[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96174

 
 

909

 
 

78077

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2009-3294

Date: (C)2009-09-22   (M)2017-02-08
 
CVSS Score: 5.0Access Vector: NETWORK
Exploitability Subscore: 10.0Access Complexity: LOW
Impact Subscore: 2.9Authentication: NONE
 Confidentiality: NONE
 Integrity: NONE
 Availability: PARTIAL











The popen API function in TSRM/tsrm_win32.c in PHP before 5.2.11 and 5.3.x before 5.3.1, when running on certain Windows operating systems, allows context-dependent attackers to cause a denial of service (crash) via a crafted (1) "e" or (2) "er" string in the second argument (aka mode), possibly related to the _fdopen function in the Microsoft C runtime library. NOTE: this might not cross privilege boundaries except in rare cases in which the mode argument is accessible to an attacker outside of an application that uses the popen function.

Reference:
OSVDB-58188
http://www.openwall.com/lists/oss-security/2009/09/20/1
http://www.openwall.com/lists/oss-security/2009/11/20/2
http://www.openwall.com/lists/oss-security/2009/11/20/3
http://news.php.net/php.announce/79
http://bugs.php.net/bug.php?id=44683
http://svn.php.net/viewvc?view=revision&revision=287779
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-5.php#5.2.11
http://www.php.net/releases/5_2_11.php
http://www.php.net/releases/5_3_1.php

CPE    102
cpe:/a:php:php:5
cpe:/a:php:php:5.2.10
cpe:/a:php:php:5.2.3
cpe:/a:php:php:5.2.4
...
CWE    1
CWE-134

© 2013 SecPod Technologies