Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2009-5016
Deferred
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-12 Nov, 2010 | 22:00
Updated At-11 Apr, 2025 | 00:51

Integer overflow in the xml_utf8_decode function in ext/xml/xml.c in PHP before 5.2.11 makes it easier for remote attackers to bypass cross-site scripting (XSS) and SQL injection protection mechanisms via a crafted string that uses overlong UTF-8 encoding, a different vulnerability than CVE-2010-3870.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.06.8MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:P
CPE Matches

The PHP Group
php
>>php>>Versions up to 5.2.10(inclusive)
cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
The PHP Group
php
>>php>>1.0
cpe:2.3:a:php:php:1.0:*:*:*:*:*:*:*
The PHP Group
php
>>php>>2.0
cpe:2.3:a:php:php:2.0:*:*:*:*:*:*:*
The PHP Group
php
>>php>>2.0b10
cpe:2.3:a:php:php:2.0b10:*:*:*:*:*:*:*
The PHP Group
php
>>php>>3.0
cpe:2.3:a:php:php:3.0:*:*:*:*:*:*:*
The PHP Group
php
>>php>>3.0.1
cpe:2.3:a:php:php:3.0.1:*:*:*:*:*:*:*
The PHP Group
php
>>php>>3.0.2
cpe:2.3:a:php:php:3.0.2:*:*:*:*:*:*:*
The PHP Group
php
>>php>>3.0.3
cpe:2.3:a:php:php:3.0.3:*:*:*:*:*:*:*
The PHP Group
php
>>php>>3.0.4
cpe:2.3:a:php:php:3.0.4:*:*:*:*:*:*:*
The PHP Group
php
>>php>>3.0.5
cpe:2.3:a:php:php:3.0.5:*:*:*:*:*:*:*
The PHP Group
php
>>php>>3.0.6
cpe:2.3:a:php:php:3.0.6:*:*:*:*:*:*:*
The PHP Group
php
>>php>>3.0.7
cpe:2.3:a:php:php:3.0.7:*:*:*:*:*:*:*
The PHP Group
php
>>php>>3.0.8
cpe:2.3:a:php:php:3.0.8:*:*:*:*:*:*:*
The PHP Group
php
>>php>>3.0.9
cpe:2.3:a:php:php:3.0.9:*:*:*:*:*:*:*
The PHP Group
php
>>php>>3.0.10
cpe:2.3:a:php:php:3.0.10:*:*:*:*:*:*:*
The PHP Group
php
>>php>>3.0.11
cpe:2.3:a:php:php:3.0.11:*:*:*:*:*:*:*
The PHP Group
php
>>php>>3.0.12
cpe:2.3:a:php:php:3.0.12:*:*:*:*:*:*:*
The PHP Group
php
>>php>>3.0.13
cpe:2.3:a:php:php:3.0.13:*:*:*:*:*:*:*
The PHP Group
php
>>php>>3.0.14
cpe:2.3:a:php:php:3.0.14:*:*:*:*:*:*:*
The PHP Group
php
>>php>>3.0.15
cpe:2.3:a:php:php:3.0.15:*:*:*:*:*:*:*
The PHP Group
php
>>php>>3.0.16
cpe:2.3:a:php:php:3.0.16:*:*:*:*:*:*:*
The PHP Group
php
>>php>>3.0.17
cpe:2.3:a:php:php:3.0.17:*:*:*:*:*:*:*
The PHP Group
php
>>php>>3.0.18
cpe:2.3:a:php:php:3.0.18:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0
cpe:2.3:a:php:php:4.0:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0
cpe:2.3:a:php:php:4.0:beta_4_patch1:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0
cpe:2.3:a:php:php:4.0:beta1:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0
cpe:2.3:a:php:php:4.0:beta2:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0
cpe:2.3:a:php:php:4.0:beta3:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0
cpe:2.3:a:php:php:4.0:beta4:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0.0
cpe:2.3:a:php:php:4.0.0:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0.1
cpe:2.3:a:php:php:4.0.1:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0.2
cpe:2.3:a:php:php:4.0.2:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0.3
cpe:2.3:a:php:php:4.0.3:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0.4
cpe:2.3:a:php:php:4.0.4:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0.5
cpe:2.3:a:php:php:4.0.5:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0.6
cpe:2.3:a:php:php:4.0.6:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.0.7
cpe:2.3:a:php:php:4.0.7:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.1.0
cpe:2.3:a:php:php:4.1.0:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.1.1
