fkie_cve-2009-3557
Vulnerability from fkie_nvd
Published
2009-11-23 17:30
Modified
2025-04-09 00:30
Severity ?
Summary
The tempnam function in ext/standard/file.c in PHP before 5.2.12 and 5.3.x before 5.3.1 allows context-dependent attackers to bypass safe_mode restrictions, and create files in group-writable or world-writable directories, via the dir and prefix arguments.
References
secalert@redhat.comhttp://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html
secalert@redhat.comhttp://marc.info/?l=bugtraq&m=127680701405735&w=2
secalert@redhat.comhttp://marc.info/?l=bugtraq&m=127680701405735&w=2
secalert@redhat.comhttp://news.php.net/php.announce/79
secalert@redhat.comhttp://secunia.com/advisories/37412Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/37821
secalert@redhat.comhttp://secunia.com/advisories/40262
secalert@redhat.comhttp://securityreason.com/securityalert/6601Exploit
secalert@redhat.comhttp://support.apple.com/kb/HT4077
secalert@redhat.comhttp://svn.php.net/viewvc/php/php-src/branches/PHP_5_2/ext/standard/file.c?view=log
secalert@redhat.comhttp://svn.php.net/viewvc/php/php-src/branches/PHP_5_3/ext/standard/file.c?view=log
secalert@redhat.comhttp://svn.php.net/viewvc?view=revision&revision=288945
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2009:285
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2009:302
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2009:303
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2009/11/20/2Patch
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2009/11/20/3Patch
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2009/11/20/5Patch
secalert@redhat.comhttp://www.php.net/ChangeLog-5.phpPatch, Vendor Advisory
secalert@redhat.comhttp://www.php.net/releases/5_2_12.php
secalert@redhat.comhttp://www.php.net/releases/5_3_1.phpPatch, Vendor Advisory
secalert@redhat.comhttp://www.vupen.com/english/advisories/2009/3593
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7396
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=127680701405735&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=127680701405735&w=2
af854a3a-2127-422b-91ae-364da2661108http://news.php.net/php.announce/79
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/37412Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/37821
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/40262
af854a3a-2127-422b-91ae-364da2661108http://securityreason.com/securityalert/6601Exploit
af854a3a-2127-422b-91ae-364da2661108http://support.apple.com/kb/HT4077
af854a3a-2127-422b-91ae-364da2661108http://svn.php.net/viewvc/php/php-src/branches/PHP_5_2/ext/standard/file.c?view=log
af854a3a-2127-422b-91ae-364da2661108http://svn.php.net/viewvc/php/php-src/branches/PHP_5_3/ext/standard/file.c?view=log
af854a3a-2127-422b-91ae-364da2661108http://svn.php.net/viewvc?view=revision&revision=288945
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2009:285
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2009:302
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2009:303
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2009/11/20/2Patch
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2009/11/20/3Patch
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2009/11/20/5Patch
af854a3a-2127-422b-91ae-364da2661108http://www.php.net/ChangeLog-5.phpPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.php.net/releases/5_2_12.php
af854a3a-2127-422b-91ae-364da2661108http://www.php.net/releases/5_3_1.phpPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2009/3593
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7396
Impacted products
Vendor Product Version
php php *
php php 1.0
php php 2.0
php php 2.0b10
php php 3.0
php php 3.0.1
php php 3.0.2
php php 3.0.3
php php 3.0.4
php php 3.0.5
php php 3.0.6
php php 3.0.7
php php 3.0.8
php php 3.0.9
php php 3.0.10
php php 3.0.11
php php 3.0.12
php php 3.0.13
php php 3.0.14
php php 3.0.15
php php 3.0.16
php php 3.0.17
php php 3.0.18
php php 4.0
php php 4.0
php php 4.0
php php 4.0
php php 4.0
php php 4.0
php php 4.0.0
php php 4.0.1
php php 4.0.2
php php 4.0.3
php php 4.0.4
php php 4.0.5
php php 4.0.6
php php 4.0.7
php php 4.1.0
php php 4.1.1
php php 4.1.2
php php 4.2.0
php php 4.2.1
php php 4.2.2
php php 4.2.3
php php 4.3.0
php php 4.3.1
php php 4.3.2
php php 4.3.7
php php 4.3.10
php php 4.3.11
php php 4.4.2
php php 4.4.7
php php 4.4.8
php php 4.4.9
php php 5.0.0
php php 5.0.0
php php 5.0.3
php php 5.1.1
php php 5.2.1
php php 5.2.5
php php 5.2.6
php php 5.2.10
php php 5.3.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD613CC3-281B-43D1-A352-53D339B040FA",
              "versionEndIncluding": "5.2.11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "92647629-083F-4042-8365-4AD2EBC9C1BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF72E8D5-9F8C-4BD4-9AA4-28E23CB48A47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:2.0b10:*:*:*:*:*:*:*",
              "matchCriteriaId": "83BE1120-6370-4470-8586-6581EDF3FD69",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "245C601D-0FE7-47E3-8304-6FF45E9567D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "691BB8BB-329A-4640-B758-7590C99B5E42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2BC4CCE-2774-463E-82EA-36CD442D3A7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C478024C-2FCD-463F-A75E-E04660AA9DF1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC9C32F4-5102-4E9B-9F32-B24B65A5ED2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:3.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5BD99C0-E875-496E-BE5E-A8DCBD414B5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:3.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "1851ADE5-C70C-46E0-941A-6ADF7DB5C126",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:3.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "69DA3BA2-AF53-4C9D-93FA-0317841595B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:3.