2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2008-0599" ,
"sourceIdentifier" : "secalert@redhat.com" ,
"published" : "2008-05-05T17:20:00.000" ,
2024-11-22 07:15:30 +00:00
"lastModified" : "2024-11-21T00:42:28.600" ,
"vulnStatus" : "Modified" ,
2024-12-08 03:06:42 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "The init_request_info function in sapi/cgi/cgi_main.c in PHP before 5.2.6 does not properly consider operator precedence when calculating the length of PATH_TRANSLATED, which might allow remote attackers to execute arbitrary code via a crafted URI."
} ,
{
"lang" : "es" ,
"value" : "La funci\u00f3n init_request_info en sapi/cgi/cgi_main.c en PHP en versiones anteriores a 5.2.6 no considera correctamente la precedencia del operador cuando calcula la longitud de PATH_TRANSLATED, lo que podr\u00edan permitir a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de una URI manipulada."
}
] ,
"metrics" : {
2024-02-02 15:00:28 +00:00
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" ,
2024-11-22 07:15:30 +00:00
"baseScore" : 9.8 ,
"baseSeverity" : "CRITICAL" ,
2024-02-02 15:00:28 +00:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
2024-11-22 07:15:30 +00:00
"availabilityImpact" : "HIGH"
2024-02-02 15:00:28 +00:00
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 5.9
}
] ,
2023-04-24 12:24:31 +02:00
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:N/C:C/I:C/A:C" ,
2024-11-22 07:15:30 +00:00
"baseScore" : 10.0 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "COMPLETE" ,
"integrityImpact" : "COMPLETE" ,
2024-11-22 07:15:30 +00:00
"availabilityImpact" : "COMPLETE"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "HIGH" ,
"exploitabilityScore" : 10.0 ,
"impactScore" : 10.0 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : true ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
2024-02-02 15:00:28 +00:00
"value" : "CWE-131"
2023-04-24 12:24:31 +02:00
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*" ,
2024-02-02 15:00:28 +00:00
"versionEndExcluding" : "5.2.6" ,
"matchCriteriaId" : "AB713389-B8D4-459B-8DA4-43F9DEB44B8A"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
2023-04-24 12:24:31 +02:00
{
"vulnerable" : true ,
2024-02-02 15:00:28 +00:00
"criteria" : "cpe:2.3:o:fedoraproject:fedora:8:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "72E4DB7F-07C3-46BB-AAA2-05CD0312C57F"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2024-02-02 15:00:28 +00:00
"criteria" : "cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "743CBBB1-C140-4FEF-B40E-FAE4511B1140"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
2023-04-24 12:24:31 +02:00
{
"vulnerable" : true ,
2024-02-02 15:00:28 +00:00
"criteria" : "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "454A5D17-B171-4F1F-9E0B-F18D1E5CA9FD"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2024-02-02 15:00:28 +00:00
"criteria" : "cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6EBDAFF8-DE44-4E80-B6BD-E341F767F501"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2024-02-02 15:00:28 +00:00
"criteria" : "cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "823BF8BE-2309-4F67-A5E2-EAD98F723468"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2024-02-02 15:00:28 +00:00
"criteria" : "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C0507E91-567A-41D6-A7E5-5088A39F75FB"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
2023-04-24 12:24:31 +02:00
{
"vulnerable" : true ,
2024-02-02 15:00:28 +00:00
"criteria" : "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "10.5.4" ,
"matchCriteriaId" : "468860AA-9D7D-400F-8E53-1100EE8C269B"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2024-02-02 15:00:28 +00:00
"criteria" : "cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "10.5.4" ,
"matchCriteriaId" : "190009BB-163F-4D60-AC03-98BECBA13B2D"
2023-04-24 12:24:31 +02:00
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://cvs.php.net/viewvc.cgi/php-src/sapi/cgi/cgi_main.c?r1=1.267.2.15.2.50.2.12&r2=1.267.2.15.2.50.2.13&diff_format=u" ,
