[Forgot Password]
Login  Register Subscribe

23631

 
 

126951

 
 

99602

 
 

909

 
 

80198

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2009-3294

Date: (C)2009-09-22   (M)2017-02-08 


The popen API function in TSRM/tsrm_win32.c in PHP before 5.2.11 and 5.3.x before 5.3.1, when running on certain Windows operating systems, allows context-dependent attackers to cause a denial of service (crash) via a crafted (1) "e" or (2) "er" string in the second argument (aka mode), possibly related to the _fdopen function in the Microsoft C runtime library. NOTE: this might not cross privilege boundaries except in rare cases in which the mode argument is accessible to an attacker outside of an application that uses the popen function.

CVSS Score: 5.0Access Vector: NETWORK
Exploit Score: 10.0Access Complexity: LOW
Impact Score: 2.9Authentication: NONE
 Confidentiality: NONE
 Integrity: NONE
 Availability: PARTIAL





Reference:
OSVDB-58188
http://www.openwall.com/lists/oss-security/2009/09/20/1
http://www.openwall.com/lists/oss-security/2009/11/20/2
http://www.openwall.com/lists/oss-security/2009/11/20/3
http://news.php.net/php.announce/79
http://bugs.php.net/bug.php?id=44683
http://svn.php.net/viewvc?view=revision&revision=287779
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-5.php#5.2.11
http://www.php.net/releases/5_2_11.php
http://www.php.net/releases/5_3_1.php

CPE    102
cpe:/a:php:php:5
cpe:/a:php:php:3.0
cpe:/a:php:php:4.3.4
cpe:/a:php:php:4.3.3
...
CWE    1
CWE-134

© 2013 SecPod Technologies