VRDA Feed by JPCERT/CC
  Vulnerability Response Decision Assistance Feed : Information for vulnerability impact analysis
[ about VRDA Feed | JPCERT/CC



 
Vulnerability Analysis Result (Revision No : 1) [ Download XML
VRDA-091125-002
PHP Security Bypass and DoS Vulnerabilities
http://www.php.net/releases/5_3_1.php

Added "max_file_uploads" INI directive, which can be set to limit the number of file uploads per-request to 20 by default, to prevent possible DOS via temporary file exhaustion. Added missing sanity checks around exif processing. Fixed a safe_mode bypass in tempnam(). Fixed a open_basedir bypass in posix_mkfifo(). Fixed bug #50063 (safe_mode_include_dir fails). Fixed bug #44683 (popen crashes when an invalid mode is passed).




About This Analysis Information
Analysis Information Provider:
JPCERT/CC
First Published:
2009-11-25
Source Information Category:
Advisory, Alert
Last Updated:
2009-11-25




Affected Product Tags
cpe:/a:php:php     (PHP PHP)
 


Vulnerability Analysis Results
[Information Source Reliability] [?]
Low [?]

Medium [?]
X High [?]

[Impact Level] [?]
Low [?]

X Low-Medium [?]
Medium-High [?]
High [?]

[Access Required] [?]
Physical [?]

Local [?]
Non-routed [?]
X Routed [?]

[Authentication] [?]
Privileged [?]

Standard [?]
Limited [?]
X None or Unnecessary [?]

[User Interaction Required] [?]
Complex [?]

Simple [?]
X None [?]

[Technical Difficulty] [?]
High [?]

Medium-High [?]
Low-Medium [?]
Low [?]

[Availability of Remediation] [?]
X Official Patch [?]

Official Workaround [?]
Unofficial Patch [?]
None [?]

[Incident Activity] [?]
None [?]

X Exploit or PoC [?]
Activity Observed [?]

Alternatives




References

Copyright © 2009 JPCERT/CC All Rights Reserved.