var-201205-0246
Vulnerability from variot
sapi/cgi/cgi_main.c in PHP before 5.3.13 and 5.4.x before 5.4.3, when configured as a CGI script (aka php-cgi), does not properly handle query strings that contain a %3D sequence but no = (equals sign) character, which allows remote attackers to execute arbitrary code by placing command-line options in the query string, related to lack of skipping a certain php_getopt for the 'd' case. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-1823. PHP-CGI-based setups contain a vulnerability when parsing query string parameters from php files. This vulnerability CVE-2012-1823 Vulnerability due to insufficient fix for.A third party could execute arbitrary code by placing command line options in the query string. PHP is prone to an information-disclosure vulnerability. Exploiting this issue allows remote attackers to view the source code of files in the context of the server process. This may allow the attacker to obtain sensitive information and to run arbitrary PHP code on the affected computer; other attacks are also possible. ----------------------------------------------------------------------
Become a PSI 3.0 beta tester! Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. Download it here! http://secunia.com/psi_30_beta_launch
TITLE: Ubuntu update for php
SECUNIA ADVISORY ID: SA49097
VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/49097/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=49097
RELEASE DATE: 2012-05-07
DISCUSS ADVISORY: http://secunia.com/advisories/49097/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)
http://secunia.com/advisories/49097/
ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=49097
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION: Ubuntu has issued an update for php. This fixes a vulnerability, which can be exploited by malicious people to disclose certain sensitive information or compromise a vulnerable system.
For more information: SA49014
SOLUTION: Apply updated packages.
Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
ORIGINAL ADVISORY: USN-1437-1: http://www.ubuntu.com/usn/usn-1437-1/
OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
.
Additionally, this update fixes insufficient validation of upload name which lead to corrupted $_FILES indices.
For the stable distribution (squeeze), this problem has been fixed in version 5.3.3-7+squeeze9.
The testing distribution (wheezy) will be fixed soon.
For the unstable distribution (sid), this problem has been fixed in version 5.4.3-1.
We recommend that you upgrade your php5 packages.
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: http://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux)
iQEcBAEBAgAGBQJPqqf3AAoJEOxfUAG2iX57MqcIALyiggqZ6SR+lOtdAd7npKd3 lZ3nXZVUvyC5e4/gageT3s2BlmuipGIrBvyraWR2TvAlNYIu7Ia6EMVsjG0T3gHu iM2yB4+wCaV8CIHqzmyN9lDaotxVty9gQ8BdtJaZguwi9+Sw7KfaCw6CXTluqPkU Ocdb7Saz7eVnNnVwTORxOCBnlIZDn4PbiW9tMLZawGTwNgdT/2lMS8czJGVmf/Oj j4c631zN1K8vlnctHCYQAS269nr9jwmEx0JKcWl5khc7XMi/SmcUG9xG4p5JpGrA ZbBAySyLuxr9bdMA3I9Jqxmmq4uaGwpCH8DSfMJd5FHNXKfq7efnL1Hp5mOERHU= =snJW -----END PGP SIGNATURE-----
Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Note: the current version of the following document is available here: https://h20566.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c03368475
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c03368475 Version: 1
HPSBUX02791 SSRT100856 rev.1 - HP-UX Apache Web Server running PHP, Remote Execution of Arbitrary Code, Privilege Elevation, Denial of Service (DoS)
NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.
Release Date: 2012-06-14 Last Updated: 2012-06-14
Potential Security Impact: Remote execution of arbitrary code, privilege elevation, or Denial of Service (DoS).
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY Potential security vulnerabilities have been identified with HP-UX Apache Web Server running PHP. These vulnerabilities could be exploited remotely to execute arbitrary code, elevate privileges, or create a Denial of Service (DoS). PHP is contained in the HP-UX Apache Web Server Suite.
References: CVE-2011-4153, CVE-2012-0830, CVE-2012-0883, CVE-2012-1172, CVE-2012-1823, CVE-2012-2311
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP-UX B.11.23, B.11.31 running HP-UX Apache Web Server Suite v3.24 or earlier
BACKGROUND For a PGP signed
CVSS 2.0 Base Metrics
Reference Base Vector Base Score CVE-2011-4153 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0 CVE-2012-0830 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 CVE-2012-0883 (AV:L/AC:M/Au:N/C:C/I:C/A:C) 6.9 CVE-2012-1172 (AV:N/AC:M/Au:N/C:N/I:P/A:P) 5.8 CVE-2012-1823 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 CVE-2012-2311 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002
RESOLUTION
HP has provided the following software updates to resolve the vulnerabilities. The updates are available for download from http://software.hp.com
HP-UX Web Server Suite v.3.24 containing Apache v2.2.15.13 and PHP v5.2.17 HP-UX 11i Release Apache Depot name
B.11.23 (32-bit) HPUXWS22ATW-B324-32
B.11.23 (64-bit) HPUXWS22ATW-B324-64
B.11.31 (32-bit) HPUXWS22ATW-B324-32
B.11.31 (64-bit) HPUXWS22ATW-B324-64
MANUAL ACTIONS: Yes - Update Install HP-UX Web Server Suite v3.24 or subsequent.
