VRDA Feed by JPCERT/CC
  Vulnerability Response Decision Assistance Feed : Information for vulnerability impact analysis
[ about VRDA Feed | JPCERT/CC



 
Vulnerability Analysis Result (Revision No : 1) [ Download XML
VRDA-100301-001
PHP Two Security Bypass Vulnerabilities
http://www.php.net/ChangeLog-5.php#5.2.13

Fixed safe_mode validation inside tempnam() when the directory path does not end with a /). (Martin Jansen). Fixed a possible open_basedir/safe_mode bypass in the session extension identified by Grzegorz Stachowiak. (Ilia)




About This Analysis Information
Analysis Information Provider:
JPCERT/CC
First Published:
2010-03-01
Source Information Category:
Advisory, Alert
Last Updated:
2010-03-01




Affected Product Tags
cpe:/a:php:php     (PHP PHP)
 


Vulnerability Analysis Results
[Information Source Reliability] [?]
Low [?]

Medium [?]
X High [?]

[Impact Level] [?]
Low [?]

Low-Medium [?]
X Medium-High [?]
High [?]

[Access Required] [?]
Physical [?]

Local [?]
Non-routed [?]
X Routed [?]

[Authentication] [?]
Privileged [?]

X Standard [?]
Limited [?]
None or Unnecessary [?]

[User Interaction Required] [?]
X Complex [?]

Simple [?]
None [?]

[Technical Difficulty] [?]
High [?]

Medium-High [?]
Low-Medium [?]
Low [?]

[Availability of Remediation] [?]
X Official Patch [?]

Official Workaround [?]
Unofficial Patch [?]
None [?]

[Incident Activity] [?]
None [?]

X Exploit or PoC [?]
Activity Observed [?]

Alternatives




References

Copyright © 2010 JPCERT/CC All Rights Reserved.