Vulnerability Details : CVE-2011-4566
Integer overflow in the exif_process_IFD_TAG function in exif.c in the exif extension in PHP 5.4.0beta2 on 32-bit platforms allows remote attackers to read the contents of arbitrary memory locations or cause a denial of service via a crafted offset_val value in an EXIF header in a JPEG file, a different vulnerability than CVE-2011-0708.
Vulnerability category: OverflowDenial of service
Products affected by CVE-2011-4566
- cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.4.0:beta2:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
Threat overview for CVE-2011-4566
Top countries where our scanners detected CVE-2011-4566
Top open port discovered on systems with this issue
80
IPs affected by CVE-2011-4566 35,704
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2011-4566!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2011-4566
48.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 98 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2011-4566
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.4
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:P |
10.0
|
4.9
|
NIST |
CWE ids for CVE-2011-4566
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2011-4566
-
http://www.mandriva.com/security/advisories?name=MDVSA-2011:197
mandriva.comThird Party Advisory
-
http://www.redhat.com/support/errata/RHSA-2012-0019.html
SupportThird Party Advisory
-
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
Apple - Lists.apple.comMailing List;Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00016.html
[security-announce] openSUSE-SU-2012:0426-1: important: update for php5Mailing List;Third Party Advisory
-
http://support.apple.com/kb/HT5281
About the security content of OS X Lion v10.7.4 and Security Update 2012-002 - Apple SupportThird Party Advisory
-
http://rhn.redhat.com/errata/RHSA-2012-0071.html
RHSA-2012:0071 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://www.securityfocus.com/bid/50907
PHP 'exif_process_IFD_TAG()' Remote Integer Overflow VulnerabilityThird Party Advisory;VDB Entry
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/71612
PHP exif_process_IFD_TAG denial of service CVE-2011-4566 Vulnerability ReportThird Party Advisory;VDB Entry
-
http://www.debian.org/security/2012/dsa-2399
Debian -- Security Information -- DSA-2399-2 php5Third Party Advisory
-
https://bugs.php.net/bug.php?id=60150
PHP :: Sec Bug #60150 :: Integer overflow during the parsing of invalid exif headerExploit;Vendor Advisory
-
https://www.ubuntu.com/usn/USN-1307-1/
USN-1307-1: PHP vulnerability | Ubuntu security noticesThird Party Advisory
Jump to