PRODUCT SPECIFIC INFORMATION
HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application that replaces HP-UX Security Patch Check. It analyzes all Security Bulletins issued by HP and lists recommended actions that may apply to a specific HP-UX system. It can also download patches and create a depot automatically. For more information see https://www.hp.com/go/swa
The following text is for use by the HP-UX Software Assistant. HP-UX Web Server Suite v3.24 AFFECTED VERSIONS
HP-UX B.11.23
hpuxws22APCH32.APACHE hpuxws22APCH32.APACHE2 hpuxws22APCH32.AUTH_LDAP hpuxws22APCH32.AUTH_LDAP2 hpuxws22APCH32.MOD_JK hpuxws22APCH32.MOD_JK2 hpuxws22APCH32.MOD_PERL hpuxws22APCH32.MOD_PERL2 hpuxws22APCH32.PHP hpuxws22APCH32.PHP2 hpuxws22APCH32.WEBPROXY hpuxws22APCH32.WEBPROXY2 hpuxws22APACHE.APACHE hpuxws22APACHE.APACHE2 hpuxws22APACHE.AUTH_LDAP hpuxws22APACHE.AUTH_LDAP2 hpuxws22APACHE.MOD_JK hpuxws22APACHE.MOD_JK2 hpuxws22APACHE.MOD_PERL hpuxws22APACHE.MOD_PERL2 hpuxws22APACHE.PHP hpuxws22APACHE.PHP2 hpuxws22APACHE.WEBPROXY hpuxws22APACHE.WEBPROXY2 action: install revision B.2.2.15.13 or subsequent
HP-UX B.11.31
hpuxws22APCH32.APACHE hpuxws22APCH32.APACHE2 hpuxws22APCH32.AUTH_LDAP hpuxws22APCH32.AUTH_LDAP2 hpuxws22APCH32.MOD_JK hpuxws22APCH32.MOD_JK2 hpuxws22APCH32.MOD_PERL hpuxws22APCH32.MOD_PERL2 hpuxws22APCH32.PHP hpuxws22APCH32.PHP2 hpuxws22APCH32.WEBPROXY hpuxws22APCH32.WEBPROXY2 hpuxws22APACHE.APACHE hpuxws22APACHE.APACHE2 hpuxws22APACHE.AUTH_LDAP hpuxws22APACHE.AUTH_LDAP2 hpuxws22APACHE.MOD_JK hpuxws22APACHE.MOD_JK2 hpuxws22APACHE.MOD_PERL hpuxws22APACHE.MOD_PERL2 hpuxws22APACHE.PHP hpuxws22APACHE.PHP2 hpuxws22APACHE.WEBPROXY hpuxws22APACHE.WEBPROXY2
action: install revision B.2.2.15.13 or subsequent
END AFFECTED VERSIONS
HISTORY Version:1 (rev.1) - 14 June 2012 Initial release
Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.
Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com.
Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com
Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins
Security Bulletin List: A list of HP Security Bulletins, updated periodically, is contained in HP Security Notice HPSN-2011-001: https://h20566.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c02964430
Security Bulletin Archive: A list of recently released Security Bulletins is available here: http://h20566.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/
Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.
3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX
Copyright 2012 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits;damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners.
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux)
iEYEARECAAYFAk/f0GcACgkQ4B86/C0qfVnCEwCfWX2UX+TvBNeJawjexLmPtwjt 1TEAnj7Q3fqZkor5ilSKlW2dNHa1f4aO =pEB+ -----END PGP SIGNATURE----- . HP System Management Homepage (SMH) v7.2.0 and earlier running on Linux and Windows. Content-Disposition: inline
==========================================================================Ubuntu Security Notice USN-1437-1 May 04, 2012
php5 vulnerability
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.04 LTS
- Ubuntu 11.10
- Ubuntu 11.04
- Ubuntu 10.04 LTS
- Ubuntu 8.04 LTS
Summary:
Standalone PHP CGI scripts could be made to execute arbitrary code with the privilege of the web server.
Software Description: - php5: HTML-embedded scripting language interpreter
Details:
It was discovered that PHP, when used as a stand alone CGI processor for the Apache Web Server, did not properly parse and filter query strings. Configurations using mod_php5 and FastCGI were not vulnerable.
This update addresses the issue when the PHP CGI interpreter is configured using mod_cgi and mod_actions as described in /usr/share/doc/php5-cgi/README.Debian.gz; however, if an alternate configuration is used to enable PHP CGI processing, it should be reviewed to ensure that command line arguments cannot be passed to the PHP interpreter. Please see http://people.canonical.com/~ubuntu-security/cve/2012/CVE-2012-2311.html for more details and potential mitigation approaches.
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 12.04 LTS: php5-cgi 5.3.10-1ubuntu3.1
Ubuntu 11.10: php5-cgi 5.3.6-13ubuntu3.7
Ubuntu 11.04: php5-cgi 5.3.5-1ubuntu7.8
Ubuntu 10.04 LTS: php5-cgi 5.3.2-1ubuntu4.15
Ubuntu 8.04 LTS: php5-cgi 5.2.4-2ubuntu5.24
In general, a standard system update will make all the necessary changes
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201205-0246", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "php", "scope": "eq", "trust": 1.6, "vendor": "php", "version": "5.2.16" }, { "model": "php", "scope": "eq", "trust": 1.6, "vendor": "php", "version": "5.2.9" }, { "model": "php", "scope": "eq", "trust": 1.6, "vendor": "php", "version": "5.2.11" }, { "model": "php", "scope": "eq", "trust": 1.6, "vendor": "php", "version": "5.2.15" }, { "model": "php", "scope": "eq", "trust": 1.6, "vendor": "php", "version": "5.2.17" }, { "model": "php", "scope": "eq", "trust": 1.6, "vendor": "php", "version": "5.2.10" }, { "model": "php", "scope": "eq", "trust": 1.6, "vendor": "php", "version": "5.2.12" }, { "model": "php", "scope": "eq", "trust": 1.6, "vendor": "php", "version": "5.2.8" }, { "model": "php", "scope": "eq", "trust": 1.6, "vendor": "php", "version": "5.2.14" }, { "model": "php", "scope": "eq", "trust": 1.6, "vendor": "php", "version": "5.2.13" }, { "model": "php", "scope": "eq", "trust": 1.3, "vendor": "php", "version": "5.3.1" }, { "model": "php", "scope": "eq", "trust": 1.3, "vendor": "php", "version": "5.3.8" }, { "model": "php", "scope": "eq", "trust": 1.3, "vendor": "php", "version": "5.3.10" }, { "model": "php", "scope": "eq", "trust": 1.3, "vendor": "php", "version": "5.3.9" }, { "model": "php", "scope": "eq", "trust": 1.3, "vendor": "php", "version": "5.3.3" }, { "model": "php", "scope": "eq", "trust": 1.3, "vendor": "php", "version": "5.3.6" }, { "model": "php", "scope": "eq", "trust": 1.3, "vendor": "php", "version": "5.3.5" }, { "model": "php", "scope": "eq", "trust": 1.3, "vendor": "php", "version": "5.3.4" }, { "model": "php", "scope": "eq", "trust": 1.3, "vendor": "php", "version": "5.3.7" }, { "model": "php", "scope": "eq", "trust": 1.3, "vendor": "php", "version": "5.4.1" }, { "model": "php", "scope": "eq", "trust": 1.3, "vendor": "php", "version": "5.3.2" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "5.2.7" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "4.4.4" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "5.0.3" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "4.0.2" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "4.3.11" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "4.4.3" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "3.0" }, { "model": "php", "scope": "lte", "trust": 