The preg_quote function in PHP 5.2 through 5.2.13 and 5.3 through 5.3.2 allows context-dependent attackers to obtain sensitive information (memory contents) by causing a userspace interruption of an internal function, related to the call time pass by reference feature, modification of ZVALs whose values are not updated in the associated local variables, and access of previously-freed memory.
Advisories
Source ID Title
EUVD EUVD EUVD-2010-1934 The preg_quote function in PHP 5.2 through 5.2.13 and 5.3 through 5.3.2 allows context-dependent attackers to obtain sensitive information (memory contents) by causing a userspace interruption of an internal function, related to the call time pass by reference feature, modification of ZVALs whose values are not updated in the associated local variables, and access of previously-freed memory.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-07T02:17:14.339Z

Reserved: 2010-05-11T00:00:00

Link: CVE-2010-1915

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2010-05-12T11:46:40.297

Modified: 2025-04-11T00:51:21.963

Link: CVE-2010-1915

cve-icon Redhat

Severity :

Publid Date: 2010-05-09T00:00:00Z

Links: CVE-2010-1915 - Bugzilla

cve-icon OpenCVE Enrichment

No data.