vendor:
PHP
by:
Not mentioned
7.5
CVSS
HIGH
Code Execution
119, 122, 264, 377
CWE
Product Name: PHP
Affected Version From: PHP4, PHP5
Affected Version To: Not mentioned
Patch Exists: YES
Related CWE: CVE-2005-1751, CVE-2005-1752, CVE-2005-3390, CVE-2005-3391, CVE-2005-3392, CVE-2005-3393
CPE: a:php:php:4, cpe:/a:php:php:5
Metasploit:
https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2005-1759/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2005-1751/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2005-831/, https://www.rapid7.com/db/vulnerabilities/php-cve-2005-3390/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2005-838/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2005-3390/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2005-3390/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-CESA-2005-831/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-CESA-2005-838/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2005-3391/, https://www.rapid7.com/db/vulnerabilities/php-cve-2005-3391/, https://www.rapid7.com/db/vulnerabilities/apple-osx-apachemodphp-cve-2005-3391/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2005-3391/, https://www.rapid7.com/db/vulnerabilities/apple-osx-apachemodphp-cve-2005-3392/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2005-3392/, https://www.rapid7.com/db/vulnerabilities/php-cve-2005-3392/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2005-3392/, https://www.rapid7.com/db/vulnerabilities/freebsd-vid-6129fdc7-6462-456d-a3ef-8fc3fbf44d16/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2005-3393/
Platforms Tested: Not mentioned
2005
Multiple vulnerabilities in PHP4 and PHP5
PHP4 and PHP5 are reported prone to multiple local and remote vulnerabilities that may lead to code execution within the context of the vulnerable process. The vulnerabilities include a heap-based buffer overflow in the 'pack()' function, a heap-based memory disclosure in the 'unpack()' function, an access control bypass in 'safe_mode_exec_dir', an access control bypass in 'safe_mode', a 'realpath()' path truncation vulnerability, and a memory corruption vulnerability in the 'unserialize()' function.
Mitigation:
Apply the vendor-supplied patches or upgrade to a version that has addressed these vulnerabilities.