1.0, "vendor": "php", "version": "5.3.12" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "4.4.8" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "5.2.2" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "5.0.2" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "3.0.5" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "4.0" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "4.3.6" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "5.1.6" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "5.2.1" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "5.1.4" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "2.0" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "2.0b10" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "4.0.7" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "4.2.2" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "3.0.16" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "4.3.4" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "5.1.5" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "3.0.13" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "5.2.5" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "4.4.5" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "3.0.14" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "3.0.3" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "5.1.2" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "3.0.11" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "4.0.5" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "4.4.2" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "4.3.0" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "4.3.2" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "4.0.4" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "4.4.9" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "4.0.0" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "3.0.7" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "5.1.0" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "5.1.1" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "4.3.5" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "3.0.12" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "4.2.1" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "5.2.6" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "3.0.15" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "4.4.0" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "3.0.8" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "4.0.6" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "4.3.7" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "5.3.11" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "5.0.5" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "4.2.3" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "5.2.0" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "5.0.1" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "3.0.9" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "3.0.6" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "4.4.7" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "4.3.8" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "3.0.2" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "5.3.0" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "5.4.0" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "4.4.6" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "5.0.4" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "5.0.0" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "4.0.1" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "4.3.1" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "1.0" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "5.2.3" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "3.0.17" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "4.3.9" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "3.0.18" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "4.1.0" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "4.3.10" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "4.4.1" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "4.1.2" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "4.1.1" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "4.2.0" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "5.1.3" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "4.3.3" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "3.0.1" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "5.2.4" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "4.0.3" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "3.0.10" }, { "model": "php", "scope": "eq", "trust": 1.0, "vendor": "php", "version": "3.0.4" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "the php group", "version": null }, { "model": "hp system management homepage", "scope": "lte", "trust": 0.8, "vendor": "hewlett packard", "version": "7.2.0 and earlier (linux windows)" }, { "model": "hp-ux web server suite", "scope": "lte", "trust": 0.8, "vendor": "hewlett packard", "version": "3.24 and earlier" }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.8.1" }, { "model": "mac os x server", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.7 to v10.7.4" }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.6.8" }, { "model": "mac os x server", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.6.8" }, { "model": "php", "scope": "lt", "trust": 0.8, "vendor": "the php group", "version": "5.4.x" }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.7 to v10.7.4" }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.8" }, { "model": "php", "scope": "eq", "trust": 0.8, "vendor": "the php group", "version": "5.4.3" }, { "model": "plesk panel", "scope": "eq", "trust": 0.3, "vendor": "parallels", "version": "9.5.4" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.10" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.2" }, { "model": "enterprise linux hpc node optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "ip office application server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "8.1" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "6.2" }, { "model": "voice portal sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "linux enterprise sdk sp1", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11" }, { "model": "voice portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "linux enterprise server sp3 ltss", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "5" }, { "model": "enterprise linux server eus 6.1.z", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "enterprise linux server optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "enterprise linux long life