Description
exif.c in PHP before 4.3.11 allows remote attackers to cause a denial of service (memory consumption and crash) via an EXIF header with a large IFD nesting level, which causes significant stack recursion.
Product(s):
- PHP PHP 4.3.0
- PHP 4.3.0 -
- PHP 4.3.0 Alpha1
- PHP 4.3.0 Alpha2
- PHP 4.3.0 Alpha3
- PHP 4.3.0 Dev
- PHP 4.3.0 Patch re1
- PHP 4.3.0 Patch re2
- PHP 4.3.0 Release Candidate 1
- PHP 4.3.0 Release Candidate 2
- PHP 4.3.0 Release Candidate 3
- PHP 4.3.0 Release Candidate 4
- PHP PHP 4.3.10
- PHP 4.3.10 -
- PHP 4.3.10 Release Candidate 1
- PHP 4.3.10 Release Candidate 2
- PHP PHP 4.3.1
- PHP PHP 4.3.2
- PHP 4.3.2 -
- PHP 4.3.2 Release Candidate 1
- PHP 4.3.2 Release Candidate 2
- PHP 4.3.2 Release Candidate 3
- PHP 4.3.2 Release Candidate 4
- PHP PHP 4.3.3
- PHP 4.3.3 -
- PHP 4.3.3 Release Candidate 1
- PHP 4.3.3 Release Candidate 2
- PHP 4.3.3 Release Candidate 3
- PHP 4.3.3 Release Candidate 4
- PHP PHP 4.3.4
- PHP 4.3.4 -
- PHP 4.3.4 Release Candidate 1
- PHP 4.3.4 Release Candidate 2
- PHP 4.3.4 Release Candidate 3
- PHP PHP 4.3.5
- PHP 4.3.5 -
- PHP 4.3.5 Release Candidate 1
- PHP 4.3.5 Release Candidate 2
- PHP 4.3.5 Release Candidate 3
- PHP 4.3.5 Release Candidate 4
- PHP PHP 4.3.6
- PHP 4.3.6 -
- PHP 4.3.6 Release Candidate 1
- PHP 4.3.6 Release Candidate 2
- PHP 4.3.6 Release Candidate 3
- PHP PHP 4.3.7
- PHP 4.3.7 -
- PHP 4.3.7 Release Candidate 1
- PHP PHP 4.3.8
- PHP PHP 4.3.9
- PHP 4.3.9 Release Candidate 1
- PHP 4.3.9 Release Candidate 2
- PHP 4.3.9 Release Candidate 3
- SGI ProPack 3.0
- Apple Mac OS X 10.3.9
- Apple Mac OS X 10.4.1
- Apple Mac OS X 10.4
- Apple Mac OS X Server 10.3.9
- Apple Mac OS X Server 10.4.1
- Apple Mac OS X Server 10.4
- Conectiva Linux 10.0
- Conectiva Linux 9.0
- Peachtree Linux Release 1
- SuSE SuSE Linux 1.0
- SuSE SuSE Linux 2.0
- SuSE SuSE Linux 3.0
- SuSE SuSE Linux 4.0
- SuSE SuSE Linux 4.2
- SuSE SuSE Linux 4.3
- SuSE SuSE Linux 4.4.1
- SuSE SuSE Linux 4.4
- SuSE SuSE Linux 5.0
- SuSE SuSE Linux 5.1
- SuSE SuSE Linux 5.2
- SuSE SuSE Linux 5.3
- SuSE SuSE Linux 6.0
- SuSE SuSE Linux 6.1
- SuSE SuSE Linux 6.1 alpha
- SuSE SuSE Linux 6.2
- SuSE SuSE Linux 6.3
- SUSE Linux 6.3 on PPC
- SuSE SuSE Linux 6.3 alpha
- SuSE SuSE Linux 6.4
- SUSE Linux 6.4 on i386
- SUSE Linux 6.4 on PPC
- SuSE SuSE Linux 6.4 alpha
- SuSE SuSE Linux 7.0
- SUSE Linux 7.0 on i386
- SUSE Linux 7.0 on PPC
- SUSE Linux 7.0 on SPARC
- SuSE SuSE Linux 7.0 alpha
- SuSE SuSE Linux 7.1
- SUSE Linux 7.1
- SUSE Linux 7.1 on SPARC
- SUSE Linux 7.1 on x86
- SuSE SuSE Linux 7.1 alpha
- SuSE SuSE Linux 7.2
- SUSE Linux 7.2 on i386
- SuSE SuSE Linux 7.3
- SUSE Linux 7.3 on i386
- +15 additional
Question to Ask Vendors:
- Can you confirm whether your systems are affected by CVE-2005-1043, and if so, what steps are you currently taking to mitigate this vulnerability?
- What is your estimated timeline for fully resolving CVE-2005-1043 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions:
- Check out the advisory links provided below.