"source" : "secalert@redhat.com" ,
"tags" : [
2024-02-02 15:00:28 +00:00
"Broken Link" ,
2023-04-24 12:24:31 +02:00
"Exploit"
]
} ,
{
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01476437" ,
2024-02-02 15:00:28 +00:00
"source" : "secalert@redhat.com" ,
"tags" : [
"Broken Link"
]
2023-04-24 12:24:31 +02:00
} ,
2024-11-22 07:15:30 +00:00
{
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01476437" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Broken Link"
]
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html" ,
2024-02-02 15:00:28 +00:00
"source" : "secalert@redhat.com" ,
"tags" : [
"Mailing List"
]
2023-04-24 12:24:31 +02:00
} ,
{
"url" : "http://marc.info/?l=bugtraq&m=124654546101607&w=2" ,
2024-02-02 15:00:28 +00:00
"source" : "secalert@redhat.com" ,
"tags" : [
"Mailing List"
]
2023-04-24 12:24:31 +02:00
} ,
2024-11-22 07:15:30 +00:00
{
"url" : "http://marc.info/?l=bugtraq&m=124654546101607&w=2" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Mailing List"
]
} ,
{
"url" : "http://marc.info/?l=bugtraq&m=125631037611762&w=2" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Mailing List"
]
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://marc.info/?l=bugtraq&m=125631037611762&w=2" ,
2024-02-02 15:00:28 +00:00
"source" : "secalert@redhat.com" ,
"tags" : [
"Mailing List"
]
} ,
{
"url" : "http://secunia.com/advisories/30048" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Broken Link" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/30083" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Broken Link"
]
} ,
{
"url" : "http://secunia.com/advisories/30345" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Broken Link" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/30616" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Broken Link"
]
} ,
{
"url" : "http://secunia.com/advisories/30757" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Broken Link"
]
} ,
{
"url" : "http://secunia.com/advisories/30828" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Broken Link"
]
} ,
{
"url" : "http://secunia.com/advisories/31200" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Broken Link"
]
} ,
{
"url" : "http://secunia.com/advisories/31326" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Broken Link"
]
} ,
{
"url" : "http://secunia.com/advisories/32746" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Broken Link"
]
} ,
{
"url" : "http://secunia.com/advisories/35650" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Broken Link"
]
2023-04-24 12:24:31 +02:00
} ,
{
"url" : "http://security.gentoo.org/glsa/glsa-200811-05.xml" ,
2024-02-02 15:00:28 +00:00
"source" : "secalert@redhat.com" ,
"tags" : [
"Third Party Advisory"
]
2023-04-24 12:24:31 +02:00
} ,
{
"url" : "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0176" ,
2024-02-02 15:00:28 +00:00
"source" : "secalert@redhat.com" ,
"tags" : [
"Broken Link"
]
2023-04-24 12:24:31 +02:00
} ,
{
"url" : "http://www.kb.cert.org/vuls/id/147027" ,
"source" : "secalert@redhat.com" ,
"tags" : [
2024-02-02 15:00:28 +00:00
"Third Party Advisory" ,
2023-04-24 12:24:31 +02:00
"US Government Resource"
]
} ,
{
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2008:127" ,
2024-02-02 15:00:28 +00:00
"source" : "secalert@redhat.com" ,
"tags" : [
"Broken Link"
]
2023-04-24 12:24:31 +02:00
} ,
{
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2008:128" ,
2024-02-02 15:00:28 +00:00
"source" : "secalert@redhat.com" ,
"tags" : [
"Broken Link"
]
2023-04-24 12:24:31 +02:00
} ,
{
"url" : "http://www.openwall.com/lists/oss-security/2008/05/02/2" ,
2024-02-02 15:00:28 +00:00
"source" : "secalert@redhat.com" ,
"tags" : [
"Mailing List"
]
2023-04-24 12:24:31 +02:00
} ,
{
"url" : "http://www.php.net/ChangeLog-5.php" ,
2024-02-02 15:00:28 +00:00
"source" : "secalert@redhat.com" ,
"tags" : [
"Release Notes"
]
2023-04-24 12:24:31 +02:00
} ,
{
"url" : "http://www.redhat.com/support/errata/RHSA-2008-0505.html" ,
2024-02-02 15:00:28 +00:00
"source" : "secalert@redhat.com" ,
"tags" : [
"Broken Link"
]