server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5.3" }, { "model": "appliance server", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "3.0" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.3" }, { "model": "enterprise server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "5" }, { "model": "voice portal sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7" }, { "model": "ctpview", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "4.6" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.10" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.0" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.1" }, { "model": "aura communication manager utility services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "linux lts amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2011" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.8" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.5" }, { "model": "linux lts powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "ctpview", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "4.3" }, { "model": "aura messaging", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.3" }, { "model": "linux enterprise sdk sp4", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.4" }, { "model": "ctpview", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "4.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.8" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "11.4" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.04" }, { "model": "enterprise linux workstation optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "voice portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.8.1" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "aura communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "plesk panel", "scope": "eq", "trust": 0.3, "vendor": "parallels", "version": "9.3" }, { "model": "linux lts sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "ctpview 7.0r1", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "lotus foundations start 1.2.2b", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.1" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.1" }, { "model": "aura messaging", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "linux lts i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.04" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.2" }, { "model": "enterprise linux eus 5.6.z server", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.2" }, { "model": "system management homepage", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "7.2.1" }, { "model": "linux enterprise server sp1", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11" }, { "model": "aura session manager sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.4.2" }, { "model": "linux enterprise server sp4", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "ip office application server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "6" }, { "model": "lotus foundations start 1.2.2a", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "mac os", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "x10.7.5" }, { "model": "ctpview", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "4.5" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.1" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "enterprise linux desktop optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "aura communication manager utility services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2010.1" }, { "model": "voice portal sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "linux enterprise server sp2", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11" }, { "model": "voice portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1.2" }, { "model": "ip office application server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.0" }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": "linux enterprise sdk sp2", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "enterprise linux server optional eus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6.1" }, { "model": "linux lts i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "12.04" }, { "model": "enterprise linux hpc node", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "aura communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.1" }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "110" }, { "model": "voice portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "ip office application server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "8.0" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2011" }, { "model": "linux lts lpia", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.04" }, { "model": "php", "scope": "eq", "trust": 0.3, "vendor": "php", "version": "5.3.12" }, { "model": "ctpview", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "4.4" }, { "model": "enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "linux lts amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "12.04" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.04" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.0" }, { "model": "aura messaging", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.8" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.3" }, { "model": "linux enterprise server for vmware sp1", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.1.2" }, { "model": "mac os", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "x10.8.2" }, { "model": "linux enterprise server for vmware sp2", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11" }, { "model": "hp-ux b.11.31", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "aura communication manager utility services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "appliance server", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "3.0x64" }, { "model": "enterprise linux desktop workstation client", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "plesk panel", "scope": "eq", "trust": 0.3, "vendor": "parallels", "version": "9.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.1" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "client", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "2008" }, { "model": "plesk panel", "scope": "eq", "trust": 0.3, "vendor": "parallels", "version": "8.6" }, { "model": "plesk panel", "scope": "eq", "trust": 0.3, "vendor": "parallels", "version": "9.0" }, { "model": "ip office application server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.3" }, { "model": "lotus foundations start", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.2" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.1.1" }, { "model": "enterprise server x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "5" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.1" }, { "model": "enterprise linux server eus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6.0" }, { "model": "aura session manager sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "11x64" }, { "model": "system management homepage", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "7.1.1" }, { "model": "enterprise linux server optional eus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6.0" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "12.