Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2006-2660

Опубликовано: 13 июн. 2006
Источник: debian

Описание

Buffer consumption vulnerability in the tempnam function in PHP 5.1.4 and 4.x before 4.4.3 allows local users to bypass restrictions and create PHP files with fixed names in other directories via a pathname argument longer than MAXPATHLEN, which prevents a unique string from being appended to the filename.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
php4fixed4:4.4.4-1package
php5fixed5.1.6-1package

Примечания

  • using a long enough path (>MAXPATHLEN) allows you to have

  • tempnam create a file without the temp extension. sounds like

  • another shoot yourself in the foot issue, since the local user

  • could just as easily create the file manually, and if the

  • tempnam function is taking unsanitized input, it's an

  • application error

Связанные уязвимости

ubuntu
около 19 лет назад

Buffer consumption vulnerability in the tempnam function in PHP 5.1.4 and 4.x before 4.4.3 allows local users to bypass restrictions and create PHP files with fixed names in other directories via a pathname argument longer than MAXPATHLEN, which prevents a unique string from being appended to the filename.

redhat
около 19 лет назад

Buffer consumption vulnerability in the tempnam function in PHP 5.1.4 and 4.x before 4.4.3 allows local users to bypass restrictions and create PHP files with fixed names in other directories via a pathname argument longer than MAXPATHLEN, which prevents a unique string from being appended to the filename.

nvd
около 19 лет назад

Buffer consumption vulnerability in the tempnam function in PHP 5.1.4 and 4.x before 4.4.3 allows local users to bypass restrictions and create PHP files with fixed names in other directories via a pathname argument longer than MAXPATHLEN, which prevents a unique string from being appended to the filename.

github
больше 3 лет назад

Buffer consumption vulnerability in the tempnam function in PHP 5.1.4 and 4.x before 4.4.3 allows local users to bypass restrictions and create PHP files with fixed names in other directories via a pathname argument longer than MAXPATHLEN, which prevents a unique string from being appended to the filename.