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB0CFEE5-2274-4BBC-A24A-3A0D13F607FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:3.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "67B59D6A-7EDA-4C34-81D6-C2557C85D164",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:3.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "AEBA40B6-8FDF-41AA-8166-F491FF7F3118",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:3.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "E74E2B72-A428-4BB3-B6F8-0AF5E487A807",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:3.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E2F1D82-8E6A-4FBF-9055-A0F395DC17FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:3.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "945FF149-3446-4905-BCA1-C397E3497B58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:3.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E446DBD-FEFA-4D22-9C9D-51F61C01E414",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:3.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C8DE728-78E1-4F9F-BC56-CD9B10E61287",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:3.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "80E31CC6-9356-4BB7-9F49-320AAF341E1E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:3.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB8AD3A-9181-459A-9AF2-B3FC6BAF6FEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:3.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B3E7199-8FB7-4930-9C0A-A36A698940B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDBEC461-D553-41B7-8D85-20B6A933C21C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:4.0:beta_4_patch1:*:*:*:*:*:*",
              "matchCriteriaId": "AEEF2298-98E8-409F-9205-84817CEF947B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:4.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "6AFC00BA-D64D-4407-AC69-FDD9FF013943",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:4.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "D80F2A8B-B57F-4970-867A-55E8187C1502",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:4.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "EF4E0EFE-4FF6-4E8F-8EC5-68B059FC0C42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:4.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "49965B80-DC27-4864-BDF0-CBBFF16BFD80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:4.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BF57C14-86B6-419A-BAFF-93D01CB1E081",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "78BAA18C-E5A0-4210-B64B-709BBFF31EEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:4.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "13A159B4-B847-47DE-B7F8-89384E6C551B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:4.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "57B59616-A309-40B4-94B1-50A7BC00E35C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:4.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F39A1B1-416E-4436-8007-733B66904A14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:4.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD5FC218-3DDB-4981-81C9-6C69F8DA6F4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:4.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC2E5F96-66D2-4F99-A74D-6A2305EE218E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:4.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D724D09-0D45-4701-93C9-348301217C8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:4.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6713614A-B14E-4A85-BF89-ED780068FC68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:4.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD95F8EB-B428-4B3C-9254-A5DECE03A989",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:4.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "069EB7EE-06B9-454F-9007-8DE5DCA33C53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:4.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "18BF5BE6-09EA-45AD-93BF-2BEF1742534E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:4.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC1460DF-1687-4314-BF1A-01290B20302D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:4.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "470380B0-3982-48FC-871B-C8B43C81900D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:4.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FAA7712-10F0-4BB6-BAFB-D0806AFD9DE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:4.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "63190D9B-7958-4B93-87C6-E7D5A572F6DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:4.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AB2E2E8-81D6-4973-AC0F-AA644EE99DD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:4.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AAF4586-74FF-47C6-864B-656FDF3F33D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:4.3.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "72BD447A-4EED-482C-8F61-48FAD4FCF8BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:4.3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "C69CDE21-2FD4-4529-8F02-8709CF5E3D7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:4.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "221B9AC4-C63C-4386-B3BD-E4BC102C6124",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:4.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB25CFBB-347C-479E-8853-F49DD6CBD7D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:4.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E46E4B4-808C-4B47-81D9-EC2B02A5E57B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:4.