CVE-2012-3450
Published Aug 6, 2012
Last updated 12 years ago
Overview
- Description
- pdo_sql_parser.re in the PDO extension in PHP before 5.3.14 and 5.4.x before 5.4.4 does not properly determine the end of the query string during parsing of prepared statements, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted parameter value.
- Source
- secalert@redhat.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 2.6
- Impact score
- 2.9
- Exploitability score
- 4.9
- Vector string
- AV:N/AC:H/Au:N/C:N/I:N/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AFD98294-887F-4D33-8AF1-783B0DE43234", "versionEndIncluding": "5.3.13" }, { "criteria": "cpe:2.3:a:php:php:5.3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9EF4B938-BB14-4C06-BEE9-10CA755C5DEF" }, { "criteria": "cpe:2.3:a:php:php:5.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "981C922C-7A7D-473E-8C43-03AB62FB5B8B" }, { "criteria": "cpe:2.3:a:php:php:5.3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5D0CD11A-09C2-4C60-8F0C-68E55BD6EE63" }, { "criteria": "cpe:2.3:a:php:php:5.3.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B0F40E4A-E125-4099-A8B3-D42614AA9312" }, { "criteria": "cpe:2.3:a:php:php:5.3.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4933D9DD-A630-4A3D-9D13-9E182F5F6F8C" }, { "criteria": "cpe:2.3:a:php:php:5.3.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A9E6D530-91FC-42F4-A427-6601238E0187" }, { "criteria": "cpe:2.3:a:php:php:5.3.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9EC938DB-E066-407F-BDF8-61A1C41136F7" }, { "criteria": "cpe:2.3:a:php:php:5.3.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ACDF768D-7F5A-4042-B7DD-398F65F3F094" }, { "criteria": "cpe:2.3:a:php:php:5.3.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2AF35BB6-C6B1-4683-A8BE-AA72CC34F5B5" }, { "criteria": "cpe:2.3:a:php:php:5.3.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EC3F1891-032D-409C-904C-A415D2323DFC" }, { "criteria": "cpe:2.3:a:php:php:5.3.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4B13826D-06B2-4A46-AB24-092F6935958D" }, { "criteria": "cpe:2.3:a:php:php:5.3.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1B6528FC-51BE-4E30-B282-D9841553BA26" }, { "criteria": "cpe:2.3:a:php:php:5.3.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "66CF9452-6225-4726-822B-C7CD620A1D6E" }, { "criteria": "cpe:2.3:a:php:php:5.4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E7B9B8D2-78B7-4B17-955B-741C7A6F6634" }, { "criteria": "cpe:2.3:a:php:php:5.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5CA2A940-BD69-4D35-AF12-432CB929248B" }, { "criteria": "cpe:2.3:a:php:php:5.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "29BD13F9-86C8-44C4-A860-9A87870A518E" }, { "criteria": "cpe:2.3:a:php:php:5.4.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1B361FDE-9F6A-4E9A-96F1-619DC56EECB6" } ], "operator": "OR" } ] } ]