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.2" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2010.1" }, { "model": "php", "scope": "ne", "trust": 0.3, "vendor": "php", "version": "5.3.13" } ], "sources": [ { "db": "CERT/CC", "id": "VU#520827" }, { "db": "BID", "id": "53388" }, { "db": "JVNDB", "id": "JVNDB-2012-002392" }, { "db": "CNNVD", "id": "CNNVD-201205-109" }, { "db": "NVD", "id": "CVE-2012-2311" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:php:php", "vulnerable": true }, { "cpe22Uri": "cpe:/o:apple:mac_os_x", "vulnerable": true }, { "cpe22Uri": "cpe:/o:apple:mac_os_x_server", "vulnerable": true }, { "cpe22Uri": "cpe:/a:hp:system_management_homepage", "vulnerable": true }, { "cpe22Uri": "cpe:/a:hp:hp-ux_web_server_suite", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-002392" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "De Eindbazen", "sources": [ { "db": "BID", "id": "53388" } ], "trust": 0.3 }, "cve": "CVE-2012-2311", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2012-2311", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2012-2311", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2012-2311", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201205-109", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-002392" }, { "db": "CNNVD", "id": "CNNVD-201205-109" }, { "db": "NVD", "id": "CVE-2012-2311" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "sapi/cgi/cgi_main.c in PHP before 5.3.13 and 5.4.x before 5.4.3, when configured as a CGI script (aka php-cgi), does not properly handle query strings that contain a %3D sequence but no = (equals sign) character, which allows remote attackers to execute arbitrary code by placing command-line options in the query string, related to lack of skipping a certain php_getopt for the \u0027d\u0027 case. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-1823. PHP-CGI-based setups contain a vulnerability when parsing query string parameters from php files. This vulnerability CVE-2012-1823 Vulnerability due to insufficient fix for.A third party could execute arbitrary code by placing command line options in the query string. PHP is prone to an information-disclosure vulnerability. \nExploiting this issue allows remote attackers to view the source code of files in the context of the server process. This may allow the attacker to obtain sensitive information and to run arbitrary PHP code on the affected computer; other attacks are also possible. ----------------------------------------------------------------------\n\nBecome a PSI 3.0 beta tester!\nTest-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. \nDownload it here!\nhttp://secunia.com/psi_30_beta_launch\n\n----------------------------------------------------------------------\n\nTITLE:\nUbuntu update for php\n\nSECUNIA ADVISORY ID:\nSA49097\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/49097/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=49097\n\nRELEASE DATE:\n2012-05-07\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/49097/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/49097/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=49097\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nUbuntu has issued an update for php. This fixes a vulnerability,\nwhich can be exploited by malicious people to disclose certain\nsensitive information or compromise a vulnerable system. \n\nFor more information:\nSA49014\n\nSOLUTION:\nApply updated packages. \n\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nORIGINAL ADVISORY:\nUSN-1437-1:\nhttp://www.ubuntu.com/usn/usn-1437-1/\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. \n\nAdditionally, this update fixes insufficient validation of upload\nname which lead to corrupted $_FILES indices. \n\nFor the stable distribution (squeeze), this problem has been fixed in\nversion 5.3.3-7+squeeze9. \n\nThe testing distribution (wheezy) will be fixed soon. \n\nFor the unstable distribution (sid), this problem has been fixed in\nversion 5.4.3-1. \n\nWe recommend that you upgrade your php5 packages. \n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: http://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.12 (GNU/Linux)\n\niQEcBAEBAgAGBQJPqqf3AAoJEOxfUAG2iX57MqcIALyiggqZ6SR+lOtdAd7npKd3\nlZ3nXZVUvyC5e4/gageT3s2BlmuipGIrBvyraWR2TvAlNYIu7Ia6EMVsjG0T3gHu\niM2yB4+wCaV8CIHqzmyN9lDaotxVty9gQ8BdtJaZguwi9+Sw7KfaCw6CXTluqPkU\nOcdb7Saz7eVnNnVwTORxOCBnlIZDn4PbiW9tMLZawGTwNgdT/2lMS8czJGVmf/Oj\nj4c631zN1K8vlnctHCYQAS269nr9jwmEx0JKcWl5khc7XMi/SmcUG9xG4p5JpGrA\nZbBAySyLuxr9bdMA3I9Jqxmmq4uaGwpCH8DSfMJd5FHNXKfq7efnL1Hp5mOERHU=\n=snJW\n-----END PGP SIGNATURE-----\n\n_______________________________________________\nFull-Disclosure - We believe in it. \nCharter: http://lists.grok.org.uk/full-disclosure-charter.html\nHosted and sponsored by Secunia - http://secunia.com/\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nNote: the current version of the following document is available here:\nhttps://h20566.www2.hp.com/portal/site/hpsc/public/kb/\ndocDisplay?docId=emr_na-c03368475\n\nSUPPORT COMMUNICATION - SECURITY BULLETIN\n\nDocument ID: c03368475\nVersion: 1\n\nHPSBUX02791 SSRT100856 rev.1 - HP-UX Apache Web Server running PHP, Remote\nExecution of Arbitrary Code, Privilege Elevation, Denial of Service (DoS)\n\nNOTICE: The information in this Security Bulletin should be acted upon as\nsoon as possible. \n\nRelease Date: 2012-06-14\nLast Updated: 2012-06-14\n\nPotential Security Impact: Remote execution of arbitrary code, privilege\nelevation, or Denial of Service (DoS). \n\nSource: Hewlett-Packard Company, HP Software Security Response Team\n\nVULNERABILITY SUMMARY\nPotential security vulnerabilities have been identified with HP-UX Apache Web\nServer running PHP. These vulnerabilities could be exploited remotely to\nexecute arbitrary code, elevate privileges, or create a Denial of Service\n(DoS). PHP is contained in the HP-UX Apache Web Server Suite. \n\nReferences: CVE-2011-4153, CVE-2012-0830, CVE-2012-0883, CVE-2012-1172,\nCVE-2012-1823, CVE-2012-2311\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \nHP-UX B.11.23, B.11.31 running HP-UX Apache Web Server Suite