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FF30D7F-353B-4496-9A89-4EF2BB279E0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:4.4.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD97DF34-35AB-4979-96E2-B23DC8556A79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7007E77F-60EF-44D8-9676-15B59DF1325F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.0.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "8FC144FA-8F84-44C0-B263-B639FEAD20FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "9222821E-370F-4616-B787-CC22C2F4E7CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "16E43B88-1563-4EFD-9267-AE3E8C35D67A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "88358D1E-BE6F-4CE3-A522-83D1FA4739E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCB6CDDD-70D3-4004-BCE0-8C4723076103",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "A782CA26-9C38-40A8-92AE-D47B14D2FCE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1F32DDF-17A3-45B5-9227-833EBEBD3923",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:php:5.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EF4B938-BB14-4C06-BEE9-10CA755C5DEF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The tempnam function in ext/standard/file.c in PHP before 5.2.12 and 5.3.x before 5.3.1 allows context-dependent attackers to bypass safe_mode restrictions, and create files in group-writable or world-writable directories, via the dir and prefix arguments."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n tempnam de ext/standard/file.c de PHP v5.2.11 y anteriores, y v5.3.x anteriores a v5.3.1, permite a usuarios dependiendo del contexto evitar las restricciones safe_mode, y crear ficheros en directorios con permisos de sistema operativo de escritura para su grupo o para cualquier usuario, a trav\u00e9s de los argumentos dir y prefix."
    }
  ],
  "id": "CVE-2009-3557",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-11-23T17:30:00.467",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://marc.info/?l=bugtraq\u0026m=127680701405735\u0026w=2"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://marc.info/?l=bugtraq\u0026m=127680701405735\u0026w=2"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://news.php.net/php.announce/79"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/37412"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/37821"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/40262"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit"
      ],
      "url": "http://securityreason.com/securityalert/6601"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://support.apple.com/kb/HT4077"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://svn.php.net/viewvc/php/php-src/branches/PHP_5_2/ext/standard/file.c?view=log"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://svn.php.net/viewvc/php/php-src/branches/PHP_5_3/ext/standard/file.c?view=log"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://svn.php.net/viewvc?view=revision\u0026revision=288945"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:285"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:302"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:303"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2009/11/20/2"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2009/11/20/3"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2009/11/20/5"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.php.net/ChangeLog-5.php"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.php.net/releases/5_2_12.php"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.php.net/releases/5_3_1.php"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2009/3593"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7396"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=127680701405735\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=127680701405735\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://news.php.net/php.announce/79"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/37412"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/37821"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/40262"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://securityreason.com/securityalert/6601"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://support.apple.com/kb/HT4077"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://svn.php.net/viewvc/php/php-src/branches/PHP_5_2/ext/standard/file.c?view=log"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://svn.php.net/viewvc/php/php-src/branches/PHP_5_3/ext/standard/file.c?view=log"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://svn.php.net/viewvc?view=revision\u0026revision=288945"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:285"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:302"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:303"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2009/11/20/2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2009/11/20/3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2009/11/20/5"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.php.net/ChangeLog-5.php"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.php.net/releases/5_2_12.php"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.php.net/releases/5_3_1.php"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2009/3593"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7396"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vendorComments": [
    {
      "comment": "We do not consider safe_mode / open_basedir restriction bypass issues being security sensitive. For more details see http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=169857#c1 and http://www.php.net/security-note.php",
      "lastModified": "2009-11-24T00:00:00",
      "organization": "Red Hat"
    }
  ],
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…