhpPhp4.1.2*******
    2.3ApplicationPhpPhp4.2.0*******
    2.3ApplicationPhpPhp4.2.1*******
    2.3ApplicationPhpPhp4.2.2*******
    2.3ApplicationPhpPhp4.2.3*******
    2.3ApplicationPhpPhp4.3.0*******
    2.3ApplicationPhpPhp4.3.1*******
    2.3ApplicationPhpPhp4.3.2*******
    2.3ApplicationPhpPhp4.3.3*******
    2.3ApplicationPhpPhp4.3.4*******
    2.3ApplicationPhpPhp4.3.5*******
    2.3ApplicationPhpPhp4.3.6*******
    2.3ApplicationPhpPhp4.3.7*******
    2.3ApplicationPhpPhp4.3.8*******
    2.3ApplicationPhpPhp4.3.9*******
    2.3ApplicationPhpPhp4.3.10*******
    2.3ApplicationPhpPhp4.3.11*******
    2.3ApplicationPhpPhp4.4.0*******
    2.3ApplicationPhpPhp4.4.1*******
    2.3ApplicationPhpPhp4.4.2*******
    2.3ApplicationPhpPhp4.4.3*******
    2.3ApplicationPhpPhp4.4.4*******
    2.3ApplicationPhpPhp4.4.5*******
    2.3ApplicationPhpPhp4.4.6*******
    2.3ApplicationPhpPhp4.4.7*******
    2.3ApplicationPhpPhp4.4.8*******
    2.3ApplicationPhpPhp4.4.9*******
    2.3ApplicationPhpPhp5.0.0*******
    2.3ApplicationPhpPhp5.0.0beta1******
    2.3ApplicationPhpPhp5.0.0beta2******
    2.3ApplicationPhpPhp5.0.0beta3******
    2.3ApplicationPhpPhp5.0.0beta4******
    2.3ApplicationPhpPhp5.0.0rc1******
    2.3ApplicationPhpPhp5.0.0rc2******
    2.3ApplicationPhpPhp5.0.0rc3******
    2.3ApplicationPhpPhp5.0.1*******
    2.3ApplicationPhpPhp5.0.2*******
    2.3ApplicationPhpPhp5.0.3*******
    2.3ApplicationPhpPhp5.0.4*******
    2.3ApplicationPhpPhp5.0.5*******
    2.3ApplicationPhpPhp5.1.0*******
    2.3ApplicationPhpPhp5.1.1*******
    2.3ApplicationPhpPhp5.1.2*******
    2.3ApplicationPhpPhp5.1.3*******
    2.3ApplicationPhpPhp5.1.4*******
    2.3ApplicationPhpPhp5.1.5*******
    2.3ApplicationPhpPhp5.1.6*******
    2.3ApplicationPhpPhp5.2.0*******
    2.3ApplicationPhpPhp5.2.1*******
    2.3ApplicationPhpPhp5.2.2*******
    2.3ApplicationPhpPhp5.2.3*******
    2.3ApplicationPhpPhp5.2.4*******
    2.3ApplicationPhpPhp5.2.4*windows*****
    2.3ApplicationPhpPhp5.2.5*******
    2.3ApplicationPhpPhp5.2.6*******
    2.3ApplicationPhpPhp5.2.7*******
    2.3ApplicationPhpPhp5.2.8*******
    2.3ApplicationPhpPhp5.2.9*******
    2.3ApplicationPhpPhp5.2.10*******
    2.3ApplicationPhpPhp5.2.11*******
    2.3ApplicationPhpPhp5.2.12*******
    2.3ApplicationPhpPhp5.2.13*******
    2.3ApplicationPhpPhp5.2.14*******
    2.3ApplicationPhpPhp5.2.15*******
    2.3ApplicationPhpPhp5.2.16*******
    2.3ApplicationPhpPhp5.2.17*******
    2.3ApplicationPhpPhp5.3.0*******
    2.3ApplicationPhpPhp5.3.1*******
    2.3ApplicationPhpPhp5.3.2*******
    2.3ApplicationPhpPhp5.3.3*******
    2.3ApplicationPhpPhp5.3.4*******
    2.3ApplicationPhpPhp********5.3.5

Vulnerable Software List

VendorProductVersions
Php Php *, 1.0, 2.0, 2.0b10, 3.0, 3.0.1, 3.0.10, 3.0.11, 3.0.12, 3.0.13, 3.0.14, 3.0.15, 3.0.16, 3.0.17, 3.0.18, 3.0.2, 3.0.3, 3.0.4, 3.0.5, 3.0.6, 3.0.7, 3.0.8, 3.0.9, 4.0, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.5, 4.0.6, 4.0.7, 4.1.0, 4.1.1, 4.1.2, 4.2.0, 4.2.1, 4.2.2, 4.2.3, 4.3.0, 4.3.1, 4.3.10, 4.3.11, 4.3.2, 4.3.3, 4.3.4, 4.3.5, 4.3.6, 4.3.7, 4.3.8, 4.3.9, 4.4.0, 4.4.1, 4.4.2, 4.4.3, 4.4.4, 4.4.5, 4.4.6, 4.4.7, 4.4.8, 4.4.9, 5.0.0, 5.0.1, 5.0.2, 5.0.3, 5.0.4, 5.0.5, 5.1.0, 5.1.1, 5.1.2, 5.1.3, 5.1.4, 5.1.5, 5.1.6, 5.2.0, 5.2.1, 5.2.10, 5.2.11, 5.2.12, 5.2.13, 5.2.14, 5.2.15, 5.2.16, 5.2.17, 5.2.2, 5.2.3, 5.2.4, 5.2.5, 5.2.6, 5.2.7, 5.2.8, 5.2.9, 5.3.0, 5.3.1, 5.3.2, 5.3.3, 5.3.4

References

NameSourceURLTags
http://bugs.php.net/bug.php?id=54060http://bugs.php.net/bug.php?id=54060CONFIRMExploit
http://bugs.php.net/bug.php?id=54061http://bugs.php.net/bug.php?id=54061CONFIRMExploit
APPLE-SA-2011-10-12-3http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.htmlAPPLE
http://support.apple.com/kb/HT5002http://support.apple.com/kb/HT5002CONFIRM
MDVSA-2011:053http://www.mandriva.com/security/advisories?name=MDVSA-2011:053MANDRIVA
http://www.php.net/ChangeLog-5.phphttp://www.php.net/ChangeLog-5.phpCONFIRM
RHSA-2011:1423http://www.redhat.com/support/errata/RHSA-2011-1423.htmlREDHAT
46977http://www.securityfocus.com/bid/46977BID
ADV-2011-0744http://www.vupen.com/english/advisories/2011/0744VUPEN