cpe:2.3:a:php:php:4.1.1:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.1.2
cpe:2.3:a:php:php:4.1.2:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.2.0
cpe:2.3:a:php:php:4.2.0:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.2.1
cpe:2.3:a:php:php:4.2.1:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.2.2
cpe:2.3:a:php:php:4.2.2:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.2.3
cpe:2.3:a:php:php:4.2.3:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.3.0
cpe:2.3:a:php:php:4.3.0:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.3.1
cpe:2.3:a:php:php:4.3.1:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.3.2
cpe:2.3:a:php:php:4.3.2:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.3.3
cpe:2.3:a:php:php:4.3.3:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.3.4
cpe:2.3:a:php:php:4.3.4:*:*:*:*:*:*:*
The PHP Group
php
>>php>>4.3.5
cpe:2.3:a:php:php:4.3.5:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-189Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://bugs.php.net/bug.php?id=49687cve@mitre.org
Exploit
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052836.htmlcve@mitre.org
N/A
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052845.htmlcve@mitre.org
N/A
http://secunia.com/advisories/42410cve@mitre.org
N/A
http://secunia.com/advisories/42812cve@mitre.org
N/A
http://sirdarckcat.blogspot.com/2009/10/couple-of-unicode-issues-on-php-and.htmlcve@mitre.org
Exploit
http://www.blackhat.com/presentations/bh-usa-09/VELANAVA/BHUSA09-VelaNava-FavoriteXSS-SLIDES.pdfcve@mitre.org
Exploit
http://www.redhat.com/support/errata/RHSA-2010-0919.htmlcve@mitre.org
N/A
http://www.redhat.com/support/errata/RHSA-2011-0195.htmlcve@mitre.org
N/A
http://www.securityfocus.com/bid/44889cve@mitre.org
N/A
http://www.ubuntu.com/usn/USN-1042-1cve@mitre.org
N/A
http://www.vupen.com/english/advisories/2010/3081cve@mitre.org
N/A
http://www.vupen.com/english/advisories/2011/0020cve@mitre.org
N/A
http://www.vupen.com/english/advisories/2011/0021cve@mitre.org
N/A
http://www.vupen.com/english/advisories/2011/0077cve@mitre.org
N/A
http://bugs.php.net/bug.php?id=49687af854a3a-2127-422b-91ae-364da2661108
Exploit
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052836.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052845.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/42410af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/42812af854a3a-2127-422b-91ae-364da2661108
N/A
http://sirdarckcat.blogspot.com/2009/10/couple-of-unicode-issues-on-php-and.htmlaf854a3a-2127-422b-91ae-364da2661108
Exploit
http://www.blackhat.com/presentations/bh-usa-09/VELANAVA/BHUSA09-VelaNava-FavoriteXSS-SLIDES.pdfaf854a3a-2127-422b-91ae-364da2661108
Exploit
http://www.redhat.com/support/errata/RHSA-2010-0919.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.redhat.com/support/errata/RHSA-2011-0195.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securityfocus.com/bid/44889af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.ubuntu.com/usn/USN-1042-1af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vupen.com/english/advisories/2010/3081af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vupen.com/english/advisories/2011/0020af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vupen.com/english/advisories/2011/0021af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vupen.com/english/advisories/2011/0077af854a3a-2127-422b-91ae-364da2661108
N/A
Change History
0Changes found

Details not found