Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2022-02625

Опубликовано: 11 мая 2012
Источник: fstec
CVSS3: 5.6
CVSS2: 7.5
EPSS Критический

Описание

Уязвимость компонента sapi/cgi/cgi_main.c интерпретатора языка программирования PHP связана с отсутствием проверки достоверности последовательностей XML-объетов. Эксплуатация уязвимости может позволить нарушителю, действующему удалённо, выполнить произвольный код

Вендор

Canonical Ltd.
Novell Inc.
Сообщество свободного программного обеспечения
PHP Group

Наименование ПО

Ubuntu
OpenSUSE Leap
Debian GNU/Linux
PHP

Версия ПО

12.04 (Ubuntu)
15.0 (OpenSUSE Leap)
11.10 (Ubuntu)
11.04 (Ubuntu)
6 (Debian GNU/Linux)
10.04 (Ubuntu)
5.4.1 (PHP)
8.04 (Ubuntu)
5.3.6 (PHP)
5.3.5 (PHP)
5.2.10 (PHP)
5.2.13 (PHP)
5.2.4 (PHP)
5.2.3 (PHP)
5.1.1 (PHP)
5.1.0 (PHP)
5.1.6 (PHP)
5.0.0beta4 (PHP)
5.0.0beta3 (PHP)
5.0.0beta1 (PHP)
4.3.10 (PHP)
4.3.5 (PHP)
4.1.2 (PHP)
4.4.9 (PHP)
4.4.1 (PHP)
4.0.7 (PHP)
3.0.11 (PHP)
3.0.18 (PHP)
3.0.4 (PHP)
3.0.8 (PHP)
3.0.5 (PHP)
5.3.11 (PHP)
5.3.4 (PHP)
5.3.9 (PHP)
5.3.2 (PHP)
5.3.10 (PHP)
5.2.5 (PHP)
5.2.11 (PHP)
5.2.14 (PHP)
5.2.1 (PHP)
5.1.4 (PHP)
5.1.5 (PHP)
5.0.0beta2 (PHP)
5.0.2 (PHP)
5.3.8 (PHP)
5.3.1 (PHP)
5.3.7 (PHP)
4.3.1 (PHP)
4.2.0 (PHP)
4.3.0 (PHP)
4.0beta1 (PHP)
4.0.5 (PHP)
4.0.4 (PHP)
3.0.10 (PHP)
3.0.3 (PHP)
3.0.6 (PHP)
5.2.16 (PHP)
5.0.0 (PHP)
4.3.11 (PHP)
4.3.4 (PHP)
4.2.2 (PHP)
4.4.5 (PHP)
4.4.2 (PHP)
4.4.3 (PHP)
4.0.1 (PHP)
4.0.0 (PHP)
4.0.3 (PHP)
4.0.2 (PHP)
5.3.0 (PHP)
5.2.12 (PHP)
5.2.0 (PHP)
5.2.7 (PHP)
5.2.15 (PHP)
4.3.2 (PHP)
4.2.3 (PHP)
4.4.0 (PHP)
4.0beta2 (PHP)
3.0.13 (PHP)
3.0.15 (PHP)
2.0b10 (PHP)
до 5.3.12 включительно (PHP)
5.3.3 (PHP)
5.2.6 (PHP)
5.2.9 (PHP)
5.0.4 (PHP)
5.0.3 (PHP)
5.0.0rc1 (PHP)
5.0.0rc2 (PHP)
4.2.1 (PHP)
4.3.8 (PHP)
4.3.9 (PHP)
4.0beta4 (PHP)
4.0.6 (PHP)
3.0.7 (PHP)
3.0.12 (PHP)
3.0.1 (PHP)
3.0.14 (PHP)
3.0.17 (PHP)
2.0 (PHP)
1.0 (PHP)
5.2.8 (PHP)
5.2.2 (PHP)
5.2.17 (PHP)
5.1.3 (PHP)
5.1.2 (PHP)
5.0.5 (PHP)

Тип ПО

Операционная система
Прикладное ПО информационных систем

Операционные системы и аппаратные платформы

Canonical Ltd. Ubuntu 12.04
Novell Inc. OpenSUSE Leap 15.0
Canonical Ltd. Ubuntu 11.10
Canonical Ltd. Ubuntu 11.04
Сообщество свободного программного обеспечения Debian GNU/Linux 6
Canonical Ltd. Ubuntu 10.04
Canonical Ltd. Ubuntu 8.04

Уровень опасности уязвимости

Высокий уровень опасности (базовая оценка CVSS 2.0 составляет 7,5)
Средний уровень опасности (базовая оценка CVSS 3.0 составляет 5,6)

Возможные меры по устранению уязвимости

Использование рекомендаций:
https://bugs.php.net/bug.php?id=61910
Для программных продуктов Novell Inc.:
https://www.suse.com/security/cve/CVE-2012-2311
Для Ubuntu:
https://ubuntu.com/security/CVE-2012-2311
Для Debian GNU/Linux:
https://security-tracker.debian.org/tracker/CVE-2012-2311

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 100%
0.91436
Критический

5.6 Medium

CVSS3

7.5 High

CVSS2

Связанные уязвимости

ubuntu
около 13 лет назад

sapi/cgi/cgi_main.c in PHP before 5.3.13 and 5.4.x before 5.4.3, when configured as a CGI script (aka php-cgi), does not properly handle query strings that contain a %3D sequence but no = (equals sign) character, which allows remote attackers to execute arbitrary code by placing command-line options in the query string, related to lack of skipping a certain php_getopt for the 'd' case. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-1823.

redhat
около 13 лет назад

sapi/cgi/cgi_main.c in PHP before 5.3.13 and 5.4.x before 5.4.3, when configured as a CGI script (aka php-cgi), does not properly handle query strings that contain a %3D sequence but no = (equals sign) character, which allows remote attackers to execute arbitrary code by placing command-line options in the query string, related to lack of skipping a certain php_getopt for the 'd' case. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-1823.

nvd
около 13 лет назад

sapi/cgi/cgi_main.c in PHP before 5.3.13 and 5.4.x before 5.4.3, when configured as a CGI script (aka php-cgi), does not properly handle query strings that contain a %3D sequence but no = (equals sign) character, which allows remote attackers to execute arbitrary code by placing command-line options in the query string, related to lack of skipping a certain php_getopt for the 'd' case. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-1823.

debian
около 13 лет назад

sapi/cgi/cgi_main.c in PHP before 5.3.13 and 5.4.x before 5.4.3, when ...

github
около 3 лет назад

sapi/cgi/cgi_main.c in PHP before 5.3.13 and 5.4.x before 5.4.3, when configured as a CGI script (aka php-cgi), does not properly handle query strings that contain a %3D sequence but no = (equals sign) character, which allows remote attackers to execute arbitrary code by placing command-line options in the query string, related to lack of skipping a certain php_getopt for the 'd' case. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-1823.

EPSS

Процентиль: 100%
0.91436
Критический

5.6 Medium

CVSS3

7.5 High

CVSS2