Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2011-3189 |
CWE-ID | CWE-310 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
PHP Universal components / Libraries / Scripting languages |
Vendor | PHP Group |
Security Bulletin
This security bulletin contains one medium risk vulnerability.
EUVDB-ID: #VU44781
Risk: Medium
CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2011-3189
CWE-ID:
CWE-310 - Cryptographic Issues
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.
The crypt function in PHP 5.3.7, when the MD5 hash type is used, returns the value of the salt argument instead of the hashed string, which might allow remote attackers to bypass authentication via an arbitrary password, a different vulnerability than CVE-2011-2483.
MitigationInstall update from vendor's website.
Vulnerable software versionsPHP: 5.3.7
External linkshttp://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
http://osvdb.org/74726
http://secunia.com/advisories/45678
http://support.apple.com/kb/HT5130
http://www.openwall.com/lists/oss-security/2011/08/23/4
http://www.php.net/archive/2011.php#id2011-08-23-1
http://www.php.net/ChangeLog-5.php#5.3.8
http://bugs.gentoo.org/show_bug.cgi?id=380261
http://bugs.php.net/bug.php?id=55439
http://exchange.xforce.ibmcloud.com/vulnerabilities/69429
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.