v3.24 or earlier\n\nBACKGROUND\nFor a PGP signed\n\nCVSS 2.0 Base Metrics\n===========================================================\n Reference Base Vector Base Score\nCVE-2011-4153 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0\nCVE-2012-0830 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5\nCVE-2012-0883 (AV:L/AC:M/Au:N/C:C/I:C/A:C) 6.9\nCVE-2012-1172 (AV:N/AC:M/Au:N/C:N/I:P/A:P) 5.8\nCVE-2012-1823 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5\nCVE-2012-2311 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5\n===========================================================\n Information on CVSS is documented\n in HP Customer Notice: HPSN-2008-002\n\nRESOLUTION\n\nHP has provided the following software updates to resolve the\nvulnerabilities. \nThe updates are available for download from http://software.hp.com\n\nHP-UX Web Server Suite v.3.24 containing Apache v2.2.15.13 and PHP v5.2.17\nHP-UX 11i Release\n Apache Depot name\n\nB.11.23 (32-bit)\n HPUXWS22ATW-B324-32\n\nB.11.23 (64-bit)\n HPUXWS22ATW-B324-64\n\nB.11.31 (32-bit)\n HPUXWS22ATW-B324-32\n\nB.11.31 (64-bit)\n HPUXWS22ATW-B324-64\n\nMANUAL ACTIONS: Yes - Update\nInstall HP-UX Web Server Suite v3.24 or subsequent. \n\nPRODUCT SPECIFIC INFORMATION\n\nHP-UX Software Assistant: HP-UX Software Assistant is an enhanced application\nthat replaces HP-UX Security Patch Check. It analyzes all Security Bulletins\nissued by HP and lists recommended actions that may apply to a specific HP-UX\nsystem. It can also download patches and create a depot automatically. For\nmore information see https://www.hp.com/go/swa\n\nThe following text is for use by the HP-UX Software Assistant. \nHP-UX Web Server Suite v3.24\nAFFECTED VERSIONS\n\nHP-UX B.11.23\n==============\nhpuxws22APCH32.APACHE\nhpuxws22APCH32.APACHE2\nhpuxws22APCH32.AUTH_LDAP\nhpuxws22APCH32.AUTH_LDAP2\nhpuxws22APCH32.MOD_JK\nhpuxws22APCH32.MOD_JK2\nhpuxws22APCH32.MOD_PERL\nhpuxws22APCH32.MOD_PERL2\nhpuxws22APCH32.PHP\nhpuxws22APCH32.PHP2\nhpuxws22APCH32.WEBPROXY\nhpuxws22APCH32.WEBPROXY2\nhpuxws22APACHE.APACHE\nhpuxws22APACHE.APACHE2\nhpuxws22APACHE.AUTH_LDAP\nhpuxws22APACHE.AUTH_LDAP2\nhpuxws22APACHE.MOD_JK\nhpuxws22APACHE.MOD_JK2\nhpuxws22APACHE.MOD_PERL\nhpuxws22APACHE.MOD_PERL2\nhpuxws22APACHE.PHP\nhpuxws22APACHE.PHP2\nhpuxws22APACHE.WEBPROXY\nhpuxws22APACHE.WEBPROXY2\naction: install revision B.2.2.15.13 or subsequent\n\nHP-UX B.11.31\n==================\nhpuxws22APCH32.APACHE\nhpuxws22APCH32.APACHE2\nhpuxws22APCH32.AUTH_LDAP\nhpuxws22APCH32.AUTH_LDAP2\nhpuxws22APCH32.MOD_JK\nhpuxws22APCH32.MOD_JK2\nhpuxws22APCH32.MOD_PERL\nhpuxws22APCH32.MOD_PERL2\nhpuxws22APCH32.PHP\nhpuxws22APCH32.PHP2\nhpuxws22APCH32.WEBPROXY\nhpuxws22APCH32.WEBPROXY2\nhpuxws22APACHE.APACHE\nhpuxws22APACHE.APACHE2\nhpuxws22APACHE.AUTH_LDAP\nhpuxws22APACHE.AUTH_LDAP2\nhpuxws22APACHE.MOD_JK\nhpuxws22APACHE.MOD_JK2\nhpuxws22APACHE.MOD_PERL\nhpuxws22APACHE.MOD_PERL2\nhpuxws22APACHE.PHP\nhpuxws22APACHE.PHP2\nhpuxws22APACHE.WEBPROXY\nhpuxws22APACHE.WEBPROXY2\n\naction: install revision B.2.2.15.13 or subsequent\n\nEND AFFECTED VERSIONS\n\nHISTORY\nVersion:1 (rev.1) - 14 June 2012 Initial release\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running HP software products should be applied in\naccordance with the customer\u0027s patch management policy. \n\nSupport: For issues about implementing the recommendations of this Security\nBulletin, contact normal HP Services support channel. For other issues about\nthe content of this Security Bulletin, send e-mail to security-alert@hp.com. \n\nReport: To report a potential security vulnerability with any HP supported\nproduct, send Email to: security-alert@hp.com\n\nSubscribe: To initiate a subscription to receive future HP Security Bulletin\nalerts via Email:\nhttp://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins\n\nSecurity Bulletin List: A list of HP Security Bulletins, updated\nperiodically, is contained in HP Security Notice HPSN-2011-001:\nhttps://h20566.www2.hp.com/portal/site/hpsc/public/kb/\ndocDisplay?docId=emr_na-c02964430\n\nSecurity Bulletin Archive: A list of recently released Security Bulletins is\navailable here:\nhttp://h20566.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/\n\nSoftware Product Category: The Software Product Category is represented in\nthe title by the two characters following HPSB. \n\n3C = 3COM\n3P = 3rd Party Software\nGN = HP General Software\nHF = HP Hardware and Firmware\nMP = MPE/iX\nMU = Multi-Platform Software\nNS = NonStop Servers\nOV = OpenVMS\nPI = Printing and Imaging\nPV = ProCurve\nST = Storage Software\nTU = Tru64 UNIX\nUX = HP-UX\n\nCopyright 2012 Hewlett-Packard Development Company, L.P. \nHewlett-Packard Company shall not be liable for technical or editorial errors\nor omissions contained herein. The information provided is provided \"as is\"\nwithout warranty of any kind. To the extent permitted by law, neither HP or\nits affiliates, subcontractors or suppliers will be liable for\nincidental,special or consequential damages including downtime cost; lost\nprofits;damages relating to the procurement of substitute products or\nservices; or damages for loss of data, or software restoration. The\ninformation in this document is subject to change without notice. \nHewlett-Packard Company and the names of Hewlett-Packard products referenced\nherein are trademarks of Hewlett-Packard Company in the United States and\nother countries. Other product and company names mentioned herein may be\ntrademarks of their respective owners. \n\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.10 (GNU/Linux)\n\niEYEARECAAYFAk/f0GcACgkQ4B86/C0qfVnCEwCfWX2UX+TvBNeJawjexLmPtwjt\n1TEAnj7Q3fqZkor5ilSKlW2dNHa1f4aO\n=pEB+\n-----END PGP SIGNATURE-----\n. \nHP System Management Homepage (SMH) v7.2.0 and earlier running on Linux and\nWindows. Content-Disposition: inline\n\n==========================================================================Ubuntu Security Notice USN-1437-1\nMay 04, 2012\n\nphp5 vulnerability\n==========================================================================\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 12.04 LTS\n- Ubuntu 11.10\n- Ubuntu 11.04\n- Ubuntu 10.04 LTS\n- Ubuntu 8.04 LTS\n\nSummary:\n\nStandalone PHP CGI scripts could be made to execute arbitrary code with\nthe privilege of the web server. \n\nSoftware Description:\n- php5: HTML-embedded scripting language interpreter\n\nDetails:\n\nIt was discovered that PHP, when used as a stand alone CGI processor\nfor the Apache Web Server, did not properly parse and filter query\nstrings. Configurations using\nmod_php5 and FastCGI were not vulnerable. \n\nThis update addresses the issue when the PHP CGI interpreter\nis configured using mod_cgi and mod_actions