2023-04-24 12:24:31 +02:00
} ,
{
"url" : "http://www.securityfocus.com/archive/1/492535/100/0/threaded" ,
2024-02-02 15:00:28 +00:00
"source" : "secalert@redhat.com" ,
"tags" : [
"Broken Link" ,
"Third Party Advisory" ,
"VDB Entry"
]
2023-04-24 12:24:31 +02:00
} ,
{
"url" : "http://www.securityfocus.com/bid/29009" ,
2024-02-02 15:00:28 +00:00
"source" : "secalert@redhat.com" ,
"tags" : [
"Broken Link" ,
"Third Party Advisory" ,
"VDB Entry"
]
2023-04-24 12:24:31 +02:00
} ,
{
"url" : "http://www.securitytracker.com/id?1019958" ,
2024-02-02 15:00:28 +00:00
"source" : "secalert@redhat.com" ,
"tags" : [
"Broken Link" ,
"Third Party Advisory" ,
"VDB Entry"
]
2023-04-24 12:24:31 +02:00
} ,
{
"url" : "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.488951" ,
2024-02-02 15:00:28 +00:00
"source" : "secalert@redhat.com" ,
"tags" : [
"Broken Link"
]
2023-04-24 12:24:31 +02:00
} ,
{
"url" : "http://www.ubuntu.com/usn/usn-628-1" ,
2024-02-02 15:00:28 +00:00
"source" : "secalert@redhat.com" ,
"tags" : [
"Third Party Advisory"
]
2023-04-24 12:24:31 +02:00
} ,
{
"url" : "http://www.vupen.com/english/advisories/2008/1412" ,
2024-02-02 15:00:28 +00:00
"source" : "secalert@redhat.com" ,
"tags" : [
"Broken Link"
]
2023-04-24 12:24:31 +02:00
} ,
{
"url" : "http://www.vupen.com/english/advisories/2008/1810/references" ,
2024-02-02 15:00:28 +00:00
"source" : "secalert@redhat.com" ,
"tags" : [
"Broken Link"
]
2023-04-24 12:24:31 +02:00
} ,
{
"url" : "http://www.vupen.com/english/advisories/2008/2268" ,
2024-02-02 15:00:28 +00:00
"source" : "secalert@redhat.com" ,
"tags" : [
"Broken Link"
]
2023-04-24 12:24:31 +02:00
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/42137" ,
2024-02-02 15:00:28 +00:00
"source" : "secalert@redhat.com" ,
"tags" : [
"Third Party Advisory" ,
"VDB Entry"
]
2023-04-24 12:24:31 +02:00
} ,
{
"url" : "https://issues.rpath.com/browse/RPL-2503" ,
2024-02-02 15:00:28 +00:00
"source" : "secalert@redhat.com" ,
"tags" : [
"Broken Link"
]
2023-04-24 12:24:31 +02:00
} ,
{
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5510" ,
2024-02-02 15:00:28 +00:00
"source" : "secalert@redhat.com" ,
"tags" : [
"Broken Link"
]
2023-04-24 12:24:31 +02:00
} ,
{
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00773.html" ,
2024-02-02 15:00:28 +00:00
"source" : "secalert@redhat.com" ,
"tags" : [
"Mailing List"
]
2023-04-24 12:24:31 +02:00
} ,
{
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00779.html" ,
2024-02-02 15:00:28 +00:00
"source" : "secalert@redhat.com" ,
"tags" : [
"Mailing List"
]
2024-11-22 07:15:30 +00:00
} ,
{
"url" : "http://cvs.php.net/viewvc.cgi/php-src/sapi/cgi/cgi_main.c?r1=1.267.2.15.2.50.2.12&r2=1.267.2.15.2.50.2.13&diff_format=u" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Broken Link" ,
"Exploit"
]
} ,
{
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01476437" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Broken Link"
]
} ,
{
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01476437" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Broken Link"
]
} ,
{
"url" : "http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Mailing List"
]
} ,
{
"url" : "http://marc.info/?l=bugtraq&m=124654546101607&w=2" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Mailing List"
]
} ,
{
"url" : "http://marc.info/?l=bugtraq&m=124654546101607&w=2" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Mailing List"
]
} ,
{
"url" : "http://marc.info/?l=bugtraq&m=125631037611762&w=2" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Mailing List"
]
} ,
{
"url" : "http://marc.info/?l=bugtraq&m=125631037611762&w=2" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Mailing List"
]
} ,
{
"url" : "http://secunia.com/advisories/30048" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Broken Link" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/30083" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Broken Link"
]
} ,
{
"url" : "http://secunia.com/advisories/30345" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Broken Link" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/30616" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Broken Link"
