"value":"The php_check_safe_mode_include_dir function in fopen_wrappers.c of PHP 4.3.x returns a success value (0) when the safe_mode_include_dir variable is not specified in configuration, which differs from the previous failure value and may allow remote attackers to exploit file include vulnerabilities in PHP applications."
},
{
"lang":"es",
"value":"La funci\u00f3n php_check_safe_module_include_dir en fopen_wrappers.c de PHP 4.3.x devuelve una valor de \u00e9xito (0) cuando la variable safe_mode_include_dir no est\u00e1 especificada en la configuraci\u00f3n, lo que difiere del valor de fallo anterior y puede permitir a atacantes remotos explotar vulnerabilidades de inclusi\u00f3n de ficheros en aplicaciones PHP."
}
],
"vendorComments":[
{
"organization":"Red Hat",
"comment":"Not vulnerable. This issue did not affect the versions of PHP as shipped with Red Hat Enterprise Linux 2.1. The PHP packages in Red Hat Enterprise Linux 3 contain a backported patch to address this issue since release. \n\nThe issue was fixed upstream in PHP 4.3.3. The PHP packages in Red Hat Enterprise Linux 4 and 5 are based on fixed upstream versions.\n",