"value":"The fopen function in PHP 5.2.0 does not properly handle invalid URI handlers, which allows context-dependent attackers to bypass safe_mode restrictions and read arbitrary files via a file path specified with an invalid URI, as demonstrated via the srpath URI."
},
{
"lang":"es",
"value":"La funci\u00f3n fopen del PHP 5.2.0 no maneja adecuadamente agentes URI inv\u00e1lidos, lo que permite a atacantes dependientes del contexto evitar las restricciones del modo seguro y leer ficheros de su elecci\u00f3n a trav\u00e9s de la especificaci\u00f3n de una ruta de fichero con un URI no v\u00e1lido, como lo demostrado a trav\u00e9s de la URI srpath."
"comment":"Due to the nature of safe_mode and open_basedir restrictions, and in alignment with the PHP group\u2019s stance on these features, Mandriva does not consider this a security issue.",
"lastModified":"2007-09-21T00:00:00"
},
{
"organization":"Red Hat",
"comment":"We do not consider these to be security issues. For more details see http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=169857#c1\nand http://www.php.net/security-note.php\n",