]
} ,
{
"url" : "http://secunia.com/advisories/30757" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Broken Link"
]
} ,
{
"url" : "http://secunia.com/advisories/30828" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Broken Link"
]
} ,
{
"url" : "http://secunia.com/advisories/31200" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Broken Link"
]
} ,
{
"url" : "http://secunia.com/advisories/31326" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Broken Link"
]
} ,
{
"url" : "http://secunia.com/advisories/32746" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Broken Link"
]
} ,
{
"url" : "http://secunia.com/advisories/35650" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Broken Link"
]
} ,
{
"url" : "http://security.gentoo.org/glsa/glsa-200811-05.xml" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0176" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Broken Link"
]
} ,
{
"url" : "http://www.kb.cert.org/vuls/id/147027" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory" ,
"US Government Resource"
]
} ,
{
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2008:127" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Broken Link"
]
} ,
{
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2008:128" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Broken Link"
]
} ,
{
"url" : "http://www.openwall.com/lists/oss-security/2008/05/02/2" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Mailing List"
]
} ,
{
"url" : "http://www.php.net/ChangeLog-5.php" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Release Notes"
]
} ,
{
"url" : "http://www.redhat.com/support/errata/RHSA-2008-0505.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Broken Link"
]
} ,
{
"url" : "http://www.securityfocus.com/archive/1/492535/100/0/threaded" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Broken Link" ,
"Third Party Advisory" ,
"VDB Entry"
]
} ,
{
"url" : "http://www.securityfocus.com/bid/29009" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Broken Link" ,
"Third Party Advisory" ,
"VDB Entry"
]
} ,
{
"url" : "http://www.securitytracker.com/id?1019958" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Broken Link" ,
"Third Party Advisory" ,
"VDB Entry"
]
} ,
{
"url" : "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.488951" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Broken Link"
]
} ,
{
"url" : "http://www.ubuntu.com/usn/usn-628-1" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "http://www.vupen.com/english/advisories/2008/1412" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Broken Link"
]
} ,
{
"url" : "http://www.vupen.com/english/advisories/2008/1810/references" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Broken Link"
]
} ,
{
"url" : "http://www.vupen.com/english/advisories/2008/2268" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Broken Link"
]
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/42137" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory" ,
"VDB Entry"
]
} ,
{
"url" : "https://issues.rpath.com/browse/RPL-2503" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Broken Link"
]
} ,
{
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5510" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Broken Link"
]
} ,
{
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00773.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Mailing List"
]
} ,
{
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00779.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Mailing List"
]
}
] ,
"vendorComments" : [
{
"organization" : "Red Hat" ,
"comment" : "Not vulnerable. This issue did not affect the versions of PHP as shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5, and Red Hat Application Stack v1.\n\nFor Red Hat Application Stack v2, issue was addressed via: https://rhn.redhat.com/errata/RHSA-2008-0505.html" ,
"lastModified" : "2008-08-07T00:00:00"
2023-04-24 12:24:31 +02:00
}
]
}