{ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2009-4023", "STATE" : "PUBLIC" }, "affects" : { "vendor" : { "vendor_data" : [ { "product" : { "product_data" : [ { "product_name" : "n/a", "version" : { "version_data" : [ { "version_value" : "n/a" } ] } } ] }, "vendor_name" : "n/a" } ] } }, "data_format" : "MITRE", "data_type" : "CVE", "data_version" : "4.0", "description" : { "description_data" : [ { "lang" : "eng", "value" : "Argument injection vulnerability in the sendmail implementation of the Mail::Send method (Mail/sendmail.php) in the Mail package 1.1.14 for PEAR allows remote attackers to read and write arbitrary files via a crafted $from parameter, a different vector than CVE-2009-4111." } ] }, "problemtype" : { "problemtype_data" : [ { "description" : [ { "lang" : "eng", "value" : "n/a" } ] } ] }, "references" : { "reference_data" : [ { "name" : "[oss-security] 20091123 CVE request: Argument injections in multiple PEAR packages", "refsource" : "MLIST", "url" : "http://www.openwall.com/lists/oss-security/2009/11/23/8" }, { "name" : "http://pear.php.net/bugs/bug.php?id=16200", "refsource" : "CONFIRM", "url" : "http://pear.php.net/bugs/bug.php?id=16200" }, { "name" : "http://pear.php.net/bugs/bug.php?id=16200&edit=12&patch=quick-fix&revision=1241757412", "refsource" : "CONFIRM", "url" : "http://pear.php.net/bugs/bug.php?id=16200&edit=12&patch=quick-fix&revision=1241757412" }, { "name" : "http://svn.php.net/viewvc/pear/packages/Mail/trunk/Mail/sendmail.php?r1=243717&r2=280134", "refsource" : "CONFIRM", "url" : "http://svn.php.net/viewvc/pear/packages/Mail/trunk/Mail/sendmail.php?r1=243717&r2=280134" }, { "name" : "https://bugs.gentoo.org/show_bug.cgi?id=294256", "refsource" : "CONFIRM", "url" : "https://bugs.gentoo.org/show_bug.cgi?id=294256" }, { "name" : "DSA-1938", "refsource" : "DEBIAN", "url" : "http://www.debian.org/security/2009/dsa-1938" }, { "name" : "SUSE-SR:2010:020", "refsource" : "SUSE", "url" : "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00001.html" }, { "name" : "37081", "refsource" : "BID", "url" : "http://www.securityfocus.com/bid/37081" }, { "name" : "37410", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/37410" }, { "name" : "37458", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/37458" }, { "name" : "ADV-2009-3300", "refsource" : "VUPEN", "url" : "http://www.vupen.com/english/advisories/2009/3300" }, { "name" : "pear-from-security-bypass(54362)", "refsource" : "XF", "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/54362" } ] } }