as described\nin /usr/share/doc/php5-cgi/README.Debian.gz; however,\nif an alternate configuration is used to enable PHP CGI\nprocessing, it should be reviewed to ensure that command line\narguments cannot be passed to the PHP interpreter. Please see\nhttp://people.canonical.com/~ubuntu-security/cve/2012/CVE-2012-2311.html\nfor more details and potential mitigation approaches. \n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 12.04 LTS:\n php5-cgi 5.3.10-1ubuntu3.1\n\nUbuntu 11.10:\n php5-cgi 5.3.6-13ubuntu3.7\n\nUbuntu 11.04:\n php5-cgi 5.3.5-1ubuntu7.8\n\nUbuntu 10.04 LTS:\n php5-cgi 5.3.2-1ubuntu4.15\n\nUbuntu 8.04 LTS:\n php5-cgi 5.2.4-2ubuntu5.24\n\nIn general, a standard system update will make all the necessary changes", "sources": [ { "db": "NVD", "id": "CVE-2012-2311" }, { "db": "CERT/CC", "id": "VU#520827" }, { "db": "JVNDB", "id": "JVNDB-2012-002392" }, { "db": "BID", "id": "53388" }, { "db": "PACKETSTORM", "id": "112515" }, { "db": "PACKETSTORM", "id": "112580" }, { "db": "PACKETSTORM", "id": "113905" }, { "db": "PACKETSTORM", "id": "115853" }, { "db": "PACKETSTORM", "id": "122482" }, { "db": "PACKETSTORM", "id": "112474" } ], "trust": 3.15 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2012-2311", "trust": 4.0 }, { "db": "CERT/CC", "id": "VU#520827", "trust": 3.5 }, { "db": "SECUNIA", "id": "49014", "trust": 1.6 }, { "db": "SECUNIA", "id": "49085", "trust": 1.6 }, { "db": "SECTRACK", "id": "1027022", "trust": 1.6 }, { "db": "JVNDB", "id": "JVNDB-2012-002392", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201205-109", "trust": 0.6 }, { "db": "JUNIPER", "id": "JSA10658", "trust": 0.3 }, { "db": "CERT/CC", "id": "VU#673343", "trust": 0.3 }, { "db": "BID", "id": "53388", "trust": 0.3 }, { "db": "SECUNIA", "id": "49097", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "112515", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "112580", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "113905", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "115853", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "122482", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "112474", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#520827" }, { "db": "BID", "id": "53388" }, { "db": "JVNDB", "id": "JVNDB-2012-002392" }, { "db": "PACKETSTORM", "id": "112515" }, { "db": "PACKETSTORM", "id": "112580" }, { "db": "PACKETSTORM", "id": "113905" }, { "db": "PACKETSTORM", "id": "115853" }, { "db": "PACKETSTORM", "id": "122482" }, { "db": "PACKETSTORM", "id": "112474" }, { "db": "CNNVD", "id": "CNNVD-201205-109" }, { "db": "NVD", "id": "CVE-2012-2311" } ] }, "id": "VAR-201205-0246", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.47077376 }, "last_update_date": "2024-11-29T21:27:25.479000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "APPLE-SA-2012-09-19-2", "trust": 0.8, "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html" }, { "title": "HT5501", "trust": 0.8, "url": "http://support.apple.com/kb/HT5501" }, { "title": "HT5501", "trust": 0.8, "url": "http://support.apple.com/kb/HT5501?viewlocale=ja_JP" }, { "title": "HPSBMU02900 SSRT100992", "trust": 0.8, "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03839862" }, { "title": "HPSBUX02791 SSRT100856", "trust": 0.8, "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03368475" }, { "title": "openSUSE-SU-2012:0866", "trust": 0.8, "url": "http://lists.opensuse.org/opensuse-updates/2012-07/msg00027.html" }, { "title": "Sec Bug #61910", "trust": 0.8, "url": "https://bugs.php.net/bug.php?id=61910" }, { "title": "Return to Bug #61910", "trust": 0.8, "url": "https://bugs.php.net/patch-display.php?bug_id=61910\u0026patch=cgi.diff-fix-check.patch\u0026revision=1336093719\u0026display=1" }, { "title": "PHP 5.3.12 and PHP 5.4.2 Released!", "trust": 0.8, "url": "http://www.php.net/archive/2012.php#id2012-05-08-1" }, { "title": "PHP 5 ChangeLog - Version 5.4.3", "trust": 0.8, "url": "http://www.php.net/ChangeLog-5.php#5.4.3" }, { "title": "PHP 5.4.3", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=43186" }, { "title": "PHP 5.4.3", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=43185" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-002392" }, { "db": "CNNVD", "id": "CNNVD-201205-109" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-89", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-002392" }, { "db": "NVD", "id": "CVE-2012-2311" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.7, "url": "http://eindbazen.net/2012/05/php-cgi-advisory-cve-2012-1823/" }, { "trust": 2.7, "url": "http://www.kb.cert.org/vuls/id/520827" }, { "trust": 2.4, "url": "http://www.php.net/archive/2012.php#id2012-05-08-1" }, { "trust": 2.2, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c03839862" }, { "trust": 1.6, "url": "http://www.securitytracker.com/id?1027022" }, { "trust": 1.6, "url": "http://lists.apple.com/archives/security-announce/2012/sep/msg00004.html" }, { "trust": 1.6, "url": "http://marc.info/?l=bugtraq\u0026m=134012830914727\u0026w=2" }, { "trust": 1.6, "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00002.html" }, { "trust": 1.6, "url": "https://bugs.php.net/bug.php?id=61910" }, { "trust": 1.6, "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00007.html" }, { "trust": 1.6, "url": "http://support.apple.com/kb/ht5501" }, { "trust": 1.6, "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00011.html" }, { "trust": 1.6, "url": "http://secunia.com/advisories/49085" }, { "trust": 1.6, "url": "http://www.php.net/changelog-5.php#5.4.3" }, { "trust": 1.6, "url": "https://bugs.php.net/patch-display.php?bug_id=61910\u0026patch=cgi.diff-fix-check.patch\u0026revision=1336093719\u0026display=1" }, { "trust": 1.6, "url": "http://www.debian.org/security/2012/dsa-2465" }, { "trust": 1.6, "url": "http://secunia.com/advisories/49014" }, { "trust": 1.1, "url": "http://www.php.net/" }, { "trust": 1.1, "url": "http://www.php.net/archive/2012.php#id2012-05-03-1" }, { "trust": 0.8, "url": "http://www.php.net/manual/en/security.cgi-bin.php" }, { "trust": 0.8, "url": "http://www.symantec.com/connect/blogs/linux-worm-targeting-hidden-devices" }, { "trust": 0.8, "url": "http://php.net/changelog-5.php" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-2311" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu520827/index.html" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu381963/index.html" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-2311" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-2311" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1823" }, { "trust": 0.3, "url": "http://alerts.hp.com/r?2.1.3kt.2zr.xg7ek.hmj%2asm..t.a4jy.6o9k.bw89mq%5f%5fdmtsfto0" }, { "trust": 0.3, "url": "http://www-01.ibm.com/software/lotus/products/foundations/start/" }, { "trust": 