CVE-2012-0807

Stack-based buffer overflow in the suhosin_encrypt_single_cookie function in the transparent cookie-encryption feature in the Suhosin extension before 0.9.33 for PHP, when suhosin.cookie.encrypt and suhosin.multiheader are enabled, might allow remote attackers to execute arbitrary code via a long string that is used in a Set-Cookie HTTP header.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:hardened-php:suhosin:*:beta_2006.09.07:*:*:*:*:*:*
cpe:2.3:a:hardened-php:suhosin:*:beta_2006.09.09:*:*:*:*:*:*
cpe:2.3:a:hardened-php:suhosin:*:*:*:*:*:*:*:*
cpe:2.3:a:hardened-php:suhosin:0.9.0:*:*:*:*:*:*:*
cpe:2.3:a:hardened-php:suhosin:0.9.1:*:*:*:*:*:*:*
cpe:2.3:a:hardened-php:suhosin:0.9.2:*:*:*:*:*:*:*
cpe:2.3:a:hardened-php:suhosin:0.9.3:*:*:*:*:*:*:*
cpe:2.3:a:hardened-php:suhosin:0.9.4:*:*:*:*:*:*:*
cpe:2.3:a:hardened-php:suhosin:0.9.5:*:*:*:*:*:*:*
cpe:2.3:a:hardened-php:suhosin:0.9.6:*:*:*:*:*:*:*
cpe:2.3:a:hardened-php:suhosin:0.9.6.1:*:*:*:*:*:*:*
cpe:2.3:a:hardened-php:suhosin:0.9.6.2:*:*:*:*:*:*:*
cpe:2.3:a:hardened-php:suhosin:0.9.6.3:*:*:*:*:*:*:*
cpe:2.3:a:hardened-php:suhosin:0.9.7:*:*:*:*:*:*:*
cpe:2.3:a:hardened-php:suhosin:0.9.8:*:*:*:*:*:*:*
cpe:2.3:a:hardened-php:suhosin:0.9.9:*:*:*:*:*:*:*
cpe:2.3:a:hardened-php:suhosin:0.9.9.1:*:*:*:*:*:*:*
cpe:2.3:a:hardened-php:suhosin:0.9.10:*:*:*:*:*:*:*
cpe:2.3:a:hardened-php:suhosin:0.9.11:*:*:*:*:*:*:*
cpe:2.3:a:hardened-php:suhosin:0.9.12:*:*:*:*:*:*:*
cpe:2.3:a:hardened-php:suhosin:0.9.13:*:*:*:*:*:*:*
cpe:2.3:a:hardened-php:suhosin:0.9.14:*:*:*:*:*:*:*
cpe:2.3:a:hardened-php:suhosin:0.9.15:*:*:*:*:*:*:*
cpe:2.3:a:hardened-php:suhosin:0.9.16:*:*:*:*:*:*:*
cpe:2.3:a:hardened-php:suhosin:0.9.17:*:*:*:*:*:*:*
cpe:2.3:a:hardened-php:suhosin:0.9.18:*:*:*:*:*:*:*
cpe:2.3:a:hardened-php:suhosin:0.9.19:*:*:*:*:*:*:*
cpe:2.3:a:hardened-php:suhosin:0.9.20:*:*:*:*:*:*:*
cpe:2.3:a:hardened-php:suhosin:0.9.21:*:*:*:*:*:*:*
cpe:2.3:a:hardened-php:suhosin:0.9.22:*:*:*:*:*:*:*
cpe:2.3:a:hardened-php:suhosin:0.9.23:*:*:*:*:*:*:*
cpe:2.3:a:hardened-php:suhosin:0.9.24:*:*:*:*:*:*:*
cpe:2.3:a:hardened-php:suhosin:0.9.25:*:*:*:*:*:*:*
cpe:2.3:a:hardened-php:suhosin:0.9.26:*:*:*:*:*:*:*
cpe:2.3:a:hardened-php:suhosin:0.9.27:*:*:*:*:*:*:*
cpe:2.3:a:hardened-php:suhosin:0.9.28:*:*:*:*:*:*:*
cpe:2.3:a:hardened-php:suhosin:0.9.29:*:*:*:*:*:*:*
cpe:2.3:a:hardened-php:suhosin:0.9.30:*:*:*:*:*:*:*

History

21 Nov 2024, 01:35

Type Values Removed Values Added
References () http://archives.neohapsis.com/archives/fulldisclosure/2012-01/0296.html - Exploit () http://archives.neohapsis.com/archives/fulldisclosure/2012-01/0296.html - Exploit
References () http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00013.html - () http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00013.html -
References () http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00016.html - () http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00016.html -
References () http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00001.html - () http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00001.html -
References () http://secunia.com/advisories/48668 - () http://secunia.com/advisories/48668 -
References () http://www.openwall.com/lists/oss-security/2012/01/24/11 - () http://www.openwall.com/lists/oss-security/2012/01/24/11 -
References () http://www.openwall.com/lists/oss-security/2012/01/24/7 - () http://www.openwall.com/lists/oss-security/2012/01/24/7 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=783350 - () https://bugzilla.redhat.com/show_bug.cgi?id=783350 -
References () https://github.com/stefanesser/suhosin/commit/73b1968ee30f6d9d2dae497544b910e68e114bfa - Exploit, Patch () https://github.com/stefanesser/suhosin/commit/73b1968ee30f6d9d2dae497544b910e68e114bfa - Exploit, Patch

Information

Published : 2012-01-27 00:55

Updated : 2025-04-11 00:51


NVD link : CVE-2012-0807

Mitre link : CVE-2012-0807

CVE.ORG link : CVE-2012-0807


JSON object : View

Products Affected

hardened-php

  • suhosin
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer