cvelist/2009/4xxx/CVE-2009-4018.json

148 lines
5.2 KiB
JSON

{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2009-4018",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
},
"vendor_name" : "n/a"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "The proc_open function in ext/standard/proc_open.c in PHP before 5.2.11 and 5.3.x before 5.3.1 does not enforce the (1) safe_mode_allowed_env_vars and (2) safe_mode_protected_env_vars directives, which allows context-dependent attackers to execute programs with an arbitrary environment via the env parameter, as demonstrated by a crafted value of the LD_LIBRARY_PATH environment variable."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"name" : "[oss-security] 20091122 Re: CVE request: php 5.3.1 update",
"refsource" : "MLIST",
"url" : "http://marc.info/?l=oss-security&m=125886770008678&w=2"
},
{
"name" : "[oss-security] 20091123 Re: CVE request: php 5.3.1 - proc_open() bypass PHP Bug #49026 [was: Re: CVE request: php 5.3.1 update]",
"refsource" : "MLIST",
"url" : "http://marc.info/?l=oss-security&m=125897935330618&w=2"
},
{
"name" : "[oss-security] 20091123 Re: CVE request: php 5.3.1 - proc_open() bypass PHP Bug #49026 [was: Re: CVE request: php 5.3.1 update]",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2009/11/23/15"
},
{
"name" : "http://bugs.php.net/bug.php?id=49026",
"refsource" : "CONFIRM",
"url" : "http://bugs.php.net/bug.php?id=49026"
},
{
"name" : "http://svn.php.net/viewvc/?view=revision&revision=286360",
"refsource" : "CONFIRM",
"url" : "http://svn.php.net/viewvc/?view=revision&revision=286360"
},
{
"name" : "http://svn.php.net/viewvc/php/php-src/branches/PHP_5_2/ext/standard/proc_open.c?r1=286360&r2=286359&pathrev=286360",
"refsource" : "CONFIRM",
"url" : "http://svn.php.net/viewvc/php/php-src/branches/PHP_5_2/ext/standard/proc_open.c?r1=286360&r2=286359&pathrev=286360"
},
{
"name" : "http://svn.php.net/viewvc/php/php-src/branches/PHP_5_3/ext/standard/proc_open.c?r1=286360&r2=286359&pathrev=286360",
"refsource" : "CONFIRM",
"url" : "http://svn.php.net/viewvc/php/php-src/branches/PHP_5_3/ext/standard/proc_open.c?r1=286360&r2=286359&pathrev=286360"
},
{
"name" : "http://www.php.net/ChangeLog-5.php",
"refsource" : "CONFIRM",
"url" : "http://www.php.net/ChangeLog-5.php"
},
{
"name" : "HPSBUX02543",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=127680701405735&w=2"
},
{
"name" : "SSRT100152",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=127680701405735&w=2"
},
{
"name" : "HPSBMA02568",
"refsource" : "HP",
"url" : "http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02512995"
},
{
"name" : "SSRT100219",
"refsource" : "HP",
"url" : "http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02512995"
},
{
"name" : "MDVSA-2009:303",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2009:303"
},
{
"name" : "37138",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/37138"
},
{
"name" : "oval:org.mitre.oval:def:7256",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7256"
},
{
"name" : "40262",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/40262"
},
{
"name" : "41480",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/41480"
},
{
"name" : "41490",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/41490"
}
]
}
}