0.3, "url": "http://kb.parallels.com/en/113818" }, { "trust": 0.3, "url": "kb.parallels.com/en/116241" }, { "trust": 0.3, "url": "https://community.rapid7.com/thread/5174" }, { "trust": 0.3, "url": "http://seclists.org/fulldisclosure/2013/jun/21" }, { "trust": 0.3, "url": "http://ompldr.org/vzgxxaq" }, { "trust": 0.3, "url": "http://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10658\u0026cat=sirt_1\u0026actp=list" }, { "trust": 0.3, "url": "https://downloads.avaya.com/css/p8/documents/100162699" }, { "trust": 0.3, "url": "https://downloads.avaya.com/css/p8/documents/100165255" }, { "trust": 0.3, "url": "http://www.h-online.com/security/news/item/critical-open-hole-in-php-creates-risks-update-1567532.html" }, { "trust": 0.3, "url": "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?objectid=c03360041" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21620314" }, { "trust": 0.3, "url": "http://www.turbolinux.co.jp/security-e/2012/tlsa-2012-14.txt" }, { "trust": 0.3, "url": "http://www.kb.cert.org/vuls/id/673343" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1172" }, { "trust": 0.3, "url": "http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0883" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0830" }, { "trust": 0.2, "url": "http://software.hp.com" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-4153" }, { "trust": 0.2, "url": "http://h20566.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/" }, { "trust": 0.2, "url": "https://www.hp.com/go/swa" }, { "trust": 0.2, "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/" }, { "trust": 0.1, "url": "http://www.ubuntu.com/usn/usn-1437-1/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/49097/#comments" }, { "trust": 0.1, "url": "http://secunia.com/psi_30_beta_launch" }, { "trust": 0.1, "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=49097" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_intelligence/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/49097/" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_scanning/personal/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/advisories/about_secunia_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/" }, { "trust": 0.1, "url": "http://www.debian.org/security/faq" }, { "trust": 0.1, "url": "http://www.debian.org/security/" }, { "trust": 0.1, "url": "http://lists.grok.org.uk/full-disclosure-charter.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-2358" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-2357" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-2362" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-2361" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-2364" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-2363" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-2359" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-2329" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-5217" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-2335" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3389" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-2356" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-2110" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-2336" }, { "trust": 0.1, "url": "http://h18013.www1.hp.com/products/servers/management/agents/index.html" }, { "trust": 0.1, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/" }, { "trust": 0.1, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-2355" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-2360" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/php5/5.3.5-1ubuntu7.8" }, { "trust": 0.1, "url": "http://people.canonical.com/~ubuntu-security/cve/2012/cve-2012-2311.html" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/php5/5.3.10-1ubuntu3.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/php5/5.2.4-2ubuntu5.24" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/php5/5.3.2-1ubuntu4.15" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/php5/5.3.6-13ubuntu3.7" }, { "trust": 0.1, "url": "http://www.ubuntu.com/usn/usn-1437-1" } ], "sources": [ { "db": "CERT/CC", "id": "VU#520827" }, { "db": "BID", "id": "53388" }, { "db": "JVNDB", "id": "JVNDB-2012-002392" }, { "db": "PACKETSTORM", "id": "112515" }, { "db": "PACKETSTORM", "id": "112580" }, { "db": "PACKETSTORM", "id": "113905" }, { "db": "PACKETSTORM", "id": "115853" }, { "db": "PACKETSTORM", "id": "122482" }, { "db": "PACKETSTORM", "id": "112474" }, { "db": "CNNVD", "id": "CNNVD-201205-109" }, { "db": "NVD", "id": "CVE-2012-2311" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#520827" }, { "db": "BID", "id": "53388" }, { "db": "JVNDB", "id": "JVNDB-2012-002392" }, { "db": "PACKETSTORM", "id": "112515" }, { "db": "PACKETSTORM", "id": "112580" }, { "db": "PACKETSTORM", "id": "113905" }, { "db": "PACKETSTORM", "id": "115853" }, { "db": "PACKETSTORM", "id": "122482" }, { "db": "PACKETSTORM", "id": "112474" }, { "db": "CNNVD", "id": "CNNVD-201205-109" }, { "db": "NVD", "id": "CVE-2012-2311" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-05-03T00:00:00", "db": "CERT/CC", "id": "VU#520827" }, { "date": "2012-05-04T00:00:00", "db": "BID", "id": "53388" }, { "date": "2012-05-14T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-002392" }, { "date": "2012-05-08T04:16:46", "db": "PACKETSTORM", "id": "112515" }, { "date": "2012-05-10T03:59:25", "db": "PACKETSTORM", "id": "112580" }, { "date": "2012-06-19T18:22:00", "db": "PACKETSTORM", "id": "113905" }, { "date": "2012-08-24T01:40:32", "db": "PACKETSTORM", "id": "115853" }, { "date": "2013-07-19T19:33:00", "db": "PACKETSTORM", "id": "122482" }, { "date": "2012-05-06T01:28:45", "db": "PACKETSTORM", "id": "112474" }, { "date": "2012-05-08T00:00:00", "db": "CNNVD", "id": "CNNVD-201205-109" }, { "date": "2012-05-11T10:15:48.107000", "db": "NVD", "id": "CVE-2012-2311" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-12-02T00:00:00", "db": "CERT/CC", "id": "VU#520827" }, { "date": "2015-04-13T22:15:00", "db": "BID", "id": "53388" }, { "date": "2014-02-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-002392" }, { "date": "2023-04-21T00:00:00", "db": "CNNVD", "id": "CNNVD-201205-109" }, { "date": "2024-11-21T01:38:51.737000", "db": "NVD", "id": "CVE-2012-2311" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "112474" }, { "db": "CNNVD", "id": "CNNVD-201205-109" } ], "trust": 0.7 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "PHP-CGI query string parameter vulnerability", "sources": [ { "db": "CERT/CC", "id": "VU#520827" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "SQL injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-201205-109" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.